[1] |
LAI Jianwei, ZHANG Dongsong.ExtendedThumb: A Target Acquisition Approach for One-handed Interaction with Touch-screen Mobile Phones[J]. IEEE Transactions on Human-Machine Systems, 2015, 45(3): 362-370.
|
[2] |
NGUYEN T V, SAE-BAE N, MEMON N. DRAW-A-PIN: Authentication using Finger-drawn PIN on Touch Devices[EB/OL]. .
|
[3] |
ZHAO Kaili, LI Danyi, LI Qiang, et al.Implementation of Identity Authentication Scheme Based on Smart Mobile Cryptographic Module[J]. Netinfo Security, 2017, 17(9): 107-110.
|
|
赵凯利,李丹仪,李强,等. 基于智能移动终端密码模块的身份认证方案实现[J]. 信息网络安全,2017,17(9):107-110.
|
[4] |
PRAMANA M I W, SUHARDI S, KURNIAWAN N B, et al. Keystroke Dynamics for Authentication using Dynamic Time Warping[C]//IEEE. 14th International Joint Conference on Computer Science and Software Engineering, July 12-14, 2017, Nakhon Si Thammarat, Thailand. New Jersey: IEEE, 2017: 1-5.
|
[5] |
MA Guangkai, WU Ligang, WANG Yan. A General Subspace Ensemble Learning Framework via Totally-corrective Boosting and Tensor-based and Local Patch-based Extensions for Gait Recognition[EB/OL]. , 2018-1-22.
|
[6] |
HU Qing, LIU Benyong.Speaker Recognition Algorithm Based on Convolutional Neural Networks[J]. Netinfo Security, 2016, 16(4): 55-60.
|
|
胡青,刘本永. 基于卷积神经网络分类的说话人识别算法[J]. 信息网络安全,2016,16(4):55-60.
|
[7] |
VIVARACHO-PASCUAL C, SIMON-HURTADO A, MANSO-MARTINEZ E, et al.Client Threshold Prediction in Biometric Signature Recognition by Means of Multiple Linear Regression and Its Use for Score Normalization[J]. Elsevier Science Inc, 2016, 55(C): 20-32.
|
[8] |
MUHAMMAD P, DEVI S A. Hand Gesture User Interface for Smart Devices Based on Mems Sensors[EB/OL]. .
|
[9] |
YANG C, HAN D K, KO H. Continuous Hand Gesture Recognition Based on Trajectory Shape Information[EB/OL]. .
|
[10] |
GANESH S M, VIJAYAKUMAR P, DEBORAH L J.A Secure Gesture Based Authentication Scheme to Unlock the Smartphones[C]//IEEE. 2nd International Conference on Recent Trends and Challenges in Computational Models, February 3-4, 2017, Tindivanam, India. New Jersey: IEEE, 2017: 153-158.
|
[11] |
BURIRO A, CRISPO B, DELFRARI F, et al.Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication[C]//IEEE. 2016 IEEE Security and Privacy Workshops, May 22-26, 2016, San Jose, CA, USA. New Jersey: IEEE, 2016: 276-285.
|
[12] |
PANG Yongchun, SUN Ziwen, WANG Yao.Authentication Algorithm of Multi-touch Based on Mobile Touch Sensor[J]. Journal of Computer Applications, 2015, 35(6): 1780-1784.
|
|
庞永春,孙子文,王尧. 基于手机触摸屏传感器多点触摸身份认证算法[J]. 计算机应用,2015,35(6):1780-1784.
|
[13] |
MARTINEZ-DIAZ M, FIERREZ J, GALBALLY J.Graphical Password-based User Authentication with Free-form Doodles[J]. IEEE Transactions on Human-Machine Systems, 2016, 46(4): 607-614.
|
[14] |
KUMAR P, GAUBA H, ROY P P, et al.Coupled HMM-based Multi-sensor Data Fusion for Sign Language Recognition[J]. Pattern Recognition Letters, 2017, 86(C): 1-8.
|
[15] |
SUN Ziwen, LI Hui, JI Zhichegn.Fusion Image Steganalysis Based on Dempster-shafer Evidence Theory[J]. Control and Decision, 2011, 26(8): 1192-1196.
|
|
孙子文,李慧,纪志成. 基于D-S证据理论的融合图像隐写分析[J]. 控制与决策,2011,26(8):1192-1196.
|