UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts.
Yazhe WangMingming HuChen LiPublished in: EAI Endorsed Trans. Security Safety (2015)
Keyphrases
- cost function
- experimental evaluation
- preprocessing
- detection method
- high accuracy
- high precision
- prior knowledge
- significant improvement
- computational cost
- theoretical analysis
- fully automatic
- image processing
- clustering method
- edge detection
- decision trees
- computationally efficient
- detection algorithm
- pairwise
- synthetic data
- classification method
- similarity measure