Login / Signup
Deep Residual Networks for User Authentication via Hand-Object Manipulations.
Kanghae Choi
Hokyoung Ryu
Jieun Kim
Published in:
Sensors (2021)
Keyphrases
</>
user authentication
authentication scheme
biometric authentication
security analysis
keystroke dynamics
information security
computer networks
information systems
multiscale
e government
data objects