A behavioral authentication method for mobile based on browsing behaviors
暂无分享,去创建一个
Chungang Yan | Mimi Wang | Zhijun Ding | Dongxiang Chen | Chungang Yan | Zhijun Ding | Mimi Wang | Dongxiang Chen
[1] Kent A. Spackman,et al. Signal Detection Theory: Valuable Tools for Evaluating Inductive Learning , 1989, ML.
[2] Yoav Freund,et al. A decision-theoretic generalization of on-line learning and an application to boosting , 1995, EuroCOLT.
[3] Qiang Liu,et al. A behavioral authentication method for mobile gesture against resilient user posture , 2016, 2016 3rd International Conference on Systems and Informatics (ICSAI).
[4] Yoav Freund,et al. A decision-theoretic generalization of on-line learning and an application to boosting , 1997, EuroCOLT.
[5] Vincenzo Piuri,et al. Toward Unconstrained Fingerprint Recognition: A Fully Touchless 3-D System Based on Two Views on the Move , 2016, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[6] Dawn Xiaodong Song,et al. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication , 2012, IEEE Transactions on Information Forensics and Security.
[7] Heinrich Hußmann,et al. Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.
[8] Chao Shen,et al. Touch-interaction behavior for continuous user authentication on smartphones , 2015, 2015 International Conference on Biometrics (ICB).
[9] Abdallah Bashir Musa. Comparative study on classification performance between support vector machine and logistic regression , 2012, International Journal of Machine Learning and Cybernetics.
[10] Priyanka Trikha,et al. Fast Density Based Clustering Algorithm , 2013 .
[11] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[12] Pineda,et al. Generalization of back-propagation to recurrent neural networks. , 1987, Physical review letters.
[13] Leo Breiman,et al. Bagging Predictors , 1996, Machine Learning.
[14] John Daugman,et al. New Methods in Iris Recognition , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[15] Jonghyun Choi,et al. Multi-Directional Multi-Level Dual-Cross Patterns for Robust Face Recognition , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[16] Peter J. Rousseeuw,et al. Finding Groups in Data: An Introduction to Cluster Analysis , 1990 .
[17] Xing Liu-tao. Improvement of C4.5 decision tree continuous attributes segmentation threshold algorithm and its application , 2011 .
[18] Wei-Yin Loh,et al. Classification and regression trees , 2011, WIREs Data Mining Knowl. Discov..
[19] J. MacQueen. Some methods for classification and analysis of multivariate observations , 1967 .
[20] Miguel Lastra,et al. Fast fingerprint identification using GPUs , 2015, Inf. Sci..
[21] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[22] Michael R. Lyu,et al. Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones , 2014, SOUPS.
[23] Xiaogang Wang,et al. Hybrid Deep Learning for Face Verification , 2013, 2013 IEEE International Conference on Computer Vision.
[24] Tao Feng,et al. Continuous Mobile Authentication Using Virtual Key Typing Biometrics , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[25] Xiaolong Su,et al. An improved K-Means clustering algorithm , 2010, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[26] Trac D. Tran,et al. Partial face recognition: A sparse representation-based approach , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[27] Tao Feng,et al. TIPS: context-aware implicit user identification using touch screen in uncontrolled environments , 2014, HotMobile.
[28] Hao Zhang,et al. Segmentation of 3D meshes through spectral clustering , 2004, 12th Pacific Conference on Computer Graphics and Applications, 2004. PG 2004. Proceedings..
[29] Andrew Zisserman,et al. Deep Face Recognition , 2015, BMVC.
[30] Nasir D. Memon,et al. An HMM-based multi-sensor approach for continuous mobile authentication , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[31] Chunying Zhang,et al. Attribute weighted Naive Bayesian classification algorithm , 2010, 2010 5th International Conference on Computer Science & Education.
[32] Tao Feng,et al. Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[33] P. Rousseeuw. Silhouettes: a graphical aid to the interpretation and validation of cluster analysis , 1987 .
[34] R. Fisher. THE USE OF MULTIPLE MEASUREMENTS IN TAXONOMIC PROBLEMS , 1936 .
[35] Mr. S. M. Sangave,et al. Continuous Touchscreen Mobile Authentication Using Several Gestures , 2014 .
[36] Jon Louis Bentley,et al. An Algorithm for Finding Best Matches in Logarithmic Expected Time , 1977, TOMS.
[37] Jiawei Han,et al. Efficient and Effective Clustering Methods for Spatial Data Mining , 1994, VLDB.
[38] Shifei Ding,et al. An optimizing BP neural network algorithm based on genetic algorithm , 2011, Artificial Intelligence Review.
[39] Leo Breiman,et al. Bagging Predictors , 1996, Machine Learning.
[40] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[41] Bernhard Schölkopf,et al. Support Vector Method for Novelty Detection , 1999, NIPS.
[42] Arun Ross,et al. Bayesian Belief models for integrating match scores with liveness and quality measures in a fingerprint verification system , 2016, 2016 International Conference on Biometrics (ICB).
[43] Manish Mathuria,et al. Fingerprint Recognition based on Minutiae Information , 2015 .