-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathpaper.bbl
248 lines (201 loc) · 10.3 KB
/
paper.bbl
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
% Generated by IEEEtranS.bst, version: 1.14 (2015/08/26)
\begin{thebibliography}{10}
\providecommand{\url}[1]{#1}
\csname url@samestyle\endcsname
\providecommand{\newblock}{\relax}
\providecommand{\bibinfo}[2]{#2}
\providecommand{\BIBentrySTDinterwordspacing}{\spaceskip=0pt\relax}
\providecommand{\BIBentryALTinterwordstretchfactor}{4}
\providecommand{\BIBentryALTinterwordspacing}{\spaceskip=\fontdimen2\font plus
\BIBentryALTinterwordstretchfactor\fontdimen3\font minus
\fontdimen4\font\relax}
\providecommand{\BIBforeignlanguage}[2]{{%
\expandafter\ifx\csname l@#1\endcsname\relax
\typeout{** WARNING: IEEEtranS.bst: No hyphenation pattern has been}%
\typeout{** loaded for the language `#1'. Using the pattern for}%
\typeout{** the default language instead.}%
\else
\language=\csname l@#1\endcsname
\fi
#2}}
\providecommand{\BIBdecl}{\relax}
\BIBdecl
\bibitem{lookout-survey}
``Lookout inc.''
\url{https://www.lookout.com/resources/reports/mobilelostand-found/billion-dollar-phone-bill},
2012.
\bibitem{worldwide2016smartphonUsage}
``Number of smartphone users worldwide from 2014 to 2020.''
\url{https://www.statista.com/statistics/330695/number-of-smartphone-users-worldwide/},
2016.
\bibitem{2002NATMonitor}
``2002 nat monitor password survey.'' \url{http://www.outlaw.com/page-3193},
Last visit: 04.09.2006.
\bibitem{hugeSurge2006}
``Huge surge in mobile phone thefts.''
\url{http://news.bbc.co.uk/1/hi/uk/1748258.stm}, Last visit: 04.09.2006.
\bibitem{Acharya2012Impact}
R.~Acharya and M.~Dolan, ``Impact of antisocial and psychopathic traits on
emotional facial expression recognition in alcohol abusers,''
\emph{Personality and Mental Health}, vol.~6, no.~2, p. 126¨C137, 2012.
\bibitem{Arapakis2009Integrating}
I.~Arapakis, Y.~Moshfeghi, H.~Joho, R.~Ren, D.~Hannah, and J.~M. Jose,
``Integrating facial expressions into user profiling for the improvement of a
multimodal recommender system,'' in \emph{IEEE International Conference on
Multimedia and Expo}, 2009, pp. 1440--1443.
\bibitem{Bailador2011Analysis}
G.~Bailador, C.~Sanchez-Avila, J.~Guerra-Casanova, and D.~S.~S. Alberto,
``Analysis of pattern recognition techniques for in-air signature
biometrics,'' \emph{Pattern Recognition}, vol.~44, no. 10-11, pp. 2468--2478,
2011.
\bibitem{Bekele2013Understanding}
E.~Bekele, Z.~Zheng, A.~Swanson, and J.~Crittendon, ``Understanding how
adolescents with autism respond to facial expressions in virtual reality
environments,'' \emph{IEEE Transactions on Visualization \& Computer
Graphics}, vol.~19, no.~4, pp. 711--720, 2013.
\bibitem{Boehm2013SAFE}
A.~Boehm, D.~Chen, M.~Frank, L.~Huang, C.~Kuo, T.~Lolic, I.~Martinovic, and
D.~Song, ``Safe: Secure authentication with face and eyes,'' in
\emph{International Conference on Privacy and Security in Mobile Systems},
2013, pp. 1 -- 8.
\bibitem{Brunelli1995Person}
R.~Brunelli and D.~Falavigna, ``Person identification using multiple cues,''
\emph{Pattern Analysis \& Machine Intelligence IEEE Transactions on},
vol.~17, no.~10, pp. 955--966, 1995.
\bibitem{Chen2005A}
X.~Chen, J.~Tian, Q.~Su, X.~Yang, and F.~Y. Wang, \emph{A Secured Mobile Phone
Based on Embedded Fingerprint Recognition Systems}.\hskip 1em plus 0.5em
minus 0.4em\relax Springer Berlin Heidelberg, 2005.
\bibitem{daugman1993high}
J.~G. Daugman, ``High confidence visual recognition of persons by a test of
statistical independence,'' \emph{IEEE transactions on pattern analysis and
machine intelligence}, vol.~15, no.~11, pp. 1148--1161, 1993.
\bibitem{DeAngeli:2005:PRW:1090412.1090419}
A.~De~Angeli \emph{et~al.}, ``Is a picture really worth a thousand words?
exploring the feasibility of graphical authentication systems,'' \emph{Int.
J. Hum.-Comput. Stud.}, 2005.
\bibitem{de2012touch}
A.~De~Luca \emph{et~al.}, ``Touch me once and {I} know it's you!: implicit
authentication based on touch screen patterns,'' in \emph{CHI '12}.
\bibitem{Du2014Compound}
S.~Du, Y.~Tao, and A.~M. Martinez, ``Compound facial expressions of emotion.''
\emph{Proceedings of the National Academy of Sciences of the United States of
America}, vol. 111, no.~15, pp. 1454--62, 2014.
\bibitem{Ekman1972}
P.~Ekman, W.~V. Friesen, and P.~Ellsworth, ``- emotion in the human face,''
\emph{Emotion in the Human Face}, p. 181¨C187, 1972.
\bibitem{SeetaFace-toolbox-web}
J.~Z. \emph{et al.}, ``{SeetaFace}: Seetaface engine,''
\url{https://github.com/seetaface/SeetaFaceEngine}.
\bibitem{florencio2007}
H.~C. Florencio~D, ``A large-scale stugy of web password habits,'' in
\emph{Proceedings of the 16th international conference on World Wide Web.
ACM}, 2007, pp. 657--666.
\bibitem{Fogel1989Gabor}
I.~Fogel and D.~Sagi, ``Gabor filters as texture discriminator,''
\emph{Biological Cybernetics}, vol.~61, no.~2, pp. 103--113, 1989.
\bibitem{Fridlund1994Human}
A.~J. Fridlund, \emph{Human facial expression: An evolutionary view.}, 1994.
\bibitem{Gribbon2004A}
K.~T. Gribbon and D.~G. Bailey, ``A novel approach to real-time bilinear
interpolation,'' in \emph{IEEE International Workshop on Electronic Design,
Test and Applications, Proceedings. Delta}, 2004, pp. 126--131.
\bibitem{Jafri2009A}
R.~Jafri and H.~R. Arabnia, ``A survey of face recognition techniques,''
\emph{Journal of Information Processing Systems}, vol.~5, no.~2, pp. 41--68,
2009.
\bibitem{Jain1997Feature}
A.~Jain and D.~Zongker, ``Feature selection: evaluation, application, and small
sample performance,'' \emph{IEEE Transactions on Pattern Analysis \& Machine
Intelligence}, vol.~19, no.~2, pp. 153--158, 1997.
\bibitem{Kim1970Architecture}
Y.~Kim, J.~Yoon, S.~Park, and J.~Han, \emph{Architecture for Implementing the
Mobile Government Services in Korea}, 1970.
\bibitem{Kotsia2007Facial}
I.~Kotsia and I.~Pitas, ``Facial expression recognition in image sequences
using geometric deformation features and support vector machines.''
\emph{IEEE Transactions on Image Processing A Publication of the IEEE Signal
Processing Society}, vol.~16, no.~1, pp. 172--87, 2007.
\bibitem{Krizhevsky2012ImageNet}
A.~Krizhevsky, I.~Sutskever, and G.~E. Hinton, ``Imagenet classification with
deep convolutional neural networks,'' \emph{Advances in Neural Information
Processing Systems}, vol.~25, no.~2, p. 2012, 2012.
\bibitem{Kwon2014Covert}
T.~Kwon, S.~Shin, and S.~Na, ``Covert attentional shoulder surfing: Human
adversaries are more powerful than expected,'' \emph{Systems Man \&
Cybernetics Systems IEEE Transactions on}, vol.~44, no.~6, pp. 716--727,
2014.
\bibitem{Lebow2009Communication}
I.~Lebow, ``Communication without wires,'' 2009, pp. 63--66.
\bibitem{Matsumoto2013Reading}
D.~Matsumoto, H.~S. Hwang, R.~M. L¨®pez, and M.~. P¨¦rez-Nieto, ``Reading
facial expressions of emotions: Basic research on emotions recognition
improvement,'' \emph{Ansiedad Y Estres}, vol.~19, no.~2, pp. 121--129, 2013.
\bibitem{Phoha2012Hidden}
V.~V. Phoha, S.~Phoha, A.~Ray, S.~S. Joshi, and S.~K. Vuyyuru, ``Hidden markov
model (¡°hmm¡±)-based user authentication using keystroke dynamics,'' 2012.
\bibitem{Pousttchi2004Assessment}
K.~Pousttchi and M.~Schurig, ``Assessment of today's mobile banking
applications from the view of customer requirements.'' in \emph{Hawaii
International Conference on System Sciences-Track}, 2004, pp.
70\,184a--70\,184a.
\bibitem{shoulder}
J.~Rogers, ``Please enter your four-digit pin,'' \emph{Financial Services
Technology}, 2007.
\bibitem{rogers1994biometric}
R.~R. Rogers, ``Biometric identification systems: The science of transaction
facilitation,'' in \emph{SPIE's 1994 International Symposium on Optics,
Imaging, and Instrumentation}.\hskip 1em plus 0.5em minus 0.4em\relax
International Society for Optics and Photonics, 1994, pp. 194--199.
\bibitem{Rose2007Method}
G.~G. Rose, R.~F. Quick, and A.~Gantman, ``Method and apparatus for simplified
audio authentication,'' 2007.
\bibitem{Sae2014Multitouch}
N.~Sae-Bae, N.~Memon, K.~Isbister, and K.~Ahmed, ``Multitouch gesture-based
authentication,'' \emph{IEEE Transactions on Information Forensics \&
Security}, vol.~9, no.~4, pp. 568--582, 2014.
\bibitem{GoldenEye2012Hegde}
K.~P. Shashank~Hegde, ``Goldeneye: a face recognition based authentication
system for smartphone applications,''
\url{http://thegoldeneye.googlecode.com/files/GoldenEye.pdf}.
\bibitem{shukla2014beware}
D.~Shukla \emph{et~al.}, ``Beware, your hands reveal your secrets!'' in
\emph{CCS '14}.
\bibitem{Sluganovic2016Using}
I.~Sluganovic, M.~Roeschlin, K.~B. Rasmussen, and I.~Martinovic, ``Using
reflexive eye movements for fast challenge-response authentication,'' in
\emph{ACM Sigsac Conference}, 2016.
\bibitem{Song2016EyeVeri}
C.~Song, A.~Wang, K.~Ren, and W.~Xu, ``Eyeveri: A secure and usable approach
for smartphone user authentication,'' in \emph{IEEE INFOCOM 2016 - IEEE
Conference on Computer Communications}, 2016, pp. 1--9.
\bibitem{Su2005A}
Q.~Su, J.~Tian, X.~Chen, and X.~Yang, \emph{A Fingerprint Authentication System
Based on Mobile Phone}.\hskip 1em plus 0.5em minus 0.4em\relax Springer
Berlin Heidelberg, 2005.
\bibitem{Wang2016Gait}
W.~Wang, A.~X. Liu, and M.~Shahzad, ``Gait recognition using wifi signals,'' in
\emph{ACM International Joint Conference on Pervasive and Ubiquitous
Computing}, 2016, pp. 363--373.
\bibitem{Wu2016Funnel}
S.~Wu, M.~Kan, Z.~He, S.~Shan, and X.~Chen, ``Funnel-structured cascade for
multi-view face detection with alignment-awareness,'' \emph{Neurocomputing},
2016.
\bibitem{Xu2016VirtualU}
Y.~Xu, T.~Price, J.~M. Frahm, and F.~Monrose, ``Virtual u: Defeating face
liveness detection by building virtual models from your public photos,'' in
\emph{25th USENIX Security Symposium (USENIX Security 16). USENIX
Association}, 2016, pp. 497--512.
\bibitem{yue2014blind}
Q.~Yue \emph{et~al.}, ``Blind recognition of touched keys: Attack and
countermeasures,'' \emph{arXiv preprint arXiv:1403.4829}, 2014.
\bibitem{Zahid2009Keystroke}
S.~Zahid, M.~Shahzad, S.~A. Khayam, and M.~Farooq, ``Keystroke-based user
identification on smart phones,'' in \emph{Recent Advances in Intrusion
Detection, International Symposium, RAID 2009, Saint-Malo, France, September
23-25, 2009. Proceedings}, 2009, pp. 224--243.
\bibitem{Zhang2014Coarse}
J.~Zhang, S.~Shan, M.~Kan, and X.~Chen, \emph{Coarse-to-Fine Auto-Encoder
Networks (CFAN) for Real-Time Face Alignment}.\hskip 1em plus 0.5em minus
0.4em\relax Springer International Publishing, 2014.
\end{thebibliography}