參考文獻 |
[1] I. M. google. (2013). Our Mobile Planet. Available: http://think.withgoogle.com/mobileplanet/zh-tw/
[2] Gartner. (2014). Gartner Says Worldwide Traditional PC, Tablet, Ultramobile and Mobile Phone Shipments to Grow 4.2 Percent in 2014. Available: http://www.gartner.com/newsroom/id/2791017
[3] What do you use your smartphone for? Available: http://www.mobilefun.co.uk/blog/2012/07/what-do-you-use-your-smartphone-for/
[4] (2015). Consumers and Mobile Financial Services. Available: http://www.federalreserve.gov/econresdata/consumers-and-mobile-financial-services-report-201503.pdf
[5] J. J. Yan, A. F. Blackwell, R. J. Anderson, and A. Grant, "Password Memorability and Security: Empirical Results," IEEE Security & privacy, vol. 2, pp. 25-31, 2004.
[6] D. Weinshall and S. Kirkpatrick, "Passwords you′ll never forget, but can′t recall," in CHI′04 extended abstracts on Human factors in computing systems, 2004, pp. 1399-1402.
[7] C.-C. Lin, D. Liang, and C.-C. Chang, "A new non-intrusive authentication method based on the orientation sensor for smartphone users," in 2012 IEEE 6th International Conference on Software Security and Reliability (SERE), 2012, pp.3270-3274
[8] 許振揚, "非侵入式多模組之手機使用者識別機制:基於動態方法," 國立中央大學, 碩士論文, 2012.
[9] C.-C. Lin, D. Liang, and C.-C. Chang, "A Novel Non-intrusive User Authentication Method Based on Touchscreen of Smartphones," to appear in Journal of Internet Technology, vol. 16, p. 1-10, 2015.
[10] 周彥竹, "整體學習之非侵入式手機使用者識別機制," 國立中央大學, 碩士論文, 2014.
[11] M. Pusara and C. E. Brodley, "User re-authentication via mouse movements," in Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, 2004, pp. 1-8.
[12] C.-C. Lin, D. Liang, and C.-C. Chang, "A Preliminary Study on Non-Intrusive User Authentication Method Using Smartphone Sensors," Applied Mechanics and Materials, vols 284-287, pp. 3270-3274, 2013.
[13] A. A. E. Ahmed and I. Traore, "A new biometric technology based on mouse dynamics," Dependable and Secure Computing, IEEE Transactions on, vol. 4, pp. 165-179, 2007.
[14] C.-C. Lin, C.-C. Chang, and D. Liang, "A Novel Non-intrusive User Authentication Method Based on Touchscreen of Smartphones," in Biometrics and Security Technologies (ISBAST), 2013 International Symposium on, 2013, pp. 212-216.
[15] Settles, B., 2009, “Active learning literature survey”, Computer Sciences Technical Report 1648, University of Wisconsin-Madison.
[16] Angluin, D., 1988, “Queries and concept learning”, Machine Learning, pp.319-342.
[17] Cohn, D., Atlas, L., Ladner, R., 1994, “Improving generalization with active learning”, Machine Learning, pp.201-221.
[18] Lewis, D., Catlett., 994, “Heterogeneous uncertainty sampling for supervised learning”, Machine Learning: Proceedings of the Eleventh International Conference, Morgan Kaufmann Publishers, San Francisco, CA, pp. 148–156.
[19] Tong S, Koller D. Support vector machine active learning with applications to text classification [C] //Proc of ICMI 2000. San Francisco: Morgan Kaufmann, 2000: 999-1066.
[20] Seung, H. S., Opper, M., Sompolinsky, H., 1992, “Query by committee”,
COLT ′92 Proceedings of the fifth annual workshop on Computational
learning, pp.287-294.
[21] Martin, A. F. et al., "The DET Curve in Assessment of Detection Task Performance", Proc. Eurospeech ′97, Rhodes, Greece, September 1997, Vol. 4, pp. 1899–1903.
[22] C.-C. C. a. C.-J. Lin. LIBSVM -- A Library for Support Vector Machines. Available: http://www.csie.ntu.edu.tw/~cjlin/libsvm/
[23] M. Böhmer, B. Hecht, J. Schöning, A. Krüger, and G. Bauer, "Falling asleep with Angry Birds, Facebook and Kindle: a large scale study on mobile application usage," in Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, 2011, pp. 47-56.
|