參考文獻 |
[1] Statista, Number of smartphone users worldwide 2013-2028, Published by J. Degenhard, Jun 1, 2023, https://www.statista.com/forecasts/1143723/smartphone-users-in-the-world
[2] I. I. Androulidakis, “Confidentiality, Integrity, and Availability Threats in Mobille Phones”, in Mobile Phone Security and Forensics, 2nd edition, Springer, 2012, pp. 1-12
[3] J. Galbally, I. Coisel, and I. Sanchez, “A New Multimodal Approach for Password Strength Estimation Part I: Theory and Algorithms,” IEEE Trans. on Information Forensics and Security, vol. 12, pp. 2829–2844, 2017
[4] Arash Habibi Lashkari, Samaneh Farmand, Dr. Omar Bin Zakaria, Dr. Rosli Saleh, ” Shoulder Surfing attack in graphical password authentication”, International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 145-154, November 2009, USA
[5] M. Rees, “Behavioral Biometrics: A Complete Guide,” Expert Insights, Dec. 13, 2021. https://expertinsights.com/insights/a-guide-to-behavioral-biometrics/ (accessed Jun. 16, 2022)
[6] M. Frank, et al, “Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication,” IEEE Trans on Inf. Forensic Security, vol. 8, no. 1, pp. 136-148, January 2013
[7] Tim G. J. Rudner, Helen Toner, “Key Concepts in AI Safety: Robustness and Adversarial Examples CSET Issue Brief”, Center for Security and Emerging Technology, March 2021
[8] Ian J. Goodfellow, Jonathon Shlens, Christian Szegedy, “Explaining and Harnessing Adversarial Examples”, arXiv:1412.6572
[9] L.-X. Lin, “Impersonation Attack on Touch-Based Behavioral Smartphone Authentication,” Thesis, CSIE, NCU, Taoyaun, 2021. Available: https://etd.lib.nctu.edu.tw/cgibin/gs32/ncugsweb.cgi/ccd=yezwX1/record?r1=1&h1=0#XXXX
[10] Yili Hong, Jiayi Lian, Li Xu, Jie Min, Yueyao Wang, Laura J. Freeman, Xinwei Deng, “Statistical Perspectives on Reliability of Artificial Intelligence Systems”, arXiv:2111.05391
[11] A. Mahfouz, T. M. Mahmoud, and A. S. Eldin, “A survey on behavioral biometric authentication on smartphones,” Journal of Information Security and Applications, vol. 37, pp. 28–37, Dec. 2017, doi: 10.1016/j.jisa.2017.10.002.
[12] Ali, Tariq Emad, Yung-Wey Chong, and Selvakumar Manickam. 2023. "Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review" Applied Sciences 13, no. 5: 3183. https://doi.org/10.3390/app13053183
[13] Afif.(2022) , “Weak Features Removal Via Feature Ranking to Prevent Impersonation Attack on Smartphone Behavior Biometric System,” Thesis, CSIE, NCU, Taoyaun, 2022. Available: http://ir.lib.ncu.edu.tw:88/thesis/view_etd.asp?URN=110522612
[14] R. Das, The Science of Biometrics: Security Technology for Identity Verification. Routledge, 2018.
[15] C.-C. Lin, C.-C. Chang, and D. Liang, “An Approach for Authenticating Smartphone Users Based on Histogram Features,” in 2015 IEEE International Conference on Software Quality, Reliability and Security, Aug. 2015, pp. 125–130. doi: 10.1109/QRS.2015.27.
[16] H. Wu, H. Han, X. Wang and S. Sun, "Research on Artificial Intelligence Enhancing Internet of Things Security: A Survey," in IEEE Access, vol. 8, pp. 153826-153848, 2020, doi:10.1109/ACCESS.2020.3018170
[17] Battista Biggio, Blaine Nelson, Pavel Laskov, “Poisoning attacks against support vector machines”, In International Conference on Machine Learning (ICML), pages 1467–1474, 2012
[18] Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy, “Explaining and Harnessing Adversarial Examples,” International Conference on Learning Representations, Vol. 3, San Diego, CA, USA, May 7-9, 2015
[19] Jianyi Liu, Yu Tian, Ru Zhang, Youqiang Sun, Chan Wang, ”A Two-Stage Generative Adversarial Networks With Semantic Content Constraints for Adversarial Example Generation “, 2020 Journal IEEE Access Vol: 8
[20] Keji Han, Yun Li, and Bin Xia, “A Cascade Model-Aware Generative Adversarial Example Detection Method”, Tsinghua Science and Technology, Volume 26, No. 6, December 2021, pp. 800–812
[21] Heng Li, ShiYao Zhou, “Adversarial-Example Attacks Toward Android Malware Detection System”, IEEE Systems Journal PP(99):1-4, April 2019
[22] W. Yuan, Y. Jiang, H. Li and M. Cai, "A Lightweight On-Device Detection Method for Android Malware," in IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 51, no. 9, pp. 5600-5611, Sept. 2021, doi: 10.1109/TSMC.2019.2958382.
[23] Donghua Wang, Li Dong, Rangding Wang, Diqun Yan, “Targeted Speech Adversarial Example Generation With Generative Adversarial Network”, IEEE Access, PP(99):1-1, June 2020
[24] Seok-Hwan Choi, Jin-Myeong Shin, Peng Liu and Yoon-Ho Choi, “ARGAN: Adversarially Robust Generative Adversarial Networks for Deep Neural Networks Against Adversarial Examples”, 2022 Journal IEEE Access, Vol. 10
[25] Meng Shen, Hao Yu, Liehuang Zhu, Ke Xu, Qi Li, Jiankun Hu, “Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems”, IEEE Transactions on Information Forensics and Security PP(99):1-1, August 2021
[26] Yaoyao Zhong, Weihong Deng, “Towards Transferable Adversarial Attack against Deep Face Recognition”, https://www.researchgate.net/publication/340618305_Towards_Transferable_Adversarial_Attack_against_Deep_Face_Recognition
[27] avrondzhon Gafurov, Einar Snekkenes, Member, IEEE, and Patrick Bours. Spoof Attacks on Gait Authentication System. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 2, NO. 3, SEPTEMBER 2007.
[28] I. Syarif, A. Prugel-Bennett, and G. Wills, “SVM Parameter Optimization using Grid Search and Genetic Algorithm to Improve Classification Performance,” TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 14, p. 1502, Dec. 2016, doi: 10.12928/telkomnika.v14i4.3956.
[29] Ashfaque Maat, Johar & Iqbal, Amer. (2019). Introduction to Support Vector Machines and Kernel Methods.
[30] U. Gawande and Y. Golhar, “Biometric security system: A rigorous review of unimodal and multimodal biometrics techniques,” International Journal of Biometrics, vol. 10, p. 142, Jan. 2018, doi: 10.1504/IJBM.2018.091629. |