Login / Signup

Techniques for Continuous Touch-Based Authentication Modeling.

Martin GeorgievSimon EberzIvan Martinovic
Published in: CoRR (2022)
Keyphrases
  • real world
  • databases
  • modeling method
  • real time
  • neural network
  • artificial intelligence
  • multi agent
  • digital images
  • security mechanisms
  • image authentication