Alert button

Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks

Add code
Bookmark button
Alert button
Jun 15, 2021
Mohit Agrawal, Pragyan Mehrotra, Rajesh Kumar, Rajiv Ratn Shah

Figure 1 for Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks
Figure 2 for Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks
Figure 3 for Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks
Figure 4 for Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: