Deep learning for procedural content generation
Procedural content generation in video games has a long history. Existing procedural
content generation methods, such as search-based, solver-based, rule-based and grammar …
content generation methods, such as search-based, solver-based, rule-based and grammar …
Behavioral biometrics for continuous authentication in the internet-of-things era: An artificial intelligence perspective
In the Internet-of-Things (IoT) era, user authentication is essential to ensure the security of
connected devices and the customization of passive services. However, conventional …
connected devices and the customization of passive services. However, conventional …
[图书][B] Handbook of fingerprint recognition
Biometric recognition, or simply biometrics, refers to the use of distinctive anatomical and/or
behavioral characteristics or identifiers (eg, fingerprints, face, iris, voice, and hand geometry) …
behavioral characteristics or identifiers (eg, fingerprints, face, iris, voice, and hand geometry) …
Fingerprint spoof buster: Use of minutiae-centered patches
The primary purpose of a fingerprint recognition system is to ensure a reliable and accurate
user authentication, but the security of the recognition system itself can be jeopardized by …
user authentication, but the security of the recognition system itself can be jeopardized by …
Deepmasterprints: Generating masterprints for dictionary attacks via latent variable evolution
Recent research has demonstrated the vulnerability of fingerprint recognition systems to
dictionary attacks based on MasterPrints. MasterPrints are real or synthetic fingerprints that …
dictionary attacks based on MasterPrints. MasterPrints are real or synthetic fingerprints that …
EarEcho: Using ear canal echo for wearable authentication
Smart wearable devices have recently become one of the major technological trends and
been widely adopted by the general public. Wireless earphones, in particular, have seen a …
been widely adopted by the general public. Wireless earphones, in particular, have seen a …
Fingerprint classification and identification algorithms for criminal investigation: A survey
Fingerprint plays a fundamental role in community security and criminal investigation, such
as forensic investigation, law enforcement, customs access and public security organs. This …
as forensic investigation, law enforcement, customs access and public security organs. This …
A survey on gait recognition
C Wan, L Wang, VV Phoha - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Recognizing people by their gait has become more and more popular nowadays due to the
following reasons. First, gait recognition can work well remotely. Second, gait recognition …
following reasons. First, gait recognition can work well remotely. Second, gait recognition …
A survey on smartphone user's security choices, awareness and education
F Breitinger, R Tully-Doyle, C Hassenfeldt - Computers & Security, 2020 - Elsevier
Smartphones contain a significant amount of personal data. Additionally, they are always in
the user's possession, which allows them to be abused for tracking (eg, GPS, Bluetooth or …
the user's possession, which allows them to be abused for tracking (eg, GPS, Bluetooth or …
The attacker's perspective on automatic speaker verification: An overview
Security of automatic speaker verification (ASV) systems is compromised by various
spoofing attacks. While many types of non-proactive attacks (and their defenses) have been …
spoofing attacks. While many types of non-proactive attacks (and their defenses) have been …