Computer Science ›› 2020, Vol. 47 ›› Issue (11): 19-24.doi: 10.11896/jsjkx.200600004
Special Issue: Intelligent Mobile Authentication
• Intelligent Mobile Authentication • Previous Articles Next Articles
YAO Mu-yan, TAO Dan
CLC Number:
[1] LEE M K.Security notions and advanced method for humanshoulder-surfing resistant PIN-entry [J].IEEE Transactions on Information Forensics and Security,2014,9(4):695-708. [2] SCHNEEGASS S,STEIMLE F,BULLING A,et al.SmudgeSafe:geometric image transformations for smudge-resistant user authentication [C] //Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '14).2014:775-786. [3] HOANG T,NGUYEN T C,LUONG C,et al.Adaptive crossdevice gait recognition using a mobile accelerometer [J].Journalof Information Processing Systems,2013,9(2):333-348. [4] SITOVAZ,SEDENKA J,YANG Q,et al.HMOG:new behavioral biometric features for continuous authentication of smartphone users [J].IEEE Transactions on Information Forensics and Security,2016,11(5):877-892. [5] LIU L C,LI R G,YIN L H,et al.Research on multi-feature fusion impact authentication for intelligent mobile device[J].Acta Electronica Sinica,2016,44(11):2713-2719. [6] KONGJ,GUO Y B,LIU C H,et al.Gait feature identification method based on motion sensor in smartphone[J].Journal of Computer Applications,2019,39(6):1747-1752. [7] XIANG D D,CHEN H G,XIONG J J.Research on identity verification of mobile based on user behavior characteristics [J].Journal of Shanghai Normal University(Natural Sciences),2019,48(2):151-159. [8] WANG R Z,TAO D.Context-aware implicit authentication of smartphone users based on multi-sensor behavior [J].IEEE Access,2019,7:119654-119667. [9] YANG Y F,GUO B,WANG Z,et al.BehaveSense:Continuous authentication for security-sensitive mobile apps using behavioral biometrics [J].Ad Hoc Networks,2019,2019(84):9-18. [10] SUN C,WANG Y,ZHENG J.Dissecting pattern unlock:Theeffect of pattern strength meter on pattern selection [J].Journal of Information Security and Applications,2014,19:4-5. [11] SHI X P,WONG Y D,LI M Z,et al.A feature learning approach based on XGBoost for driving assessment and risk prediction [J].Accident Analysis & Prevention,2019,129:170-179. [12] DONG M G,JIANG Z L,JING C.Multi-class imbalanced learning algorithm based on hellinger distance and smote algorithm[J].Computer Science,2020,47(1):102-109. [13] LIU B Y.Smart phone identity authentication based on gesture recognition [D].Beijing:Beijing Jiaotong University,2018. |
[1] | JIANG Hao-chen, WEI Zi-qi, LIU Lin, CHEN Jun. Imbalanced Data Classification:A Survey and Experiments in Medical Domain [J]. Computer Science, 2022, 49(1): 80-88. |
[2] | WANG Li, CHEN Hong-mei. NKSMOTE Algorithm Based Classification Method for Imbalanced Dataset [J]. Computer Science, 2018, 45(9): 260-265. |
[3] | WANG Jin-wan, MAO Wen-tao, WANG Li-yun and HE Ling. Imbalanced Online Sequential Extreme Learning Machine Based on Principal Curve [J]. Computer Science, 2016, 43(3): 62-67. |
[4] | XU Jun-feng,DING Xue-feng,SI Cheng-xiang and ZHANG Wei. Certificateless Anonymous Authentication Protocol for Vehicle Ad-hoc Network [J]. Computer Science, 2013, 40(9): 152-155. |
[5] | . Secure Vehicle-to-Infrastructure Communication Protocol Based on Certificateless Cryptosystem [J]. Computer Science, 2012, 39(9): 20-23. |
[6] | . [J]. Computer Science, 2007, 34(9): 139-141. |
|