Keyphrases
Behavioral Patterns
100%
Two-factor Authentication
100%
Puppet Attack
100%
Image Features
83%
Authentication Mechanism
83%
Time Characteristics
66%
Guard
16%
Usage Patterns
16%
False Positive Rate
16%
User Needs
16%
Classification Results
16%
Feature Selection
16%
Feature Vector
16%
Accuracy Rate
16%
Attacker
16%
Fingerprint Feature
16%
Capture Device
16%
One-class Classifier
16%
Combined Image
16%
Genuine User
16%
Computer Science
image feature
100%
Behavior Pattern
100%
Two-Factor Authentication
100%
Authentication Process
80%
Behavioral Pattern
40%
Experimental Result
20%
Feature Selection
20%
Feature Vector
20%
False Positive Rate
20%
classification result
20%
Attackers
20%
Authentication Method
20%
Feature Extraction
20%