Finally, some initial works of identity authentication based on mouse trajectories are explored, including the construction of dynamic model, system architecture, data acquisition and analysis, etc.
最后,论文对基于鼠标轨迹的身份鉴别方法进行了初步探讨,在建立动态模型、系统设计、数据采集与分析等方面做了一些初步工作。
Finally, some initial works of identity authentication based on mouse trajectories are explored, including the construction of dynamic model, system architecture, data acquisition and analysis, etc.
最后,论文对基于鼠标轨迹的身份鉴别方法进行了初步探讨,在建立动态模型、系统设计、数据采集与分析等方面做了一些初步工作。
应用推荐