[4]
Z. G. Li, W. L. Han, and W. Y. Xu, A large-scale empirical analysis of Chinese web passwords, in Proc. 23rd USENIX Conf. Security Symposium, San Diego, CA, USA, 2014.
[5]
M. L. Mazurek, S. Komanduri, T. Vidas, L. Bauer, N. Christin, L. F. Cranor, P. G. Kelley, R. Shay, and B. Ur, Measuring password guessability for an entire university, in Proc. 2013 ACM SIGSAC Conf. Computer & Communications Security, Berlin, Germany, 2013.
[6]
R. Joyce and G. Gupta, Identity authentication based on keystroke latencies, Commun. ACM, vol. 33, no. 2, pp. 168-176, 1990.
[7]
O. Coltell, J. M. Badfa, and G. Torres, Biometric identification system based on keyboard filtering, in Proc. IEEE 33rd Annu. 1999 Int. Carnahan Conf. Security Technology, Madrid, Spain, 1999.
[9]
R. V. Yampolskiy and V. Govindaraju, Behavioural biometrics: A survey and classification, Int. J. Biometrics, vol. 1, no. 1, pp. 81-113, 2008.
[10]
E. Z. Yu and S. Cho, GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification, in Proc. 2003 Int. Joint Conf. Neural Networks, Portland, OR, USA, 2003.
[11]
L. C. F. Araujo, L. H. R. Sucupira Jr, M. G. Lizarraga, L. L. Ling, and J. B. T. Yabu-Uti, User authentication through typing biometrics features, IEEE Trans. Signal Process., vol. 53, no. 2, pp. 851-855, 2005.
[12]
D. Hosseinzadeh, S. Krishnan, and A. Khademi, Keystroke identification based on Gaussian mixture models, in Proc. 2006 IEEE Int. Conf. Acoustics Speech and Signal Processing, Toulouse, France, 2006.
[13]
D. Hosseinzadeh and S. Krishnan, Gaussian mixture modeling of keystroke patterns for biometric applications, IEEE Trans. Systems Man Cybern. Part C (Appl. Rev.), vol. 38, no. 6, pp. 816-826, 2008.
[14]
M. Villani, Keystroke biometric identification studies on long-text input, PhD dissertation, Pace University, New York, NY, USA, 2007.
[15]
R. A. Maxion and K. S. Killourhy, Keystroke biometrics with number-pad input, in Proc. 2010 IEEE/IFIP Int. Conf. Dependable Systems & Networks, Chicago, IL, USA, 2010.
[16]
P. Bours, Continuous keystroke dynamics: A different perspective towards biometric evaluation, Inf. Secur. Techn. Rep., vol. 17, nos. 1&2, pp. 36-43, 2012.
[17]
Y. B. Deng and Y. Zhong, Keystroke dynamics user authentication based on Gaussian mixture model and deep belief nets, ISRN Signal Process., vol. 2013, p. 565183, 2013.
[18]
N. Zheng, K. Bai, H. Huang, and H. N. Wang, You are how you touch: User verification on smartphones via tapping behaviors, in Proc. 22nd Int. Conf. Network Protocols, Raleigh, NC, USA, 2014.
[19]
D. Buschek, A. De Luca, and F. Alt, Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices, in Proc. 33rd Annu. ACM Conf. Human Factors in Computing Systems, Seoul, Korea, 2015.
[20]
M. Antal and L. Z. Szabó, An evaluation of one-class and two-class classification algorithms for keystroke dynamics authentication on mobile devices, in Proc. 20th Int. Conf. Control Systems and Computer Science, Bucharest, Romania, 2015.
[22]
K. S. Killourhy and R. A. Maxion, Comparing anomaly-detection algorithms for keystroke dynamics, in Proc. 2009 IEEE/IFIP Int. Conf. Dependable Systems & Networks, Lisbon, Portugal, 2009.
[23]
R. O. Duda, P. E. Hart, and D. G. Stork, Pattern Classification, 2nd ed. New York, NY, USA: John Wiley & Sons, 2001.
[24]
ISO, ISO/IEC 19795–1: 2006 Information technology– biometric performance testing and reporting, part 1: Principles and framework, Geneva, Switzerland, 2006.
[25]
M. Ding and H. Tian, PCA-based network traffic anomaly detection, Tsinghua Sci. Technol., vol. 21, no.5, pp. 500-509, 2016.
[26]
I. J. Goodfellow, J. Pouget-Abadie, M. Mirza, B Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio, Generative adversarial networks, arXiv preprint arXiv: 1406.2661, 2014.
[27]
X. Wu, K. Xu, and P. Hall, A survey of image synthesis and editing with generative adversarial networks, Tsinghua Sci. Technol., vol. 22, no.6, pp. 660-674, 2017.