Keyphrases
Sensor-based
100%
One-cycle
100%
Gait Cycle
100%
Fool
100%
Cycle Attack
100%
Gait Authentication
100%
Authentication Mechanism
60%
Attack Model
40%
Gait Sequence
40%
Defense Model
40%
Vulnerability
20%
Success Rate
20%
Attacker
20%
Unique Characteristics
20%
Clustering Methods
20%
New Dataset
20%
Imitation
20%
Number of Attempts
20%
Average Distance
20%
Learning Algorithm
20%
State-of-the-art Models
20%
Biometric System
20%
Feature Extraction Methods
20%
Cluster Center
20%
K-means Algorithm
20%
Feature Learning
20%
Wavelet Packet Decomposition
20%
Long Short-term Memory
20%
Novel Attacks
20%
Feature Samples
20%
Multiple Gaits
20%
Sensor-based Authentication
20%
Gait Database
20%
Computer Science
Authentication
100%
Attack Cycle
100%
Authentication Method
100%
Attack Model
66%
Attackers
33%
Mean Algorithm
33%
Computer Hardware
33%
Biometric System
33%
Long Short-Term Memory Network
33%
Experimental Result
33%
Learning Algorithm
33%
Clustering Method
33%
Data Processing
33%
Feature Extraction
33%