[1] 徐剑, 李明洁, 周福才, 等. 基于用户鼠标行为的身份认证方法[J]. 计算机科学, 2016, 43(2):148-154. Xu Jian, Li Mingjie, Zhou Fucai, et al. Identity authentication method based on user's mouse behavior[J]. Computer Science, 2016, 43(2):148-154. [2] Grother P, Tabassi E. Performance of biometric quality measures[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2007, 29(4):531-543. [3] Malathi R, Jeberson R R R. An integrated approach of physical biometric authentication system[J]. Procedia Computer Science, 2016, 85:820-826. [4] Jain A K, Pankanti S, Prabhakar S, et al. Biometrics:a grand challenge[C]//Proceedings of the 17th International Conference on Pattern Recognition, 2004. Cambridge:IEEE Press, 2004:935-942. [5] Zweig M H, Campbell G. Receiver-operating characteristic (ROC) plots:a fundamental evaluation tool in clinical medicine[J]. Clinical Chemistry, 1993, 39(4):561-577. [6] Shrobe H, Shrier D L, Pentland A. New solutions for cybersecurity[M]. MITP:the MIT Press, 2018. [7] 王任重, 陶丹. 基于上下文感知的智能手机隐式身份认证机制[J]. 北京邮电大学学报, 2019, 42(6):118-125. Wang Renzhong, Tao Dan. Implicit authentication mechanism based on context awareness for smartphone[J]. Journal of Beijing University of Posts and Telecommunications, 2019, 42(6):118-125. [8] Shen Chao, Cai Zhongmin, Liu Xiaomei, et al. Mouse-Identity:modeling mouse-interaction beha-vior for a user verification system[J]. IEEE Transactions on Human-Machine Systems, 2016, 46(5):734-748. [9] Yi Qian, Xiong Shiquan, Wang Biao, et al. Identification of trusted interactive behavior based on mouse beha-vior considering web user's emotions[J]. International Journal of Industrial Ergonomics, 2020, 76:102903. [10] 易树平, 李嘉佳, 易茜. 基于行为流图的可信交互检测方法[J]. 控制与决策, 2020, 35(11):2715-2722. Yi Shuping, Li Jiajia, Yi Qian. Trustworthy interaction detection method based on user behavior flow diagram[J]. Control and Decision, 2020, 35(11):2715-2722. [11] Ho J, Kang D K. One-class naive Bayes with duration feature ranking for accurate user authentication using keystroke dynamics[J]. Applied Intelligence, 2018, 48(6):1547-1564. [12] Pusara M, Brodley C E. User re-authentication via mouse movements[C]//Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security-VizSEC/DMSEC'04. Washington DC:ACM Press, 2004:1-8. [13] 房超, 蔡忠闽, 沈超, 等. 基于鼠标动力学模型的用户身份认证与监控[J]. 西安交通大学学报, 2008, 42(10):1235-1239. Fang Chao, Cai Zhongmin, Shen Chao, et al. Authentication and monitoring of user identities based on mouse dynamics[J]. Journal of Xi'an Jiaotong University, 2008, 42(10):1235-1239. [14] 沈超, 蔡忠闽, 管晓宏, 等. 基于鼠标行为特征的用户身份认证与监控[J]. 通信学报, 2010, 31(7):68-75. Shen Chao, Cai Zhongmin, Guan Xiaohong, et al. User authentication and monitoring based on mouse behavioral features[J]. Journal on Communications, 2010, 31(7):68-75. [15] Nakkabi Y, Traore I, Ahmed A A E. Improving mouse dynamics biometric performance using variance reduction via extractors with separate features[J]. IEEE Transactions on Systems, Man, and Cybernetics-Part A:Systems and Humans, 2010, 40(6):1345-1353. [16] Feher C, Elovici Y, Moskovitch R, et al. User identity verification via mouse dynamics[J]. Information Sciences, 2012, 201:19-36. [17] 贺炎, 王斌, 王忠民. 小波分解在移动用户行为识别中的应用[J]. 北京邮电大学学报, 2016, 39(4):67-70. He Yan, Wang Bin, Wang Zhongmin. Application of wavelet decomposition in mobile user behavior recognition[J]. Journal of Beijing University of Posts and Telecommunications, 2016, 39(4):67-70. [18] Chi Man V, Pak Kin W, Lap Mou T. Ignition pattern analysis for automotive engine trouble diagnosis using wavelet packet transform and support vector machines[J]. Chinese Journal of Mechanical Engineering, 2011, 24(5):870-878. [19] 李弼程. 小波分析及其应用[M]. 北京:电子工业出版社, 2003:35-38, 77-88. [20] 李月琴, 栗苹, 闫晓鹏, 等. 无线电引信信号去噪的最优小波基选择[J]. 北京理工大学学报, 2008, 28(8):723-726. Li Yueqin, Li Ping, Yan Xiaopeng, et al. Selection of optimal wavelet basis for radio fuze signal denoising[J]. Transactions of Beijing Institute of Technology, 2008, 28(8):723-726. |