共 25 条
[1]
Abramson M., 2013, AAAIFall Symposium Series
[3]
Baynath P., 2016, P INT C COMM COMP SC
[4]
Bhattasali T., 2016, P ICNAAM, V1738
[5]
Bhattasali T., 2014, J. Med. Inform. Technol., V23, P131
[6]
U-Stroke Pattern Modeling for End User Identity Verification Through Ubiquitous Input Device
[J].
COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT,
2015, 9339
:219-230
[7]
Bhattasali T, 2014, 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P380, DOI 10.1109/ICACCI.2014.6968594
[8]
Deep Neural Networks Applied to User Recognition Based on Keystroke Dynamics: Learning from Raw Data
[J].
PROCEEDINGS OF THE XV BRAZILIAN SYMPOSIUM ON INFORMATION SYSTEMS, SBSI 2019: Complexity on Modern Information Systems,
2019,
[9]
Du Y, 2015, PROC CVPR IEEE, P1110, DOI 10.1109/CVPR.2015.7298714
[10]
Feng T., 2013, P IEEE INT C BIOM TH, P451