咨询与建议

限定检索结果

文献类型

  • 2 篇 期刊文献

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 电气工程
    • 2 篇 信息与通信工程
    • 2 篇 计算机科学与技术...
    • 1 篇 机械工程
    • 1 篇 控制科学与工程
    • 1 篇 软件工程
    • 1 篇 网络空间安全
  • 1 篇 理学
    • 1 篇 数学
    • 1 篇 系统科学

主题

  • 2 篇 classification
  • 2 篇 behavioral biome...
  • 1 篇 deep learning
  • 1 篇 touch gestures
  • 1 篇 cnn
  • 1 篇 rnn
  • 1 篇 touch authentica...
  • 1 篇 smartphone secur...
  • 1 篇 lstm
  • 1 篇 fraudulent user
  • 1 篇 machine learning

机构

  • 1 篇 department of co...
  • 1 篇 computer science...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of in...
  • 1 篇 electrical engin...

作者

  • 1 篇 abdulaziz alzuba...
  • 1 篇 jugal kalita
  • 1 篇 mai fadel
  • 1 篇 asrar bajaber
  • 1 篇 lamiaa elrefaei
  • 1 篇 swarup roy

语言

  • 2 篇 英文
检索条件"主题词=behavioral biometric"
2 条 记 录,以下是1-10 订阅
排序:
Evaluation of Deep Learning Models for Person Authentication Based on Touch Gesture
收藏 引用
Computer Systems Science & Engineering 2022年 第8期42卷 465-481页
作者: Asrar Bajaber Mai Fadel Lamiaa Elrefaei Computer Science Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Electrical Engineering Department Faculty of Engineering at ShoubraBenha UniversityCairo11629Egypt
Touch gesture biometrics authentication system is the study of user's touching behavior on his touch device to identify *** features traditionally used in touch gesture authentication systems are extracted using hand-... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A data reduction scheme for active authentication of legitimate smartphone owner using informative apps ranking
收藏 引用
Digital Communications and Networks 2019年 第4期5卷 205-213页
作者: Abdulaziz Alzubaidi Swarup Roy Jugal Kalita Department of Computer Science Umm Alqura UniversityAl-Qunfudah28821Saudi Arabia Department of Computer Applications Sikkim UniversityGangtok737102India Department of Information Technology North Eastern Hill UniversityShillong793022India Department of Computer Science University of ColoradoColorado SpringsCO80918USA
Smartphones are vulnerable to fraudulent use despite having strong authentication *** authentication based on behavioral biometrics is a solution to protect the privacy of data in smart ***-based frameworks are effect... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论