Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A review of emotion recognition methods based on keystroke dynamics and mouse movements
A Kołakowska - 2013 6th international conference on human …, 2013 - ieeexplore.ieee.org
The paper describes the approach based on using standard input devices, such as
keyboard and mouse, as sources of data for the recognition of users' emotional states. A …
keyboard and mouse, as sources of data for the recognition of users' emotional states. A …
Mouse dynamics behavioral biometrics: A survey
Utilization of the Internet in our everyday lives has made us vulnerable in terms of privacy
and security of our data and systems. Therefore, there is a pressing need to protect our data …
and security of our data and systems. Therefore, there is a pressing need to protect our data …
Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication
We investigate whether a classifier can continuously authenticate users based on the way
they interact with the touchscreen of a smart phone. We propose a set of 30 behavioral touch …
they interact with the touchscreen of a smart phone. We propose a set of 30 behavioral touch …
[PDF][PDF] Unobservable re-authentication for smartphones.
The widespread usage of smartphones gives rise to new security and privacy concerns.
Smartphones are becoming a personal entrance to networks, and may store private …
Smartphones are becoming a personal entrance to networks, and may store private …
A new biometric technology based on mouse dynamics
In this paper, we introduce a new form of behavioral biometrics based on mouse dynamics,
which can be used in different security applications. We develop a technique that can be …
which can be used in different security applications. We develop a technique that can be …
An efficient user verification system via mouse movements
N Zheng, A Paloski, H Wang - Proceedings of the 18th ACM conference …, 2011 - dl.acm.org
Biometric authentication verifies a user based on its inherent, unique characteristics---who
you are. In addition to physiological biometrics, behavioral biometrics has proven very useful …
you are. In addition to physiological biometrics, behavioral biometrics has proven very useful …
Behavioural biometrics: a survey and classification
This study is a survey and classification of the state-of-the-art in behavioural biometrics
which is based on skills, style, preference, knowledge, motor-skills or strategy used by …
which is based on skills, style, preference, knowledge, motor-skills or strategy used by …
Warning, bias may occur: A proposed approach to detecting cognitive bias in interactive visual analytics
Visual analytic tools combine the complementary strengths of humans and machines in
human-in-the-loop systems. Humans provide invaluable domain expertise and …
human-in-the-loop systems. Humans provide invaluable domain expertise and …
Under pressure: sensing stress of computer users
Recognizing when computer users are stressed can help reduce their frustration and
prevent a large variety of negative health conditions associated with chronic stress …
prevent a large variety of negative health conditions associated with chronic stress …
User identification and authentication using multi-modal behavioral biometrics
KO Bailey, JS Okolica, GL Peterson - Computers & Security, 2014 - Elsevier
Biometric computer authentication has an advantage over password and access card
authentication in that it is based on something you are, which is not easily copied or stolen …
authentication in that it is based on something you are, which is not easily copied or stolen …