共 186 条
[21]
Bhatt S., 2013, Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME), P17, DOI 10.1109/ICPRIME.2013.6496441
[22]
Offline Signature Verification Using Pixel Matching Technique
[J].
FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013,
2013, 10
:970-977
[23]
A framework for developing mobile, context-aware applications
[J].
SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS,
2004,
:361-365
[24]
Blanco-Gonzalo R., 2016, P 2016 IEEE INT CARN, P1
[25]
Buchoux A., 2008, AUSTR INFORM SECURIT, P48
[26]
DIALERAUTH: A Motion-assisted Touch-based Smartphone User Authentication Scheme
[J].
PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18),
2018,
:267-276
[27]
Cai Liang., 2012, Proceedings of the 5th international conference on Trust and Trustworthy Computing, TRUST'12, P273
[28]
Mobile Based Continuous Authentication Using Deep Features
[J].
PROCEEDINGS OF THE 2018 INTERNATIONAL WORKSHOP ON EMBEDDED AND MOBILE DEEP LEARNING (EMDL '18),
2018,
:19-24
[29]
Chien-Cheng Lin, 2012, Proceedings of the 2012 IEEE Sixth International Conference on Software Security and Reliability (SERE 2012), P245, DOI 10.1109/SERE.2012.37