Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Behavioral authentication for security and safety
The issues of both system security and safety can be dissected integrally from the
perspective of behavioral appropriateness. That is, a system that is secure or safe can be …
perspective of behavioral appropriateness. That is, a system that is secure or safe can be …
Assessing preknowledge cheating via innovative measures: A multiple-group analysis of jointly modeling item responses, response times, and visual fixation counts
Many approaches have been proposed to jointly analyze item responses and response
times to understand behavioral differences between normally and aberrantly behaved test …
times to understand behavioral differences between normally and aberrantly behaved test …
Privacy-preserving biometric-driven data for student identity management: Challenges and approaches
Biometric technologies are being considered lately for student identity management in
Higher Education Institutions, as they provide several advantages over the traditional …
Higher Education Institutions, as they provide several advantages over the traditional …
An eye gaze-driven metric for estimating the strength of graphical passwords based on image hotspots
In this paper, we propose an eye gaze-driven metric based on hotspot vs. non-hotspot
segments of images for unobtrusively estimating the strength of user-created graphical …
segments of images for unobtrusively estimating the strength of user-created graphical …
From hot-spots towards experience-spots: Leveraging on users' sociocultural experiences to enhance security in cued-recall graphical authentication
This paper suggests a novel cued-recall-based graphical authentication method, which
leverages on users' sociocultural experiences for improving the security and memorability of …
leverages on users' sociocultural experiences for improving the security and memorability of …
The serums tool-chain: ensuring security and privacy of medical data in smart patient-centric healthcare systems
Future-generation healthcare systems will be highly distributed, combining centralised
hospital systems with decentralised home-, work-and environment-based monitoring and …
hospital systems with decentralised home-, work-and environment-based monitoring and …
A cross-cultural perspective for personalizing picture passwords
Picture passwords, which require users to draw selections on images as their secret
password, typically provide globalized solutions without taking into consideration that …
password, typically provide globalized solutions without taking into consideration that …
Design and development of a patient-centric user authentication system
Advancements in computer and communication technology enabled the rapid growth of e-
health services, which can nowadays provide various electronic methods (eg, obtaining …
health services, which can nowadays provide various electronic methods (eg, obtaining …
“I Recall this Picture”: Understanding Picture Password Selections based on Users' Sociocultural Experiences
Graphical passwords leverage the picture superiority effect to enhance memorability, and
reflect today's haptic user interaction realms. Image content related to users' past …
reflect today's haptic user interaction realms. Image content related to users' past …
Eye gaze and interaction differences of holistic versus analytic users in image-recognition human interaction proof schemes
Abstract Image-recognition Human Interaction Proof (HIP) schemes are widely used security
defense mechanisms that are utilized by service providers to determine whether a human …
defense mechanisms that are utilized by service providers to determine whether a human …