Login / Signup
Analysis of Attacks on Continuous Authentication Methods and Ways of Defending Against Them.
Iurii Matiushin
Vladimir Korkhov
Ilya Busko
Published in:
ICCSA (Workshops 7) (2024)
Keyphrases
</>
data sets
preprocessing
significant improvement
benchmark datasets
empirical studies
data mining
machine learning
feature selection
decision trees
face recognition
image analysis
denoising
statistical analysis
qualitative and quantitative