Author of the publication

A kind of mouse behavior authentication method on dynamic soft keyboard.

, , , and . SMC, page 211-216. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A kind of mouse behavior authentication method on dynamic soft keyboard., , , and . SMC, page 211-216. IEEE, (2016)Authenticating Web User's Identity through Browsing Sequences Modeling., , and . ICDM Workshops, page 335-342. IEEE Computer Society, (2016)Model construction and authentication algorithm of virtual keystroke dynamics for smart phone users., , , and . SMC, page 171-175. IEEE, (2016)A continuous identity verification method based on free-text keystroke dynamics., , , and . SMC, page 206-210. IEEE, (2016)A Novel Estimate Fitness Method by Measuring A large number of Sub-event Logs Conformance., , and . IEEE Big Data, page 431-436. IEEE, (2022)Mobile behavior trusted certification based on multivariate behavior sequences., and . Neurocomputing, (2021)Decomposition of Petri nets based on the behavior relation matrix., and . ICNC-FSKD, page 508-514. IEEE, (2017)Intelligent UAV Identity Authentication and Safety Supervision Based on Behavior Modeling and Prediction., , , and . IEEE Trans. Ind. Informatics, 16 (10): 6652-6662 (2020)A Dichotomous Repair-Based Load-Balanced Task Allocation Strategy in Cloud-Edge Environment., , , and . CollaborateCom (1), volume 561 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 128-148. Springer, (2023)A Dynamic Data Slice Approach to the Vulnerability Analysis of E-Commerce Systems., , , , and . IEEE Trans. Syst. Man Cybern. Syst., 50 (10): 3598-3612 (2020)