1 |
L. M. Mayron, "Biometric Authentication on Mobile Devices," IEEE Security & Privacy, vol. 13, no. 3, pp. 70-73, June 2015.
DOI
|
2 |
S. H. Kim, Y. Fan, and G. Heo, "An Automatic Signature Verification Algorithm for Smart Devices," Journal of The Korea Society of Computer and Information, vol. 20, no. 10, pp. 15-21, Oct. 2015.
DOI
|
3 |
S. B. Napa and Nasir M., "Online Signature Verification on Mobile Devices," IEEE Transactions on Information Forensics and Security, vol. 9, no. 6, pp. 933-947, Apr. 2014.
DOI
|
4 |
Z. Zhang, K. Wang, and Y. Wang, "A Survey of On-line Signature Verification," Lecture Notes in Computer Science, vol. 7098, pp. 141-149, Dec. 2011.
|
5 |
L. S. Lee and S. H. Kim, "A Technique for Fixing Size of Reference Signature Data in Structural Signature Verification," Journal of the Korea Institute of Information and Communication Engineering, vol.14, no.6, pp. 1345-1352, June 2010.
DOI
|
6 |
V. Gomez-Verdejo, J. Arenas-Garcia, M. Lazaro-Gredilla, and A. Navia-Vazquez, "Adaptive One-Class Support Vector Machine," IEEE Transactions on Signal Processing, vol. 58, no. 6, June 2011.
|
7 |
V. Vapnik, Statistical Learning Theory, John Wiley & Sons, New York, 1998.
|
8 |
S. Y. Choi and H. C. Ahn, "Optimized Bankruptcy Prediction through Combing SVM with Fuzzy Theory," Journal of Digital Convergence, vol. 13, no. 3, pp. 155-165, Mar. 2015.
DOI
|
9 |
Z. G. Yan, Y. X. Yang and Y. J. Ding, "An Experimental Study of the Hyper-parameters Distribution Region and Its Optimization Method for Support Vector Machine with Gaussian Kernel," International Journal of Signal Processing, Image Processing and Pattern Recognition, vol. 6, no. 5, pp.437-446, May 2013.
DOI
|
10 |
J. W. Lee D. H. Lee and I. S. Kim, "Method of Detecting Smishing using SVM," Journal of Security Engineering, vol. 10, no. 6, pp. 655-668, Dec. 2013.
DOI
|
11 |
G. Heo and S. H. Kim, "Context-aware Fustion with Support Vector Machine," Journal of The Korea Society of Computer and Information, vol.19, no. 6, pp. 19-26, Jun. 2014.
DOI
|