Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The role of eye gaze in security and privacy applications: Survey and future HCI research directions
For the past 20 years, researchers have investigated the use of eye tracking in security
applications. We present a holistic view on gaze-based security applications. In particular …
applications. We present a holistic view on gaze-based security applications. In particular …
Reducing shoulder-surfing by using gaze-based password entry
Shoulder-surfing--using direct observation techniques, such as looking over someone's
shoulder, to get passwords, PINs and other sensitive personal information--is a problem that …
shoulder, to get passwords, PINs and other sensitive personal information--is a problem that …
Gaze-based interaction: A 30 year retrospective
AT Duchowski - Computers & Graphics, 2018 - Elsevier
Gaze-based interaction is reviewed, categorized within a taxonomy that splits interaction into
four forms, namely diagnostic (off-line measurement), active (selection, look to shoot) …
four forms, namely diagnostic (off-line measurement), active (selection, look to shoot) …
Increasing the security of gaze-based cued-recall graphical passwords using saliency masks
With computers being used ever more ubiquitously in situations where privacy is important,
secure user authentication is a central requirement. Gaze-based graphical passwords are a …
secure user authentication is a central requirement. Gaze-based graphical passwords are a …
A systematic review of graphical password methods resistant to shoulder-surfing attacks
Graphical passwords have emerged as an alternative to traditional alphanumeric
passwords, offering potentially better memorability. However, they are often vulnerable to …
passwords, offering potentially better memorability. However, they are often vulnerable to …
TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems
T Kwon, S Na - computers & security, 2014 - Elsevier
A pattern lock system is a widely used graphical password mechanism in today's mobile
computing environment. To unlock a smartphone, a user draws a memorized graphical …
computing environment. To unlock a smartphone, a user draws a memorized graphical …
Gazepair: Efficient pairing of augmented reality devices using gaze tracking
As Augmented Reality (AR) devices become more prevalent and commercially viable, the
need for quick, efficient, and secure schemes for pairing these devices has become more …
need for quick, efficient, and secure schemes for pairing these devices has become more …
Real-time continuous iris recognition for authentication using an eye tracker
The majority of today's authentication systems, including password and fingerprint scanners,
are based on one-time, static authentication methods. A continuous, real-time authentication …
are based on one-time, static authentication methods. A continuous, real-time authentication …
Gaze-based password authentication through automatic clustering of gaze points
Researchers have proposed systems in which users utilize an eye tracker to enter
passwords by merely looking at the proper symbols on the computer monitor in the …
passwords by merely looking at the proper symbols on the computer monitor in the …
A gaze gesture-based user authentication system to counter shoulder-surfing attacks
Shoulder-surfing is the act of spying on an authorized user of a computer system with the
malicious intent of gaining unauthorized access. Current solutions to address shoulder …
malicious intent of gaining unauthorized access. Current solutions to address shoulder …