Gesture and Sociability-based Continuous Authentication on Smart Mobile Devices
暂无分享,去创建一个
[1] John J. Leggett,et al. Dynamic Identity Verification via Keystroke Characteristics , 1991, Int. J. Man Mach. Stud..
[2] Luca Foschini,et al. Quantifying User Reputation Scores, Data Trustworthiness, and User Incentives in Mobile Crowd-Sensing , 2017, IEEE Access.
[3] Burak Kantarci,et al. SOBER-MCS: Sociability-Oriented and Battery Efficient Recruitment for Mobile Crowd-Sensing , 2018, Sensors.
[4] Burak Kantarci,et al. Mobile behaviometric framework for sociability assessment and identification of smartphone users , 2016, 2016 IEEE Symposium on Computers and Communication (ISCC).
[5] Yevgeniy Vahlis,et al. Is it really you?: user identification via adaptive behavior fingerprinting , 2014, CODASPY '14.
[6] Burak Kantarci,et al. A mobile platform for sociability-based continuous identification , 2016, 2016 IEEE 21st International Workshop on Computer Aided Modelling and Design of Communication Links and Networks (CAMAD).
[7] Ahmed Ramadan,et al. Touch-input based continuous authentication using gesture-level and session-level features , 2017, 2017 8th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).
[8] Diana Adler,et al. Using Multivariate Statistics , 2016 .
[9] M. Kubát. An Introduction to Machine Learning , 2017, Springer International Publishing.
[10] Mike Sharples,et al. Human-Computer Interaction , 1996, Artificial Intelligence.
[11] Li Lu,et al. Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics , 2015, IEEE Transactions on Computational Social Systems.
[12] Machine learning methods for human-computer interaction [tutorial] , 2012, 2012 IEEE Haptics Symposium (HAPTICS).
[13] Peter Xiaoping Liu,et al. Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks , 2011, IEEE Transactions on Wireless Communications.
[14] Hai Huang,et al. You Are How You Touch: User Verification on Smartphones via Tapping Behaviors , 2014, 2014 IEEE 22nd International Conference on Network Protocols.
[15] Burak Kantarci,et al. Social Behaviometrics for Personalized Devices in the Internet of Things Era , 2017, IEEE Access.
[16] Andrea Bondavalli,et al. Continuous and Transparent User Identity Verification for Secure Internet Services , 2015, IEEE Transactions on Dependable and Secure Computing.
[17] Zhongmin Cai,et al. MouseIdentity: Modeling Mouse-Interaction Behavior for a User Verification System , 2016, IEEE Transactions on Human-Machine Systems.
[18] Duncan S. Wong,et al. Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones , 2012, Inscrypt.
[19] Stephanie Schuckers,et al. Effect of data size on performance of free-text keystroke authentication , 2015, IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015).
[20] Burak Kantarci,et al. Anchor-Assisted and Vote-Based Trustworthiness Assurance in Smart City Crowdsensing , 2016, IEEE Access.
[21] Burak Kantarci,et al. COVERS-UP: Collaborative Verification of Smart User Profiles for social sustainability of smart cities , 2017 .
[22] Burak Kantarci,et al. The Smart Citizen Factor in Trustworthy Smart City Crowdsensing , 2016, IT Professional.
[23] Stephanie Schuckers,et al. Shared research dataset to support development of keystroke authentication , 2014, IEEE International Joint Conference on Biometrics.
[24] J. Guzmán. Regression Models for Categorical Dependent Variables Using Stata , 2013 .
[25] Dzmitry Kliazovich,et al. Game-Theoretic Recruitment of Sensing Service Providers for Trustworthy Cloud-Centric Internet-of-Things (IoT) Applications , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).