|
[1] A. Jain, L. Hong, and S. Pankanti, “Biometric identification,” Commun. ACM, vol. 43, pp. 90–98, Feb. 2000. [2] A. K. Jain, P. Flynn, and A. A. Ross, Handbook of Biometrics. Secaucus, NJ, USA: Springer-Verlag New York, Inc., 2007. [3] J. Ashbourn, Biometrics: Advanced identity verification: The complete guide. 2000. [4] S. A. Cole, History of Fingerprint Pattern Recognition, pp. 1–25. New York, NY: Springer New York, 2004. [5] A. R. Burks and A. W. Burks, The First Electronic Computer: The Atanasoff Story. Ann Arbor, MI, USA: University of Michigan Press, 1988. [6] C. G. Northcutt, A. D. Ho, and I. L. Chuang, “Detecting and preventing ”multipleaccount” cheating in massive open online courses,” Comput. Educ., vol. 100, pp. 71–80, Sept. 2016. [7] T. Dunstone and N. Yager, Biometric System and Data Analysis: Design, Evaluation, and Data Mining. Springer Publishing Company, Incorporated, 1st ed., 2008. [8] R. S. Gaines, W. Lisowski, S. J. Press, and N. Shapiro, “Authentication by keystroke timing some preliminary results,” 1980. [9] R. Joyce and G. Gupta, “Identity authentication based on keystroke latencies,” Commun. ACM, vol. 33, pp. 168–176, Feb. 1990. [10] A. Guven and I. Sogukpinar, “Understanding users’ keystroke patterns for computer access security,” Computers Security, vol. 22, no. 8, pp. 695 – 706, 2003. [11] M. S. Obaidat and D. T. Macchiarolo, “An online neural network system for computer access security,” IEEE Transactions on Industrial Electronics, vol. 40, pp. 235–242, Apr 1993. [12] W. S. McCulloch and W. Pitts, “A logical calculus of the ideas immanent in nervous activity,” The bulletin of mathematical biophysics, vol. 5, pp. 115–133, Dec 1943. [13] R. Giot, M. El-Abed, and C. Rosenberger, “Greyc keystroke: A benchmark for keystroke dynamics biometric systems,” in 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems, pp. 1–6, Sept 2009. [14] C. Cortes and V. Vapnik, “Support-vector networks,” Machine Learning, vol. 20, pp. 273–297, Sep 1995. [15] F. Monrose and A. Rubin, “Authentication via keystroke dynamics,” in Proceedings of the 4th ACM Conference on Computer and Communications Security, CCS ’97, (New York, NY, USA), pp. 48–56, ACM, 1997. [16] F. Bergadano, D. Gunetti, and C. Picardi, “Identity verification through dynamic keystroke analysis,” Intell. Data Anal., vol. 7, pp. 469–496, Oct. 2003. [17] D. Gunetti, C. Picardi, and G. Ruffo, Keystroke Analysis of Different Languages: A Case Study, pp. 133–144. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. [18] S. Pinker, The Language Instinct. New York, NY: Harper Perennial Modern Classics, 1994. [19] T. Samura and H. Nishimura, “Keystroke timing analysis for individual identification in japanese free text typing,” in 2009 ICCAS-SICE, pp. 3166–3170, Aug 2009. [20] T. Samura and H. Nishimura, “Keystroke timing analysis for personal authentication in japanese long text input,” in SICE Annual Conference 2011, pp. 2121–2126, Sept 2011. [21] T. Samura and H. Nishimura, “Influence of keyboard difference on personal identification by keystroke dynamics in japanese free text typing,” in 2012 Fifth International Conference on Emerging Trends in Engineering and Technology, pp. 30–35, Nov 2012. [22] T. Samura, Y. Matsubara, and H. Nishimura, “Performance assessment in keystroke dynamics by combined profile documents for free text typing,” in The SICE Annual Conference 2013, pp. 265–270, Sept 2013. [23] A. Alsultan, K. Warwick, and H. Wei, “Free-text keystroke dynamics authentication for arabic language,” IET Biometrics, vol. 5, no. 3, pp. 164–169, 2016. [24] L. Breiman, Classification and regression trees. Chapman & Hall/CRC, 1984. [25] R. Jensen, Performing Feature Selection with ACO, pp. 45–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. [26] X. Li and J. Liu, Keystroke Biometric Recognition on Chinese Long Text Input, pp. 260–271. Cham: Springer International Publishing, 2016. [27] A. L. Samuel, “Some Studies in Machine Learning Using the Game of Checkers,” IBM Journal of Research and Development, vol. 3, no. 3, pp. 210–229, 1959. [28] T. Mitchell, Machine Learning. McGraw-Hill Education, 1st ed., 1997. [29] Y. S. Abu-Mostafa, M. Magdon-Ismail, and H.-T. Lin, Learning From Data. AMLBook, 2012. [30] T. K. Ho, “Random decision forests,” in Proceedings of the Third International Conference on Document Analysis and Recognition (Volume 1) - Volume 1, ICDAR ’95, (Washington, DC, USA), p. 278, IEEE Computer Society, 1995. [31] T. K. Ho, “The random subspace method for constructing decision forests,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 20, pp. 832–844, Aug. 1998. [32] J. R. Quinlan, C4.5: Programs for Machine Learning. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc., 1993. [33] L. Breiman, “Random forests,” Machine Learning, vol. 45, no. 1, pp. 5–32, 2001. [34] L. Breiman, “Bagging predictors,” Machine Learning, vol. 24, no. 2, pp. 123–140, 1996. [35] Y. Amit and D. Geman, “Shape quantization and recognition with randomized trees,” Neural Computation, vol. 9, pp. 1545–1588, July 1997. [36] K. Murphy, Machine Learning: A Probabilistic Perspective. Adaptive computation and machine learning, MIT Press, 2012. [37] A. K. Jain, R. Bolle, and S. Pankanti, Biometrics: personal identification in networked society, vol. 479. 2006. [38] D. Gunetti and C. Picardi, “Keystroke analysis of free text,” ACM Transactions on Information and System Security, vol. 8, no. 3, pp. 312–347, 2005. [39] I. Rish, “An empirical study of the naive bayes classifier,” tech. rep., 2001. [40] H. B. Demuth, M. H. Beale, O. De Jess, and M. T. Hagan, Neural Network Design. USA: Martin Hagan, 2nd ed., 2014. [41] W. J. Youden, “Index for rating diagnostic tests,” Cancer, vol. 3, no. 1, pp. 32–35, 1950. [42] T. Fawcett, “An introduction to roc analysis,” Pattern Recognition Letters, vol. 27, no. 8, pp. 861 – 874, 2006. ROC Analysis in Pattern Recognition. [43] T. Sim and R. Janakiraman, “Are digraphs good for free-text keystroke dynamics?,” Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2007. [44] J. Leggett, G. Williams, M. Usnick, and M. Longnecker, “Dynamic identity verification via keystroke characteristics,” International Journal of Man-Machine Studies, vol. 35, no. 6, pp. 859–870, 1991. [45] P. S. Teh, A. B. J. Teoh, and S. Yue, “A survey of keystroke dynamics biometrics,” The Scientific World Journal, vol. 2013, 2013. [46] 李鍌, 國語注音符號手冊. Taiwan: 中華民國教育部, 2000. [47] 注音符號的文化演現. 東大學術, 秀威資訊科技, 2012. [48] 敎育部國語統一籌備委員會, 國音常用字彙. 商務印書館, 1932. [49] “汉语拼音方案,” 1958. [50] S. van der Walt, S. C. Colbert, and G. Varoquaux, “The numpy array: A structure for efficient numerical computation,” Computing in Science & Engineering, vol. 13, no. 2, pp. 22–30, 2011. [51] W. McKinney, “Data structures for statistical computing in python,” in Proceedings of the 9th Python in Science Conference (S. van der Walt and J. Millman, eds.), pp. 51– 56, 2010. [52] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay, “Scikit-learn: Machine learning in Python,” Journal of Machine Learning Research, vol. 12, pp. 2825–2830, 2011. [53] J. D. Hunter, “Matplotlib: A 2d graphics environment,” Computing In Science & Engineering, vol. 9, no. 3, pp. 90–95, 2007. [54] L. Breiman, “Out-of-bag estimation.”
|