AMBAS: An Autonomous Multimodal Biometric Authentication System, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), pp.2098-2104, 2017. ,
DOI : 10.1109/IWCMC.2017.7986607
Small fingerprint scanners used in mobile devices: the impact on biometric performance, IET Biometrics, vol.5, issue.1, pp.28-36, 2016. ,
DOI : 10.1049/iet-bmt.2015.0018
A Survey on Antispoofing Schemes for Fingerprint Recognition Systems, ACM Computing Surveys, vol.47, issue.2, pp.28-2015 ,
DOI : 10.1109/TPAMI.2011.161
Face Recognition on Consumer Devices: Reflections on Replay Attacks, IEEE Transactions on Information Forensics and Security, vol.10, issue.4, pp.736-745, 2015. ,
DOI : 10.1109/TIFS.2015.2398819
A roadmap to continuous biometric authentication on mobile devices, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC), pp.122-127, 2014. ,
DOI : 10.1109/IWCMC.2014.6906343
Keystroke template update with adapted thresholds, 2016 2nd International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), pp.483-488, 2016. ,
DOI : 10.1109/ATSIP.2016.7523122
URL : https://hal.archives-ouvertes.fr/hal-01286813
Authentication by keystroke timing: Some preliminary results, DTIC Document, 1980. ,
Identifying emotional states using keystroke dynamics, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, pp.715-724, 2011. ,
DOI : 10.1145/1978942.1979046
Identifying emotion by keystroke dynamics and text pattern analysis, Behaviour & Information Technology, vol.19, issue.5, pp.987-996, 2014. ,
DOI : 10.1037/0022-3514.66.2.310
Analysis of unsupervised template update in biometric recognition systems, Pattern Recognition Letters, vol.37, pp.151-160, 2014. ,
DOI : 10.1016/j.patrec.2013.05.021
Critical analysis of adaptive biometric systems, IET Biometrics, vol.1, issue.4, pp.179-187, 2012. ,
DOI : 10.1049/iet-bmt.2012.0019
Biometric system adaptation by self-update and graph-based techniques, Journal of Visual Languages & Computing, vol.24, issue.1, pp.1-9, 2013. ,
DOI : 10.1016/j.jvlc.2012.10.004
Replacement Algorithms for Fingerprint Template Update, Image Analysis and Recognition, pp.884-893, 2008. ,
DOI : 10.1007/978-3-540-69812-8_88
Automatic template update strategies for biometrics, 2007. ,
Continual retraining of keystroke dynamics based authenticator Advances in biometrics, pp.1203-1211, 2007. ,
Algorithm to estimate biometric performance change over time, IET Biometrics, vol.4, issue.4, pp.236-245, 2015. ,
DOI : 10.1049/iet-bmt.2014.0107
Sheep, goats, lambs and wolves: A statistical analysis of speaker performance in the nist 1998 speaker recognition evaluation, NATIONAL INST OF STANDARDS AND TECHNOLOGY GAITHERSBURG MD, 1998. ,
Exploiting the doddington zoo effect in biometric fusion, Biometrics: Theory, Applications, and Systems, 2009. BTAS'09. IEEE 3rd International Conference on, pp.1-7, 2009. ,
Towards Predicting Good Users for Biometric Recognition Based on Keystroke Dynamics, European Conference on Computer Vision, pp.711-724, 2014. ,
DOI : 10.1007/978-3-319-16181-5_54
On Hunting Animals of the Biometric Menagerie for Online Signature, PLOS ONE, vol.3, issue.7, p.151691, 2016. ,
DOI : 10.1371/journal.pone.0151691.s005
URL : https://hal.archives-ouvertes.fr/hal-01355704
Web-Based Benchmark for Keystroke Dynamics Biometric Systems: A Statistical Analysis, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp.11-15, 2012. ,
DOI : 10.1109/IIH-MSP.2012.10
URL : https://hal.archives-ouvertes.fr/hal-00714251
Why did my detector do that?! " in International Workshop on Recent Advances in Intrusion Detection, pp.256-276, 2010. ,