Login / Signup

Deep Residual Networks for User Authentication via Hand-Object Manipulations.

Kanghae ChoiHokyoung RyuJieun Kim
Published in: Sensors (2021)
Keyphrases
  • user authentication
  • authentication scheme
  • biometric authentication
  • security analysis
  • keystroke dynamics
  • information security
  • computer networks
  • information systems
  • multiscale
  • e government
  • data objects