Deep learning for biometrics: A survey

K Sundararajan, DL Woodard - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
In the recent past, deep learning methods have demonstrated remarkable success for
supervised learning tasks in multiple domains including computer vision, natural language …

A survey of intrusion detection techniques for cyber-physical systems

R Mitchell, IR Chen - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Pervasive healthcare systems, smart grids, and unmanned aircraft systems are examples of
Cyber-Physical Systems (CPSs) that have become highly integrated in the modern world. As …

HMOG: New behavioral biometric features for continuous authentication of smartphone users

Z Sitová, J Šeděnka, Q Yang, G Peng… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
We introduce hand movement, orientation, and grasp (HMOG), a set of behavioral features
to continuously authenticate smartphone users. HMOG features unobtrusively capture subtle …

Mole: Motion leaks through smartwatch sensors

H Wang, TTT Lai, R Roy Choudhury - Proceedings of the 21st annual …, 2015 - dl.acm.org
Imagine a user typing on a laptop keyboard while wearing a smart watch. This paper asks
whether motion sensors from the watch can leak information about what the user is typing …

[PDF][PDF] Biometric authentication and identification using keystroke dynamics: A survey

SP Banerjee, DL Woodard - Journal of Pattern recognition research, 2012 - Citeseer
Dependence on computers to store and process sensitive information has made it
necessary to secure them from intruders. A behavioral biometric such as keystroke dynamics …

A survey of keystroke dynamics biometrics

PS Teh, ABJ Teoh, S Yue - The Scientific World Journal, 2013 - Wiley Online Library
Research on keystroke dynamics biometrics has been increasing, especially in the last
decade. The main motivation behind this effort is due to the fact that keystroke dynamics …

Cluster analysis: A modern statistical review

A Jaeger, D Banks - Wiley Interdisciplinary Reviews …, 2023 - Wiley Online Library
Cluster analysis is a big, sprawling field. This review paper cannot hope to fully survey the
territory. Instead, it focuses on hierarchical agglomerative clustering, k‐means clustering …

[PDF][PDF] AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable.

S Dey, N Roy, W Xu, RR Choudhury, S Nelakuditi - NDSS, 2014 - Citeseer
As mobile begins to overtake the fixed Internet access, ad networks have aggressively
sought methods to track users on their mobile devices. While existing countermeasures and …

Methods, systems, and media for detecting covert malware

BM Bowen, PV Prabhu, VP Kemerlis… - US Patent …, 2013 - Google Patents
Methods, systems, and media for detecting covert malware are provided. In accordance with
some embodiments, a method for detecting covert malware in a computing environ ment is …

You are how you touch: User verification on smartphones via tapping behaviors

N Zheng, K Bai, H Huang… - 2014 IEEE 22nd …, 2014 - ieeexplore.ieee.org
Smartphone users have their own unique behavioral patterns when tapping on the touch
screens. These personal patterns are reflected on the different rhythm, strength, and angle …