Computer Science ›› 2016, Vol. 43 ›› Issue (2): 148-154.doi: 10.11896/j.issn.1002-137X.2016.02.033
Previous Articles Next Articles
XU Jian, LI Ming-jie, ZHOU Fu-cai and XUE Rui
[1] Wang Yi,Hu Jian-kun.Global Ridge Orientation Modeling for Partial Fingerprint Identification [J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2011,33(1):72-87 [2] Jing Xiao-yuan,Li Sheng,Zhang D,et al.Optimal subset-division based discrimination and its kernelization for face and palmprint recognition[J].Pattern Recognition,2012,45(10):3590-3602 [3] Su Yu,Shan Shi-guang,Chen Xi-lin,et al.[J].Journal of Software,2010,1(8):1849-1862(in Chinese) 苏煜,山世光,陈熙霖,等.基于全局和局部特征集成的人脸识别[J].软件学报,2010,1(8):1849-1862 [4] Nigam A,Gupta P.Iris recognition using consistent corner optical flow [C]∥Proc of 11th Asian Conference on Computer Vision.2012:358-369 [5] Lee P J-W,Choi S-S,Moon P B-R.An evolutionary keystroke authentication based on ellipsoidal hypothesis space [C]∥ Proc of the 9th Annual Conference on Genetic and Evolutionary Computation.2007:2090-2097 [6] Ahmed,TraoreIssa A A.Biometric recognition based on free-text keystroke dynamics [J].IEEE Transactions on Cyberne-tics,2014,44(4):458-472 [7] Ahmed A A E,Traore I.Detecting computer intrusions usingbehavioral biometrics[C]∥ Proc of 3rd Annual Conference on Privacy.Security,2005:91-98 [8] Jorgensen Z,Yu T.On mouse dynamics as a behavioral biome-tric for authentication[C]∥Proc of the 6th ACM Symposium on Information,Computer and Communications Security.2011:476-482 [9] Gamboa H,Fred A L N,Jain A K.Webbiometrics:User verification via web interaction[C]∥ Proc of 2007 Biometrics Symposium.2007:1-6 [10] Pusara M,Brodley C E.User re-authentication via mouse movements[C]∥ Proc of the 2004 ACM workshop on Visualization and data mining for computer security.2004:1-8 [11] Bours P,Fullu C J.A login system using mouse dynamics[C]∥ Proc of 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing.2009:1072-1077 [12] Schulz D A.Mouse curve biometrics[C]∥ Proc of 2006 Biome-trics Symposium.2006:79-83 [13] Ahmed A A E,Traore I.A new biometric technology based on mouse dynamics[J].IEEE Transactions on Dependable and Secure Computing,2007,4(3):165-179 [14] Shen Chao,Cai Zhong-min,Guan Xiao-hong,et al.User authentication and monitoring based on mouse behavioral features[J].Journal on Communications,2010,1(7):68-75(in Chinese) 沈超,蔡忠闽,管晓宏,等.基于鼠标行为特征的用户身份认证与监控[J].通信学报,2010,1(7):68-75 |
No related articles found! |
|