Mouse dynamics behavioral biometrics: A survey

S Khan, C Devlen, M Manno, D Hou - ACM Computing Surveys, 2024 - dl.acm.org
Utilization of the Internet in our everyday lives has made us vulnerable in terms of privacy
and security of our data and systems. Therefore, there is a pressing need to protect our data …

Examining the current status and emerging trends in continuous authentication technologies through citation network analysis

JJ Jeong, Y Zolotavkin, R Doss - ACM Computing Surveys, 2022 - dl.acm.org
Continuous Authentication (CA) technologies enable users to be authenticated beyond just
the point of entry. In this article, we conduct a comprehensive review of over 2,300 articles to …

Integrating Gaze and Mouse Via Joint Cross-Attention Fusion Net for Students' Activity Recognition in E-learning

R Zhu, L Shi, Y Song, ZM Cai - Proceedings of the ACM on Interactive …, 2023 - dl.acm.org
E-learning has emerged as an indispensable educational mode in the post-epidemic era.
However, this mode makes it difficult for students to stay engaged in learning without …

Keystroke dynamics: Concepts, techniques, and applications

R Shadman, AA Wahab, M Manno… - ar**_Data_Augmentation_Using_Generative_Adversarial_Networks_for_Smartphone_User_Authentication/links/60e2cbeb299bf1ea9ee12a80/SwipeGAN-Swi**-Data-Augmentation-Using-Generative-Adversarial-Networks-for-Smartphone-User-Authentication.pdf" data-clk="hl=en&sa=T&oi=gga&ct=gga&cd=4&d=6970574315024548442&ei=sqy3Z4jbAvqu6rQPwfe6yQ4" data-clk-atid="WgKAZ2h0vGAJ" target="_blank">[PDF] researchgate.net

SWIPEGAN: swi** data augmentation using generative adversarial networks for smartphone user authentication

A Buriro, F Ricci, B Crispo - Proceedings of the 3rd ACM workshop on …, 2021 - dl.acm.org
Behavioral biometric-based smartphone user authentication schemes based on touch/swipe
have shown to provide the desired usability. However, their accuracy is not yet considered …

Artificial intelligence meets kinesthetic intelligence: Mouse-based user authentication based on hybrid human-machine learning

S Fu, D Qin, G Amariucai, D Qiao, Y Guan… - … of the 2022 ACM on Asia …, 2022 - dl.acm.org
Current mainstream biometric user authentication approaches are based on passive
measurements of the subject's characteristics, and usually come with less-than-satisfactory …

Mindmetrics: Identifying users without their login IDs

J Jo, Y Kim, S Lee - … on Systems, Man, and Cybernetics (SMC), 2014 - ieeexplore.ieee.org
Authentication to a computing system is composed of two parts, identification and
verification. Traditionally, login IDs have been used for identification and passwords for …

Is Crowdsourcing a Puppet Show? Detecting a New Type of Fraud in Online Platforms

S Wang, IJ Jui, J Thorpe - Proceedings of the New Security Paradigms …, 2024 - dl.acm.org
Crowdsourcing platforms such as Amazon Mechanical Turk (MTurk) are important tools for
researchers seeking to conduct studies with a broad, global participant base. Despite their …

Detecting and Analyzing Mouse Tracking in the Wild

M Urpí-Bricollé, I Castell-Uroz… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
Nowadays, most websites collect personal information about their users in order to identify
them and personalize their services. Among the tools used to that end, fingerprinting is one …

User Authentication and Identity Inconsistency Detection via Mouse-trajectory Similarity Measurement

R **, Y Liao, P Zhou - arxiv preprint arxiv:2312.10273, 2023 - arxiv.org
Completely Automated Public Turing Test To Tell Computers and Humans Apart
(CAPTCHA) is a type of challenge-response test widely used in authentication systems. A …