咨询与建议

限定检索结果

文献类型

  • 9 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 6 篇 计算机科学与技术...
    • 4 篇 软件工程
    • 2 篇 信息与通信工程
    • 1 篇 电气工程
    • 1 篇 控制科学与工程
    • 1 篇 网络空间安全
  • 3 篇 理学
    • 1 篇 数学
    • 1 篇 物理学
    • 1 篇 大气科学
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...

主题

  • 1 篇 channel state in...
  • 1 篇 public key crypt...
  • 1 篇 big data
  • 1 篇 software archite...
  • 1 篇 large dataset
  • 1 篇 touch biometrics
  • 1 篇 education
  • 1 篇 fog
  • 1 篇 computational mo...
  • 1 篇 requirements eng...
  • 1 篇 smart contract
  • 1 篇 smartphone
  • 1 篇 continuous authe...
  • 1 篇 clustering algor...
  • 1 篇 text mining

机构

  • 2 篇 school of big da...
  • 2 篇 college of compu...
  • 1 篇 dept. of softwar...
  • 1 篇 compugroup medic...
  • 1 篇 dept. of compute...
  • 1 篇 dept. of enginee...
  • 1 篇 school of big da...
  • 1 篇 chizhou universi...
  • 1 篇 inernational isl...
  • 1 篇 big data researc...
  • 1 篇 big data researc...
  • 1 篇 dept. of electro...
  • 1 篇 shenzhen key lab...
  • 1 篇 international is...
  • 1 篇 providence unive...
  • 1 篇 dept. global ins...
  • 1 篇 school of comput...
  • 1 篇 software archite...
  • 1 篇 school of info. ...
  • 1 篇 the hong kong po...

作者

  • 2 篇 li xiuhua
  • 2 篇 leung victor c.m...
  • 1 篇 xiuhua li
  • 1 篇 wu xiongwei
  • 1 篇 sajjad syed hase...
  • 1 篇 lehnhardt jan
  • 1 篇 sheng zhengguo
  • 1 篇 syed haseeb sajj...
  • 1 篇 li qiang
  • 1 篇 wang xiaofei
  • 1 篇 qilin fan
  • 1 篇 yujing guan
  • 1 篇 liang wei
  • 1 篇 victor c. m. leu...
  • 1 篇 renjie yu
  • 1 篇 yu renjie
  • 1 篇 shitong cheng
  • 1 篇 spalka adrian
  • 1 篇 rashid ahmad
  • 1 篇 minerva roberto

语言

  • 10 篇 英文
  • 1 篇 其他
检索条件"机构=Software Architecture and Big Data dept. of Computer Science"
11 条 记 录,以下是11-20 订阅
排序:
Towards continuous and passive authentication via touch biometrics: an experimental study on smartphones  14
Towards continuous and passive authentication via touch biom...
收藏 引用
Proceedings of the Tenth USENIX Conference on Usable Privacy and Security
作者: Hui Xu Yangfan Zhou Michael R. Lyu Shenzhen Key Laboratory of Rich Media Big Data Analytics and Applications Shenzhen Research Institute The Chinese University of Hong Kong Shenzhen Key Laboratory of Rich Media Big Data Analytics and Applications Shenzhen Research Institute The Chinese University of Hong Kong and MoE Key Laboratory of High Confidence Software Technologies (CUHK Sub-Lab) Shenzhen Key Laboratory of Rich Media Big Data Analytics and Applications Shenzhen Research Institute The Chinese University of Hong Kong and Dept. of Computer Science & Engineering The Chinese University of Hong Kong
Current smartphones generally cannot continuously authenticate users during runtime. This poses severe security and privacy threats: A malicious user can manipulate the phone if bypassing the screen lock. To solve thi... 详细信息
来源: 评论