Defending Touch-based Continuous Authentication Systems from Active
  Adversaries Using Generative Adversarial Networks

Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks

    AAML

Papers citing "Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks"

We use cookies and other tracking technologies to improve your browsing experience on our website, to show you personalized content and targeted ads, to analyze our website traffic, and to understand where our visitors are coming from. See our policy.