共 82 条
[1]
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[3]
Al-Naffakh N., 2018, Trust Management XII. IFIPTM., P15, DOI [10.1007/978-3-319-95276-5_2, DOI 10.1007/978-3-319-95276-5_2]
[6]
DeepAuth: A Framework for Continuous User Re-authentication in Mobile Apps
[J].
CIKM'18: PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT,
2018,
:2027-2035
[7]
Anguita D., 2013, Esann, P437
[8]
[Anonymous], 2009, SIGKDD Explorations, DOI [10.1145/1656274.1656278, DOI 10.1145/1656274.1656278]
[9]
[Anonymous], 2015, Adv. Sci. Technol. Lett
[10]
BenAbdelkader C, 2002, INT C PATT RECOG, P377, DOI 10.1109/ICPR.2002.1047474