1 |
PATEL V M, CHELLAPPA R, CHANDRA D, et al. Continuous user authentication on mobile devices: recent progress and remaining challenges[J]. IEEE Signal Processing Magazine, 2016, 33(4): 49‑61.
|
2 |
ABUHAMAD M, ABUSNAINA A, NYANG D H, et al. Sensor-based continuous authentication of smartphones' users using behavioral biometrics: a survey[J]. IEEE Internet of Things Journal, 2020, 8(1): 65‑84.
|
3 |
徐国愚,苗许娜,张俊峰,等.面向移动终端的隐式身份认证机制综述[J].计算机工程与应用, 2018, 54(6): 19‑25.
|
|
XU Guoyu, MIAO Xuna, ZHANG Junfeng, et al. Review of implicit authentication for mobile devices[J]. Computer Engineering and Applications, 2018, 54(06): 19‑25.
|
4 |
FRANK M, BIEDERT R, MA E, et al. Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication[J]. IEEE Transactions on Information Forensics and Security, 2012, 8(1): 136 ‑148.
|
5 |
FIERREZ J, POZO A, MARTINEZ-DIAZ M, et al. Benchmarking touchscreen biometrics for mobile authentication[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(11): 2720‑2733.
|
6 |
SHEN C, LI Y, CHEN Y, et al. Performance analysis of multi-motion sensor behavior for active smartphone authentication[J]. IEEE Transactions on Information Forensics and Security, 2017, 13(1): 48‑62.
|
7 |
SITOVÁ Z, ŠEDĚNKA J, YANG Q, et al. HMOG: new behavioral biometric features for continuous authentication of smartphone users[J]. IEEE Transactions on Information Forensics & Security, 2016, 11(5): 877‑892.
|
8 |
CHENG B, ZHANG L, LI X Y, et al. SilentSense: silent user identification via touch and movement behavioral biometrics[C]//Proceedings of the 19th Annual International Conference on Mobile Computing Networking MobiCom. New York: Association for Computing Machinery, 2013: 187‑190.
|
9 |
LEE W, LEE R B. Multi-sensor authentication to improve smartphone security[C]//2015 International Conference on Information Systems Security and Privacy. France: IEEE, 2015: 1‑11.
|
10 |
ROSS A, POH N. Multibiometric Systems: Overview, Case Studies and Open Issues[M]. Germany: Springer, 2014: 273‑192.
|
11 |
PHOHA V V, SERWADDA A. When kids'toys breach mobile phone security[C]//Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. Berlin: Association for Computing Machinery, 2013: 559‑610.
|
12 |
EBERZ S, LOVISOTTO G, PATANÈ A, et al. When your fitness tracker betrays you: quantifying the predictability of biometric features across contexts[C]//2018 IEEE Symposium on Security and Privacy. San Francisco: IEEE, 2018: 889‑905.
|
13 |
NAMBIAR A, BERNARDINO A, NASCIMENTO J C, et al. Context-aware person re-identification in the wild via fusion of gait and anthropometric features[C]//IEEE International Conference on Automatic Face & Gesture Recognition. Washington: IEEE, 2017: 973‑980.
|
14 |
SANDIP K, VIJAY K, et al. Multibiometric fusion strategy and its applications: A review[J]. Information Fusion, 2019, 49(1566-2535): 174‑204.
|
15 |
FRIDMAN L, WEBER S, GREENSTADT R, et al. Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location[J]. IEEE Systems Journal, 2017, 11(2): 513‑521.
|
16 |
MAHBUB U, KOMULAINEN J, FERREIRA D, et al. Continuous authentication of smartphones based on application usage[J]. IEEE Transactions on Biometrics, Behavior, and Identity Science, 2019, 1(3): 165‑180.
|
17 |
SHEMA A, ACUNA D E. Show me your APP usage and I will tell who your close friends are: predicting user's context from simple cellphone activity[C]//CHI Conference Extended Abstracts on Human Factors in Computing Systems. Denver Colorado: Association for Computing Machinery, 2017: 2929‑2935.
|
18 |
CRANSHAW J, TOCH E, HONG J I, et al. Bridging the gap between physical location and online social networks[C]//Ubiquitous Computing, 12th International Conference. Copenhagen: Social Science Research Network, 2010: 26 ‑29.
|
19 |
STANLEY F C, JOSHUA G. An empirical study of smoothing techniques for language modeling[J]. Computer Speech & Language, 1999, 13(4): 359‑394.
|
20 |
QING Y, GE P, DAVID T, et al. A multimodal data set for evaluating continuous authentication performance in smartphones[C]//Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems. New York: Association for Computing Machinery, 2014: 358‑359.
|