Patrick Bours

Orcid: 0000-0001-5562-6957

Affiliations:
  • Gjøvik University College, Norwegian Information Security Lab (NISlab)


According to our database1, Patrick Bours authored at least 87 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
CoDeS: A Deep Learning Framework for Identifying COVID-Caused Depression Symptoms.
Cogn. Comput., January, 2024

2023
Online grooming detection: A comprehensive survey of child exploitation in chat logs.
Knowl. Based Syst., 2023

Detecting Online Grooming By Simple Contrastive Chat Embeddings.
Proceedings of the 9th ACM International Workshop on Security and Privacy Analytics, 2023

2022
Biometric User Identification by Forearm EMG Analysis.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2022

EMG Data Collection for Multimodal Keystroke Analysis.
Proceedings of the 12th International Conference on Advanced Computer Information Technologies, 2022

2021
Predatory Conversation Detection Using Transfer Learning Approach.
Proceedings of the Machine Learning, Optimization, and Data Science, 2021

Detecting Sexual Predatory Chats by Perturbed Data and Balanced Ensembles Effects.
Proceedings of the 20th International Conference of the Biometrics Special Interest Group, 2021

Sexual-predator Detection System based on Social Behavior Biometric (SSB) Features.
Proceedings of the Fifth International Conference On Arabic Computational Linguistics, 2021

2020
On Preprocessing the Data for Improving Sexual Predator Detection : Anonymous for review.
Proceedings of the 15th International Workshop on Semantic and Social Media Adaptation and Personalization, 2020

Ensemble Method for Sexual Predators Identification in Online Chats.
Proceedings of the 8th International Workshop on Biometrics and Forensics, 2020

Fusion of Texture and Optical Flow Using Convolutional Neural Networks for Gender Classification in Videos.
Proceedings of the Intelligent Technologies and Applications, 2020

Attention! Designing a Target Group-Oriented Risk Communication Strategy.
Proceedings of the HCI International 2020 - Posters - 22nd International Conference, 2020

2019
Detection of Cyber Grooming in Online Conversation.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019

Exploring Keystroke Dynamics and Stylometry Features for Gender Prediction on Chat Data.
Proceedings of the 42nd International Convention on Information and Communication Technology, 2019

Robust Algorithm for Multimodal Deception Detection.
Proceedings of the 2nd IEEE Conference on Multimedia Information Processing and Retrieval, 2019

How re-training process affect the performance of no-reference image quality metric for face images.
Proceedings of the Media Watermarking, 2019

Detecting Liars in Chats using Keystroke Dynamics.
Proceedings of the 3rd International Conference on Biometric Engineering and Applications, 2019

Video Based Deception Detection Using Deep Recurrent Convolutional Neural Network.
Proceedings of the Computer Vision and Image Processing - 4th International Conference, 2019

2018
Performance evaluation of no-reference image quality metrics for face biometric images.
J. Electronic Imaging, 2018

A continuous combination of security & forensics for mobile devices.
J. Inf. Secur. Appl., 2018

Study on color space for the performance of degraded face image recognition.
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018

Studying WiFi and Accelerometer Data Based Authentication Method on Mobile Phones.
Proceedings of the 2018 2nd International Conference on Biometric Engineering and Applications, 2018

A Mobile App Authentication Approach by Fusing the Scores from Multi-Modal Data.
Proceedings of the 21st International Conference on Information Fusion, 2018

Performance Evaluation of N O- Reference Image Quality Metrics for Visible Wavelength Iris Biometric Images.
Proceedings of the 26th European Signal Processing Conference, 2018

Cross-Pocket Gait Recognition.
Proceedings of the 2018 International Conference on Cyberworlds, 2018

Can image quality enhancement methods improve the performance of biometric systems for degraded face images?
Proceedings of the Colour and Visual Computing Symposium, 2018

A Novel Mobilephone Application Authentication Approach based on Accelerometer and Gyroscope Data.
Proceedings of the 2018 International Conference of the Biometrics Special Interest Group, 2018

Predicted Templates: Learning-curve Based Template Projection for Keystroke Dynamics.
Proceedings of the 2018 International Conference of the Biometrics Special Interest Group, 2018

2017
Person Identification by Keystroke Dynamics Using Pairwise User Coupling.
IEEE Trans. Inf. Forensics Secur., 2017

Improving static audio keystroke analysis by score fusion of acoustic and timing data.
Multim. Tools Appl., 2017

A study on continuous authentication using a combination of keystroke and mouse biometrics.
Neurocomputing, 2017

Classification of Fingerprints Captured Using Optical Coherence Tomography.
Proceedings of the Image Analysis - 20th Scandinavian Conference, 2017

Can no-reference image quality metrics assess visible wavelength iris sample quality?
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

The Shakespeare experiment: Preliminary results for the recognition of a person based on the sound of walking.
Proceedings of the International Carnahan Conference on Security Technology, 2017

Language dependent challenge-based keystroke dynamics.
Proceedings of the International Carnahan Conference on Security Technology, 2017

2016
Combining keystroke and mouse dynamics for continuous user authentication and identification.
Proceedings of the IEEE International Conference on Identity, 2016

An improved 3-step contactless fingerprint image enhancement approach for minutiae detection.
Proceedings of the 6th European Workshop on Visual Information Processing, 2016

The Influence of Fingerprint Image Degradations on the Performance of Biometric System and Quality Assessment.
Proceedings of the 2016 International Conference of the Biometrics Special Interest Group, 2016

2015
A computational approach to the continuous authentication biometric system.
Inf. Sci., 2015

Performance evaluation of continuous authentication systems.
IET Biom., 2015

Continuous authentication and identification for mobile devices: Combining security and forensics.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Static Audio Keystroke Dynamics.
Proceedings of the Multimedia Communications, Services and Security, 2015

Data forensic techniques using Benford's law and Zipf's law for keystroke dynamics.
Proceedings of the 3rd International Workshop on Biometrics and Forensics, 2015

Context independent continuous authentication using behavioural biometrics.
Proceedings of the IEEE International Conference on Identity, 2015

Keystroke dynamics performance enhancement with soft biometrics.
Proceedings of the IEEE International Conference on Identity, 2015

Swipe gesture based Continuous Authentication for mobile devices.
Proceedings of the International Conference on Biometrics, 2015

One-handed Keystroke Biometric Identification Competition.
Proceedings of the International Conference on Biometrics, 2015

Continuous Authentication in a real world settings.
Proceedings of the Eighth International Conference on Advances in Pattern Recognition, 2015

Does Context matter for the Performance of Continuous Authentication Biometric Systems? An Empirical Study on Mobile Devices.
Proceedings of the BIOSIG 2015, 2015

A Mobile Phone Device as a Biometrics Authentication Method for an ATM Terminal.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Soft biometrics for keystroke dynamics: Profiling individuals while typing passwords.
Comput. Secur., 2014

Continuous Authentication using Fuzzy Logic.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Applying keystroke dynamics on one-time pin codes.
Proceedings of the 2nd International Workshop on Biometrics and Forensics, 2014

Performance of keystroke dynamics when allowing typing corrections.
Proceedings of the 2nd International Workshop on Biometrics and Forensics, 2014

Content Reconstruction Using Keystroke Dynamics: Preliminary Results.
Proceedings of the Fifth International Conference on Emerging Security Technologies, 2014

2013
Gait and activity recognition using commercial phones.
Comput. Secur., 2013

Complexity measurement of a password for keystroke dynamics: preliminary study.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Soft Biometrics for Keystroke Dynamics.
Proceedings of the Image Analysis and Recognition - 10th International Conference, 2013

Independent Performance Evaluation of Pseudonymous Identifier Fingerprint Verification Algorithms.
Proceedings of the Image Analysis and Recognition - 10th International Conference, 2013

Continuous Authentication using Mouse Dynamics.
Proceedings of the 2013 BIOSIG, 2013

Soft Biometrics Database: a Benchmark for Keystroke Dynamics Biometric Systems.
Proceedings of the 2013 BIOSIG, 2013

2012
Continuous keystroke dynamics: A different perspective towards biometric evaluation.
Inf. Secur. Tech. Rep., 2012

Biometric access control using Near Field Communication and smart phones.
Proceedings of the 5th IAPR International Conference on Biometrics, 2012

2011
User authentication based on foot motion.
Signal Image Video Process., 2011

Fusion in fingerprint authentication: two finger types vs. two scanner types.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Gait Recognition for Children over a Longer Period.
Proceedings of the BIOSIG 2011, 2011

2010
GUC100 Multisensor Fingerprint Database for In-House (Semipublic) Performance Test.
EURASIP J. Inf. Secur., 2010

Independent performance evaluation of fingerprint verification at the minutiae and pseudonymous identifier levels.
Proceedings of the IEEE International Conference on Systems, 2010

Encrypting Fingerprint Minutiae Templates by Random Quantization.
Proceedings of the Networked Digital Technologies - Second International Conference, 2010

Robust minutiae hash for fingerprint template protection.
Proceedings of the Media Forensics and Security II, 2010

Walk the Walk: Attacking Gait Biometrics by Imitation.
Proceedings of the Information Security - 13th International Conference, 2010

Fusion in Fingerprint Authentication: Two Finger Scenarios.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Improved Cycle Detection for Accelerometer Based Gait Authentication.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Renewable Minutiae Templates with Tunable Size and Security.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

GUC100 Multi-scanner Fingerprint Database for In-House (Semi-public) Performance and Interoperability Evaluation.
Proceedings of the Prodeedings of the 2010 International Conference on Computational Science and Its Applications, 2010

Impact of Finger Type in Fingerprint Authentication.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Improved Hip-Based Individual Recognition Using Wearable Motion Recording Sensor.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Improved Gait Recognition Performance Using Cycle Matching.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
A Login System Using Mouse Dynamics.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Geometric-Aligned Cancelable Fingerprint Templates.
Proceedings of the Image Analysis and Processing, 2009

Simulating the Influences of Aging and Ocular Disease on Biometric Recognition Performance.
Proceedings of the Advances in Biometrics, Third International Conference, 2009

2008
Pseudo Identities Based on Fingerprint Characteristics.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Face Recognition Using Separate Layers of the RGB Image.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Visible-Spectrum Biometric Retina Recognition.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2007
Spoof Attacks on Gait Authentication System.
IEEE Trans. Inf. Forensics Secur., 2007

Gait Authentication and Identification Using Wearable Accelerometer Sensor.
Proceedings of the 2007 IEEE Workshop on Automatic Identification Advanced Technologies, 2007


  Loading...