Black hole: A new heuristic optimization approach for data clustering

A Hatamlou - Information sciences, 2013 - Elsevier
Nature has always been a source of inspiration. Over the last few decades, it has stimulated
many successful algorithms and computational tools for dealing with complex and …

User identity verification via mouse dynamics

C Feher, Y Elovici, R Moskovitch, L Rokach… - Information Sciences, 2012 - Elsevier
Identity theft is a crime in which hackers perpetrate fraudulent activity under stolen identities
by using credentials, such as passwords and smartcards, unlawfully obtained from …

Biometric template security: an overview

N Riaz, A Riaz, SA Khan - Sensor Review, 2018 - emerald.com
Purpose The security of the stored biometric template is itself a challenge. Feature
transformation techniques and biometric cryptosystems are used to address the concerns …

Using the idea of the sparse representation to perform coarse-to-fine face recognition

Y Xu, Q Zhu, Z Fan, D Zhang, J Mi, Z Lai - Information sciences, 2013 - Elsevier
In this paper, we propose a coarse-to-fine face recognition method. This method consists of
two stages and works in a similar way as the well-known sparse representation method. The …

Keystroke dynamics-based user authentication using long and free text strings from various input devices

P Kang, S Cho - Information Sciences, 2015 - Elsevier
Keystroke dynamics, which refers to the ty** pattern of an individual, has been highlighted
as a practical behavioral biometric feature that does not require any additional recognition …

Keystroke dynamics-based user authentication using freely typed text based on user-adaptive feature extraction and novelty detection

J Kim, H Kim, P Kang - Applied Soft Computing, 2018 - Elsevier
Keystroke dynamics has been used to strengthen password-based user authentication
systems by considering the ty** characteristics of legitimate users. The main problem with …

Freely typed keystroke dynamics-based user authentication for mobile devices based on heterogeneous features

J Kim, P Kang - Pattern Recognition, 2020 - Elsevier
Keystroke dynamics-based authentication (KDA) is one of the human behavioral biometric-
based user authentication methods based on the unique ty** pattern of a person …

Arabic text clustering methods and suggested solutions for theme-based quran clustering: analysis of literature

Q Bsoul, R Abdul Salam, J Atwan… - Journal of Information …, 2021 - koreascience.kr
Text clustering is one of the most commonly used methods for detecting themes or types of
documents. Text clustering is used in many fields, but its effectiveness is still not sufficient to …