4.3 Article

Evaluation of Deep Learning Models for Person Authentication Based on Touch Gesture

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Kollector: Detecting Fraudulent Activities on Mobile Devices Using Deep Learning

Lichao Sun et al.

Summary: With the rapid growth in smartphone usage, preventing leakage of personal information and privacy has become a challenging task. Kollector is a new framework to detect impersonation using deep learning methods. The system achieves high accuracy using only accelerometer and five keyboard taps.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2021)

Article Computer Science, Information Systems

Dropout vs. batch normalization: an empirical study of their impact to deep learning

Christian Garbin et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2020)

Article Computer Science, Information Systems

BioTouchPass: Handwritten Passwords for Touchscreen Biometrics

Ruben Tolosana et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2020)

Article Computer Science, Information Systems

Automated System for Chromosome Karyotyping to Recognize the Most Common Numerical Abnormalities Using Deep Learning

Mona Salem Al-Kharraz et al.

IEEE ACCESS (2020)

Article Engineering, Electrical & Electronic

Touch-Stroke Dynamics Authentication Using Temporal Regression Forest

Shih Yin Ooi et al.

IEEE SIGNAL PROCESSING LETTERS (2019)

Article Computer Science, Information Systems

A novel security scheme for behavioral authentication systems based on keystroke dynamics

Asma Salem et al.

SECURITY AND PRIVACY (2019)

Article Computer Science, Information Systems

Exploring Recurrent Neural Networks for On-Line Handwritten Signature Biometrics

Ruben Tolosana et al.

IEEE ACCESS (2018)

Article Multidisciplinary Sciences

Dynamic Authentication of Smartphone Users Based on Touchscreen Gestures

Shatha J. Alghamdi et al.

ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2018)

Article Computer Science, Information Systems

A survey on touch dynamics authentication in mobile devices

Pin Shen Teh et al.

COMPUTERS & SECURITY (2016)

Article Computer Science, Theory & Methods

Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication

Chao Shen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Artificial Intelligence

Graphical Password-Based User Authentication With Free-Form Doodles

Marcos Martinez-Diaz et al.

IEEE TRANSACTIONS ON HUMAN-MACHINE SYSTEMS (2016)

Proceedings Paper Engineering, Multidisciplinary

Biometric authentication based on touchscreen swipe patterns

Margit Antal et al.

9TH INTERNATIONAL CONFERENCE INTERDISCIPLINARITY IN ENGINEERING, INTER-ENG 2015 (2016)