Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing
暂无分享,去创建一个
Jonathan Loo | Yasar Amin | Usman Naeem | Muhammad Awais Azam | Muhammad Ehatisham-ul-Haq | J. Loo | M. A. Azam | U. Naeem | Y. Amin | M. Ehatisham-ul-Haq
[1] Mirco Musolesi,et al. Sensing meets mobile social networks: the design, implementation and evaluation of the CenceMe application , 2008, SenSys '08.
[2] Bernt Schiele,et al. A tutorial on human activity recognition using body-worn inertial sensors , 2014, CSUR.
[3] Qing Yang,et al. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users , 2015, IEEE Transactions on Information Forensics and Security.
[4] Davide Anguita,et al. A Public Domain Dataset for Human Activity Recognition using Smartphones , 2013, ESANN.
[5] Wenyao Xu,et al. EyeVeri: A secure and usable approach for smartphone user authentication , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[6] Deborah Estrin,et al. PEIR, the personal environmental impact report, as a platform for participatory sensing systems research , 2009, MobiSys '09.
[7] John Zimmerman,et al. Mining smartphone data to classify life-facets of social relationships , 2013, CSCW.
[8] Paul J. M. Havinga,et al. Complex Human Activity Recognition Using Smartphone and Wrist-Worn Motion Sensors , 2016, Sensors.
[9] Reza Malekian,et al. Physical Activity Recognition From Smartphone Accelerometer Data for User Context Awareness Sensing , 2017, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[10] Duncan S. Wong,et al. TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones , 2016, ACNS.
[11] Hyunggon Park,et al. ECG Authentication System Design Based on Signal Analysis in Mobile and Wearable Devices , 2016, IEEE Signal Processing Letters.
[12] Bruno Crispo,et al. Please hold on: Unobtrusive user authentication using smartphone's built-in sensors , 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA).
[13] Tao Feng,et al. Continuous Mobile Authentication Using Virtual Key Typing Biometrics , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[14] Yong-Gyu Lee,et al. Smartphone-based mobile health monitoring. , 2012, Telemedicine journal and e-health : the official journal of the American Telemedicine Association.
[15] Shan Chang,et al. ShakeIn: Secure User Authentication of Smartphones with Single-Handed Shakes , 2017, IEEE Transactions on Mobile Computing.
[16] Toan Nguyen,et al. IllusionPIN: Shoulder-Surfing Resistant Authentication Using Hybrid Images , 2017, IEEE Transactions on Information Forensics and Security.
[17] Yunhao Liu,et al. Sherlock: Micro-Environment Sensing for Smartphones , 2014, IEEE Transactions on Parallel and Distributed Systems.
[18] Ron Kohavi,et al. Scaling Up the Accuracy of Naive-Bayes Classifiers: A Decision-Tree Hybrid , 1996, KDD.
[19] Yunze Zeng. Activity-based implicit authentication for wearable devices: Ph.D. forum abstract , 2016, IPSN 2016.
[20] Maayan Zhitomirsky-Geffet,et al. Cross-generational analysis of predictive factors of addictive behavior in smartphone usage , 2016, Comput. Hum. Behav..
[21] Paul J. M. Havinga,et al. Activity Recognition Using Inertial Sensing for Healthcare, Wellbeing and Sports Applications: A Survey , 2010, ARCS Workshops.
[22] Matthias Trojahn,et al. Toward Mobile Authentication with Keystroke Dynamics on Mobile Phones and Tablets , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.
[23] Zhigang Liu,et al. Darwin phones: the evolution of sensing and inference on mobile phones , 2010, MobiSys '10.
[24] Alex X. Liu,et al. Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it , 2013, MobiCom.
[25] Jiang Zhu,et al. KeySens: Passive User Authentication through Micro-behavior Modeling of Soft Keyboard Interaction , 2013, MobiCASE.
[26] Piet Kommers,et al. Modeling habitual and addictive smartphone behavior: The role of smartphone usage types, emotional intelligence, social stress, self-regulation, age, and gender , 2015, Comput. Hum. Behav..
[27] Wei-Yin Loh,et al. Classification and regression trees , 2011, WIREs Data Mining Knowl. Discov..
[28] Abayomi Moradeyo Otebolaku,et al. User context recognition using smartphone sensors and classification models , 2016, J. Netw. Comput. Appl..
[29] Gert R. G. Lanckriet,et al. Physical activity recognition in free-living from body-worn sensors , 2013, SenseCam '13.
[30] Rytis Maskeliunas,et al. Smartphone User Identity Verification Using Gait Characteristics , 2016, Symmetry.
[31] Hanghang Tong,et al. Activity recognition with smartphone sensors , 2014 .
[32] Rahim Tafazolli,et al. A survey on smartphone-based systems for opportunistic user context recognition , 2013, CSUR.
[33] Gary M. Weiss,et al. Applications of mobile activity recognition , 2012, UbiComp.
[34] Paul J. M. Havinga,et al. Fusion of Smartphone Motion Sensors for Physical Activity Recognition , 2014, Sensors.
[35] Rui Wang,et al. Using Smartphones to Collect Behavioral Data in Psychological Science , 2016, Perspectives on psychological science : a journal of the Association for Psychological Science.
[36] Alex Fridman,et al. Learning Human Identity from Motion Patterns , 2015, IEEE Access.
[37] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[38] Zhaohui Wu,et al. Accelerometer-Based Gait Recognition by Sparse Representation of Signature Points With Clusters , 2015, IEEE Transactions on Cybernetics.
[39] Rubén San-Segundo-Hernández,et al. Frequency features and GMM-UBM approach for gait-based person identification using smartphone inertial signals , 2016, Pattern Recognit. Lett..
[40] Wazir Zada Khan,et al. Mobile Phone Sensing Systems: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[41] Liam M. Mayron. Biometric Authentication on Mobile Devices , 2015, IEEE Security & Privacy.
[42] Demetrios Zeinalipour-Yazti,et al. Crowdsourcing with Smartphones , 2012, IEEE Internet Computing.
[43] Hai Huang,et al. You Are How You Touch: User Verification on Smartphones via Tapping Behaviors , 2014, 2014 IEEE 22nd International Conference on Network Protocols.
[44] Paul J. M. Havinga,et al. Towards Physical Activity Recognition Using Smartphone Sensors , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.
[45] Farah Ahmad,et al. Participant experiences in a smartphone-based health coaching intervention for type 2 diabetes: A qualitative inquiry , 2016, Journal of telemedicine and telecare.
[46] Christoph Busch,et al. Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[47] Paul J. M. Havinga,et al. A Survey of Online Activity Recognition Using Mobile Phones , 2015, Sensors.
[48] Robert Meersman,et al. On The Move to Meaningful Internet Systems 2003: CoopIS, DOA, and ODBASE , 2003, Lecture Notes in Computer Science.
[49] Thomas W Valente,et al. Social network diagnostics: a tool for monitoring group interventions , 2013, Implementation Science.
[50] Atsushi Kanai,et al. Personal authentication method against shoulder-surfing attacks for smartphone , 2017, 2017 IEEE International Conference on Consumer Electronics (ICCE).
[51] A M KommersPiet,et al. Modeling habitual and addictive smartphone behavior , 2015 .
[52] Jain-Shing Wu,et al. Smartphone continuous authentication based on keystroke and gesture profiling , 2015, 2015 International Carnahan Conference on Security Technology (ICCST).
[53] Muhammad Usman Ilyas,et al. Activity recognition using smartphone sensors , 2013, 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC).
[54] Yuwei Chen,et al. Human Behavior Cognition Using Smartphone Sensors , 2013, Sensors.
[55] Cem Ersoy,et al. A Review and Taxonomy of Activity Recognition on Mobile Phones , 2013 .
[56] Kyung-Seu Cho,et al. Influence of smartphone addiction proneness of young children on problematic behaviors and emotional intelligence: Mediating self-assessment effects of parents using smartphones , 2017, Comput. Hum. Behav..
[57] Juan E. Tapiador,et al. Human Identification Using Compressed ECG Signals , 2015, Journal of Medical Systems.
[58] Yunze Zeng. Ph.D. Forum Abstract: Activity-Based Implicit Authentication for Wearable Devices , 2016, 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).
[59] Konrad Paul Kording,et al. Using Mobile Phones for Activity Recognition in Parkinson’s Patients , 2012, Front. Neur..
[60] Miguel A. Labrador,et al. A Survey on Human Activity Recognition using Wearable Sensors , 2013, IEEE Communications Surveys & Tutorials.
[61] Gary M. Weiss,et al. Activity recognition using cell phone accelerometers , 2011, SKDD.
[62] David W. McDonald,et al. Activity sensing in the wild: a field trial of ubifit garden , 2008, CHI.
[63] Alessio Vecchio,et al. Gait-based authentication using a wrist-worn device , 2016, MobiQuitous.
[64] Nitesh Saxena,et al. Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture , 2013, CANS.
[65] Leif E. Peterson. K-nearest neighbor , 2009, Scholarpedia.
[66] Jugal K. Kalita,et al. Authentication of Smartphone Users Using Behavioral Biometrics , 2016, IEEE Communications Surveys & Tutorials.
[67] Rebecca A. O'Leary,et al. Classification and Regression Tree and Spatial Analyses Reveal Geographic Heterogeneity in Genome Wide Linkage Study of Indian Visceral Leishmaniasis , 2010, PloS one.
[68] Heikki Ailisto,et al. Identifying users of portable devices from gait pattern with accelerometers , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[69] Syed Abdul Rahman Al-Haddad,et al. ECG biometric authentication based on non-fiducial approach using kernel methods , 2016, Digit. Signal Process..
[70] Dawn Xiaodong Song,et al. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication , 2012, IEEE Transactions on Information Forensics and Security.
[71] Wenbing Zhao,et al. SPE: Security and Privacy Enhancement Framework for Mobile Devices , 2017, IEEE Transactions on Dependable and Secure Computing.
[72] Judith Liu-Jimenez,et al. Gait recognition using smartphone , 2016, 2016 IEEE International Carnahan Conference on Security Technology (ICCST).
[73] Lei Yang,et al. Unlocking Smart Phone through Handwaving Biometrics , 2015, IEEE Transactions on Mobile Computing.
[74] Xiaohong Guan,et al. Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones , 2016, Sensors.
[75] Paul J. M. Havinga,et al. Towards detection of bad habits by fusing smartphone and smartwatch sensors , 2015, 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).