|
[1]
|
Shen, C., Zhang, Y., Cai, Z., et al. (2015) Touch-Interaction Behavior for Continuous User Authentication on Smartphones. Proceedings of ICB, Phuket, 19-22 May 2015, 157-162. [Google Scholar] [CrossRef]
|
|
[2]
|
Sarsavadia, R. and Patel, U. (2018) A Survey on Intelligent Face Recognition System. In: International Conference on ISMAC in Computational Vision and Bio-Engineering. Springer, Cham, 1209-1215. [Google Scholar] [CrossRef]
|
|
[3]
|
Bortolon, C., Capdevielle, D. and Raffard, S. (2015) Face Recognition in Schizophrenia Disorder: A Comprehensive Review of Behavioral, Neuroimaging and Neurophysiological Studies. Neuroscience & Biobehavioral Reviews, 53, 79-107. [Google Scholar] [CrossRef] [PubMed]
|
|
[4]
|
Ali, M.M.H., Mahale, V.H., Yannawar, P., et al. (2016) Overview of Fingerprint Recognition System. 2016 International Conference on Electrical, Electronics, and Optimiza-tion Techniques (ICEEOT), Chennai, 3-5 March 2016, 1334-1338. [Google Scholar] [CrossRef]
|
|
[5]
|
Liu, X., Li, Y., Deng, R.H., et al. (2018) When Human Cog-nitive Modeling Meets PINs: User-Independent Inter-Keystroke Timing Attacks. Computers & Security, 80, 90-107. [Google Scholar] [CrossRef]
|
|
[6]
|
林梦琪, 张晓梅. 基于行为足迹的多模态融合身份认证[J]. 计算机工程, 2021, 47(10): 116-124.
|
|
[7]
|
Yu, S.J., Younglee, J., Kim, M.H., et al. (2020) A Secure Biometric Based Us-er Authentication Protocol in Wireless Sensor Networks. 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, 6-8 January 2020, 0830-0834. [Google Scholar] [CrossRef]
|
|
[8]
|
Patel, V.M., Chellappa, R., Chandra, D., et al. (2016) Continuous User Authentication on Mobile Devices: Recent Progress and Remaining Challenges. IEEE Signal Pro-cessing Magazine, 33, 49-61. [Google Scholar] [CrossRef]
|
|
[9]
|
Shrestha, B., Saxena, N. and Harrison, J. (2013) Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture. Springer International Pub-lishing, Berlin. [Google Scholar] [CrossRef]
|
|
[10]
|
童随兵. 基于深度网络的步态识别技术研究[D]: [博士学位论文]. 上海: 上海交通大学, 2019.
|
|
[11]
|
Crawford, H. (2010) Keystroke Dynamics: Characteristics and Opportunities. IEEE 8th International Conference on Privacy Security & Trust, Ottawa, 17-19 August 2010, 205-212. [Google Scholar] [CrossRef]
|
|
[12]
|
Xu, H., Zhou, Y. and Lyu, M.R. (2014) Towards Con-tinuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones. 10th Symposium on Usable Privacy and Security (SOUPS 2014), Menlo Park, 9-11 July 2014, 187-198.
|
|
[13]
|
Frank, M., Biedert, R., Ma, E., et al. (2013) Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authen-tication. IEEE Transactions on Information Forensics and Security, 8, 136-148. [Google Scholar] [CrossRef]
|
|
[14]
|
Hestbek, M.R., Nickel, C. and Busch, C. (2012) Biometric Gait Recognition for Mobile Devices Using Wavelet Transform and Support Vector Machines. 19th International Conference on Systems, Signals and Image Processing (IWSSIP), Vienna, 11-13 April 2012, 205-210.
|
|
[15]
|
Riva, O., Qin, C., Strauss, K., et al. (2011) Progressive Authentication: Deciding When to Authenticate on Mobile Phones. Proceedings of Usenix Security Symposium, San Francisco, 8-12 August 2011, 15.
|
|
[16]
|
Yang, Y. and Sun, J. (2017) Energy-Efficient W-Layer for Behavior-Based Implicit Authentication on Mobile Devices. IEEE Conference on Computer Communica-tions, Atlanta, 1-4 May 2017, 1-9. [Google Scholar] [CrossRef]
|