Deep learning for procedural content generation

J Liu, S Snodgrass, A Khalifa, S Risi… - Neural Computing and …, 2021 - Springer
Procedural content generation in video games has a long history. Existing procedural
content generation methods, such as search-based, solver-based, rule-based and grammar …

Behavioral biometrics for continuous authentication in the internet-of-things era: An artificial intelligence perspective

Y Liang, S Samtani, B Guo, Z Yu - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
In the Internet-of-Things (IoT) era, user authentication is essential to ensure the security of
connected devices and the customization of passive services. However, conventional …

[图书][B] Handbook of fingerprint recognition

D Maltoni, D Maio, AK Jain, S Prabhakar - 2009 - Springer
Biometric recognition, or simply biometrics, refers to the use of distinctive anatomical and/or
behavioral characteristics or identifiers (eg, fingerprints, face, iris, voice, and hand geometry) …

Fingerprint spoof buster: Use of minutiae-centered patches

T Chugh, K Cao, AK Jain - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
The primary purpose of a fingerprint recognition system is to ensure a reliable and accurate
user authentication, but the security of the recognition system itself can be jeopardized by …

Deepmasterprints: Generating masterprints for dictionary attacks via latent variable evolution

P Bontrager, A Roy, J Togelius… - 2018 IEEE 9th …, 2018 - ieeexplore.ieee.org
Recent research has demonstrated the vulnerability of fingerprint recognition systems to
dictionary attacks based on MasterPrints. MasterPrints are real or synthetic fingerprints that …

EarEcho: Using ear canal echo for wearable authentication

Y Gao, W Wang, VV Phoha, W Sun, Z Jin - Proceedings of the ACM on …, 2019 - dl.acm.org
Smart wearable devices have recently become one of the major technological trends and
been widely adopted by the general public. Wireless earphones, in particular, have seen a …

Fingerprint classification and identification algorithms for criminal investigation: A survey

KN Win, K Li, J Chen, PF Viger, K Li - Future Generation Computer Systems, 2020 - Elsevier
Fingerprint plays a fundamental role in community security and criminal investigation, such
as forensic investigation, law enforcement, customs access and public security organs. This …

A survey on gait recognition

C Wan, L Wang, VV Phoha - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Recognizing people by their gait has become more and more popular nowadays due to the
following reasons. First, gait recognition can work well remotely. Second, gait recognition …

A survey on smartphone user's security choices, awareness and education

F Breitinger, R Tully-Doyle, C Hassenfeldt - Computers & Security, 2020 - Elsevier
Smartphones contain a significant amount of personal data. Additionally, they are always in
the user's possession, which allows them to be abused for tracking (eg, GPS, Bluetooth or …

The attacker's perspective on automatic speaker verification: An overview

RK Das, X Tian, T Kinnunen, H Li - arXiv preprint arXiv:2004.08849, 2020 - arxiv.org
Security of automatic speaker verification (ASV) systems is compromised by various
spoofing attacks. While many types of non-proactive attacks (and their defenses) have been …