共 50 条
- [21] Using the Context of User Feedback in Recommender Systems [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2016, (233): : 1 - 12
- [22] Continuous User Authentication using WiFi [J]. PROCEEDINGS OF 2022 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2022, : 2083 - 2088
- [23] User Authentication Using Keystroke Recognition [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, 2013, 174 : 131 - 136
- [25] Secure User Authentication Using Honeywords [J]. PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 896 - 903
- [26] User Authentication using Visual Cryptography [J]. 2015 INTERNATIONAL CONFERENCE ON CONTROL COMMUNICATION & COMPUTING INDIA (ICCC), 2015, : 647 - 652
- [28] User authentication mechanism using authentication server in home network [J]. 8th International Conference on Advanced Communication Technology, Vols 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U503 - U506
- [29] Detecting TV Program Highlight Scenes Using Twitter Data Classified by Twitter User Behavior [J]. RECENT ADVANCES AND FUTURE PROSPECTS IN KNOWLEDGE, INFORMATION AND CREATIVITY SUPPORT SYSTEMS, 2018, 685 : 1 - 13