[1] KARANIKIOTIS T, PAPAMICHAIL M D.Continuous implicit authentication through touch traces modelling[C]//Proceedings of the 20th International Conference on Software Quality, Reliability and Security.Washington D.C., USA:IEEE Press, 2020:111-120. [2] EKIZ D, CAN Y S, DARDAGAN Y C, et al.Can a smartband be used for continuous implicit authentication in real life[J].IEEE Access, 2020, 8:59402-59411. [3] KIM Y, OH T, KIM J.Analyzing user awareness of privacy data leak in mobile applications[EB/OL].[2021-03-14].https://www.hindawi.com/journals/misy/2015/369489/. [4] YANG Y Y, HUANG X L, GUO Y H, et al.Dynamic multi-level privilege control in behavior-based implicit authentication systems leveraging mobile devices[C]//Proceedings of the 17th International Conference on Mobile Ad Hoc and Sensor Systems.Washington D.C., USA:IEEE Press, 2020:229-237. [5] GOWRAJ N, AVIREDDY S, RAVI P V, et al.SAFE:shoulder-surfing attack filibustered with ease[C]//Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop.Washington D.C., USA:IEEE Press, 2013:1-7. [6] BALDINI G, STERI G.A survey of techniques for the identification of mobile phones using the physical fingerprints of the built-in components[J].IEEE Communications Surveys & Tutorials, 2017, 19(3):1761-1789. [7] SIMANJUNTAK G D, NUR RAMADHANI K, ARIFIANTO A.Face spoofing detection using color distortion features and principal component analysis[C]//Proceedings of the 7th International Conference on Information and Communication Technology.Washington D.C., USA:IEEE Press, 2019:1-5. [8] PATEL K, HAN H, JAIN A K.Secure face unlock:spoof detection on smartphones[J].IEEE Transactions on Information Forensics and Security, 2016, 11(10):2268-2283. [9] HOSSEINI S.Fingerprint vulnerability:a survey[C]//Proceedings of the 4th International Conference on Web Research.Washington D.C., USA:IEEE Press, 2018:70-77. [10] GALBALLY J, SATTA R.Three-dimensional and two-and-a-half-dimensional face recognition spoofing using three-dimensional printed models[J].IET Biometrics, 2016, 5(2):83-91. [11] 沈超.移动终端交互行为分析的身份主动认证与安全感知[J].中国教育网络, 2016(11):37. SHEN C.Active identity authentication and security perception based on analysis of mobile terminal interactive behavior[J].China Education Network, 2016(11):37.(in Chinese) [12] ABUHAMAD M, ABUSNAINA A, NYANG D, et al.Sensor-based continuous authentication of smartphones' users using behavioral biometrics:a contemporary survey[J].IEEE Internet of Things Journal, 2021, 8(1):65-84. [13] FRANK M, BIEDERT R, MA E, et al.Touchalytics:on the applicability of touchscreen input as a behavioral biometric for continuous authentication[J].IEEE Transactions on Information Forensics and Security, 2013, 8(1):136-148. [14] KANG P, CHO S.Keystroke dynamics-based user authentication using long and free text strings from various input devices[J].Information Sciences, 2015, 308:72-93. [15] GAFUROV D, SNEKKENES E, BOURS P.Gait authentication and identification using wearable accelerometer sensor[C]//Proceedings of 2007 IEEE Workshop on Automatic Identification Advanced Technologies.Washington D.C., USA:IEEE Press, 2007:220-225. [16] WANG Q, LIN X, ZHOU M, et al.VoicePop:a pop noise based anti-spoofing system for voice authentication on smartphones[C]//Proceedings of IEEE Conference on Computer Communications.Washington D.C., USA:IEEE Press, 2019:2062-2070. [17] KHAN H, HENGARTNER U, VOGEL D.Targeted mimicry attacks on touch input based implicit authentication schemes[C]//Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services.New York, USA:ACM Press, 2016:387-398. [18] 刘礼才, 李锐光, 殷丽华, 等.面向移动智能设备的多特征融合隐式鉴别机制研究[J].电子学报, 2016, 44(11):2713-2719. LIU L C, LI R G, YIN L H, et al.Research on multi-feature fusion impact authentication for intelligent mobile device[J].Acta Electronica Sinica, 2016, 44(11):2713-2719.(in Chinese) [19] 庞晓健.基于行为感知的移动终端持续认证研究[D].西安:西安电子科技大学, 2019. PANG X J.Research on continuous authentication of mobile terminals based on behavior-awareness[D].Xi'an:Xidian University, 2019.(in Chinese) [20] MAHBUB U, CHELLAPPA R.PATH:person authentication using trace histories[C]//Proceedings of the 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference.Washington D.C., USA:IEEE Press, 2016:1-8. [21] 刘彬, 戴桂平.基于白化检验和3σ准则的小波阈值去噪算法[J].传感技术学报, 2005, 18(3):473-476. LIU B, DAI G P.Adaptive wavelet thresholding denoising algorithm based on white noise detection and 3σ rule[J].Journal of Transcluction Technology, 2005, 18(3):473-476.(in Chinese) [22] 范雪莉, 冯海泓, 原猛.基于互信息的主成分分析特征选择算法[J].控制与决策, 2013, 28(6):915-919. FAN X L, FENG H H, YUAN M.PCA based on mutual information for feature selection[J].Control and Decision, 2013, 28(6):915-919.(in Chinese) [23] CHAIR Z, VARSHNEY P K.Optimal data fusion in multiple sensor detection systems[J].IEEE Transactions on Aerospace and Electronic Systems, 1986, 22(1):98-101. [24] FRIDMAN L, WEBER S, GREENSTADT R, et al.Active authentication on mobile devices via stylometry, application usage, Web browsing, and GPS location[J].IEEE Systems Journal, 2017, 11(2):513-521. |