|
[1] Wikipedia, “Brain-Computer Interface,” https://en.wikipedia.org/wiki/Brain%E2%80%93computer_interface, Accessed on 2019/1/20 [2] V. Straebel, “Alvin Lucier’s Music for Solo Performer: Experimental music beyond sonification,” Organised Sound, vol. 19, pp. 17-29, April 2014. [3] 1V. Tulceanu, “Comprehensive Brainwave Authentication Using Emotional Stimuli,” 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO), Romania, 2012. [4] S. H. Liew, “Fuzzy-Rough Nearest Neighbour Classifier for Person Authentication using EEG signals,” 2013 International Conference on Fuzzy Theory and Its Applications (iFUZZY), Taiwan, 2013. [5] University of California, Irvine, “UCI Machine Learning Repository,” https://archive.ics.uci.edu/ml/datasets/eeg+database, Accessed on 2019/03/09. [6] S. Marcel, “Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaption,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol 29, pp. 743-752, April 2007. [7] S. H. Liew, “Incrementing FRNN model with simple heuristic update for brainwaves person authentication,” 2016 IEEE EMBS Conference on Biomedical Engineering and Sciences (IECBES), Malaysia, 2016. [8] L. Zhou, “You Think, Therefore You Are: Transparent Authentication System with Brainwave-oriented Bio-features for IoT Networks,” IEEE Transactions on Emerging Topics in Computer (Early Access) [9] M. Sidana, “Types of classification algorithms in Machine Learning,” https://medium.com/@Mandysidana/machine-learning-types-of-classification-9497bd4f2e14, Accessed on 2019/03/10 [10] F. Lotte, “A review of classification algorithms for EEG-based brain-computer interfaces,” Journal of Neural Engineering, vol 4, April 2007. [11] F. Lotte, “A review of classification algorithms for EEG-based brain-computer interfaces: a ten year update,” Journal of Neural Engineering, vol 15, April 2018. [12] Wikipedia, “Linear Classifier,” https://en.wikipedia.org/wiki/Linear_classifier, Accessed on 2019/03/10 [13] J. Jian, “Lecture Notes for Algorithm – Classification,” http://www.csie.ntnu.edu.tw/~u91029/Classification.html, Accessed on 2019/03/10 [14] J. Jang, “5-2 K-nearest neighbor Classifiers,” http://mirlab.org/jang/books/dcpr/prKnnc.asp?title=5-2%20K-nearest-neighbor%20Classifiers&language=english, Accessed on 2019/03/11 [15] Wikipedia, “K-nearest neighbors algorithm,” https://en.wikipedia.org/wiki/K-nearest_neighbors_algorithm, Accessed on 2019/03/11 [16] Wikipedia, “Artificial Neural Network,” https://en.wikipedia.org/wiki/Artificial_neural_network, Accessed on 2019/03/12 [17] Wikipedia, “Expectation Maximization,” https://en.wikipedia.org/wiki/Expectation%E2%80%93maximization_algorithm, Accessed on 2019/03/12 [18] J. Jang, “7-1 GMM Introduction”, http://mirlab.org/jang/books/dcpr/gmmIntro.asp?title=7-1%20GMM%20Introduction, Accessed on 2019/03/12 [19] W. Liao, “Advanced Computer Vision – 08 GMM”, http://www.cs.nccu.edu.tw/~whliao/acv2008/08gmm.pdf, Accessed on 2019/03/12 [20] Wikipedia, “Normal Distribution,” https://en.wikipedia.org/wiki/Normal_distribution, Accessed on 2019/03/12 [21] ShortID, “EM – Gaussian Mixture Model,” https://ithelp.ithome.com.tw/articles/10195700, Accessed on 2019/03/12 [22] L. Chen, “An evaluation system and computer game development as ADHD treatment,” 2015 The 9th International Conference on Advanced Information Technologies/ Consumer Electronics Forum (AIT/CEF 2015), Taiwan, 2015 [23] Wikipedia, “Motor Imagery,” https://en.wikipedia.org/wiki/Motor_imagery, Accessed on 2019/03/12 [24] A. M. Batula, “Virtual and Actual Humanoid Robot Control with Four-Class Motor-Imagery-Based Optical Brain-Computer Interface,” BioMed Research International, Vol 2017, July 2017. [25] J. Fietkau, “Swipe Your Fingerprints!, How Biometric Authentication Simplifies Payment, Access and Identity Fraud,” WOOT ’18 12th USENIX Workshop on Offensive Technologies, U.S.A., August 2018 [26] Chaos Computer Clubs, “Chaos Computer Clubs breaks iris recognition system of the Samsung Galaxy S8”, https://www.ccc.de/en/updates/2017/iriden, Accessed on 2019/03/12 [27] Chaos Computer Clubs, “Chaos Computer Club breaks Apple TouchID,” https://www.ccc.de/en/updates/2013/ccc-breaks-apple-touchid, Accessed on 2019/03/12 [28] Wikipedia, “Naïve Bayes Classifier,” https://en.wikipedia.org/wiki/Naive_Bayes_classifier, Accessed on: 2019/04/08 [29] Siuly, “Detection of motor imagery EEG signals employing Naïve Bayes based learning process,” Measurement, vol 86, pp 148-158, May 2016. [30] Reza Yaghoobi, “EEG signal classification using Bayes and Naïve Bayes Classifiers and extracted features of Continuous Wavelet Transform,” Majlesi Journal of Multimedia Processing, vol 3, March 2014. [31] H. Crawford.: Understanding user perceptions of transparent authentication on a mobile device. Journal of Trust Management (2017) [32] Nicholas Gillian, “SVM,” http://www.nickgillian.com/wiki/pmwiki.php/GRT/SVM/, Accessed on 2019/04/28 [33] BRI, “Brain Partition,” http://www.bri.com.tw/, Accessed on 2018/4/12
|