ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2001.04056
  4. Cited By
On the Resilience of Biometric Authentication Systems against Random
  Inputs

On the Resilience of Biometric Authentication Systems against Random Inputs

13 January 2020
Benjamin Zi Hao Zhao
H. Asghar
M. Kâafar
    AAML
ArXivPDFHTML

Papers citing "On the Resilience of Biometric Authentication Systems against Random Inputs"

9 / 9 papers shown
Title
SoK: Web Authentication in the Age of End-to-End Encryption
SoK: Web Authentication in the Age of End-to-End Encryption
Jenny Blessing
Daniel Hugenroth
Ross J. Anderson
A. Beresford
32
1
0
26 Jun 2024
Deep Generative Attacks and Countermeasures for Data-Driven Offline
  Signature Verification
Deep Generative Attacks and Countermeasures for Data-Driven Offline Signature Verification
An Ngo
Rajesh Kumar
MinhPhuong Cao
AAML
17
0
0
02 Dec 2023
Dictionary Attack on IMU-based Gait Authentication
Dictionary Attack on IMU-based Gait Authentication
Rajesh Kumar
Can Isik
C. Mohan
AAML
14
0
0
21 Sep 2023
GANTouch: An Attack-Resilient Framework for Touch-based Continuous
  Authentication System
GANTouch: An Attack-Resilient Framework for Touch-based Continuous Authentication System
M. Agrawal
P. Mehrotra
Rajesh Kumar
R. Shah
16
7
0
02 Oct 2022
iCTGAN--An Attack Mitigation Technique for Random-vector Attack on
  Accelerometer-based Gait Authentication Systems
iCTGAN--An Attack Mitigation Technique for Random-vector Attack on Accelerometer-based Gait Authentication Systems
J. Mo
Rajesh Kumar
11
2
0
02 Oct 2022
Understanding Real-world Threats to Deep Learning Models in Android Apps
Understanding Real-world Threats to Deep Learning Models in Android Apps
Zizhuang Deng
Kai Chen
Guozhu Meng
Xiaodong Zhang
Ke Xu
Yao Cheng
AAML
18
26
0
20 Sep 2022
Defending Touch-based Continuous Authentication Systems from Active
  Adversaries Using Generative Adversarial Networks
Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks
M. Agrawal
P. Mehrotra
Rajesh Kumar
R. Shah
AAML
11
8
0
15 Jun 2021
On the (In)Feasibility of Attribute Inference Attacks on Machine
  Learning Models
On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models
Benjamin Zi Hao Zhao
Aviral Agrawal
Catisha Coburn
H. Asghar
Raghav Bhaskar
M. Kâafar
Darren Webb
Peter Dickinson
MIACV
24
38
0
12 Mar 2021
VoxCeleb2: Deep Speaker Recognition
VoxCeleb2: Deep Speaker Recognition
Joon Son Chung
Arsha Nagrani
Andrew Zisserman
216
2,233
0
14 Jun 2018
1