Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
User authentication on mobile devices: Approaches, threats and trends
Mobile devices have brought a great convenience to us these years, which allow the users
to enjoy the anytime and anywhere various applications such as the online shop** …
to enjoy the anytime and anywhere various applications such as the online shop** …
A survey on continuous authentication methods in Internet of Things environment
FH Al-Naji, R Zagrouba - Computer Communications, 2020 - Elsevier
IoT environment merges the digital and physical universes and enabling them to
communicate real-time data It is crucial to constantly ensure that the user is not …
communicate real-time data It is crucial to constantly ensure that the user is not …
Performance analysis of multi-motion sensor behavior for active smartphone authentication
The increasing use of smartphones as personal computing platforms to access personal
information has stressed the demand for secure and usable authentication techniques, and …
information has stressed the demand for secure and usable authentication techniques, and …
A survey on behavioral biometric authentication on smartphones
Recent research has shown the possibility of using smartphones' sensors and accessories
to extract some behavioral attributes such as touch dynamics, keystroke dynamics and gait …
to extract some behavioral attributes such as touch dynamics, keystroke dynamics and gait …
TypeNet: Deep learning keystroke biometrics
We study the performance of Long Short-Term Memory networks for keystroke biometric
authentication at large scale in free-text scenarios. For this we explore the performance of …
authentication at large scale in free-text scenarios. For this we explore the performance of …
Machine and deep learning applications to mouse dynamics for continuous user authentication
Static authentication methods, like passwords, grow increasingly weak with advancements
in technology and attack strategies. Continuous authentication has been proposed as a …
in technology and attack strategies. Continuous authentication has been proposed as a …
Authentication and authorization for mobile IoT devices using biofeatures: Recent advances and future trends
Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the
purpose of this investigation is to summarise the factors that hinder biometrics models' …
purpose of this investigation is to summarise the factors that hinder biometrics models' …
A survey of human-computer interaction (HCI) & natural habits-based behavioural biometric modalities for user recognition schemes
The proliferation of Internet of Things (IoT) systems is having a profound impact across all
aspects of life. Recognising and identifying particular users is central to delivering the …
aspects of life. Recognising and identifying particular users is central to delivering the …
Multi-touch authentication using hand geometry and behavioral information
In this paper we present a simple and reliable authentication method for mobile devices
equipped with multi-touch screens such as smart phones, tablets and laptops. Users are …
equipped with multi-touch screens such as smart phones, tablets and laptops. Users are …
Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities
The advancement in the computational capability and storage size of a modern mobile
device has evolved it into a multi-purpose smart device for individual and business needs …
device has evolved it into a multi-purpose smart device for individual and business needs …