Using unique typing patterns (Keystroke Dynamics) of users as signature to authenticate user and classify user as genuine or imposter. For Methodology visit: https://www.nikhildagrawal.com/keystroke.html
☆28Jan 18, 2019Updated 7 years ago
Alternatives and similar repositories for User-Authentication-using-keystroke-dynamics
Users that are interested in User-Authentication-using-keystroke-dynamics are comparing it to the libraries listed below
Sorting:
- Multi-Agent LLM System for Digital Scam Protection☆12Dec 19, 2024Updated last year
- ☆11Apr 15, 2021Updated 4 years ago
- using machine learning model to scoring the quality of images☆10Aug 4, 2017Updated 8 years ago
- 🛠️ xqtR (executoR) is a command line tool to execute sync or async jobs defined by yaml files on your machine. 🛠️☆11Feb 25, 2023Updated 3 years ago
- ☆12Nov 22, 2024Updated last year
- Code Repository for Blog - How to Productionize Large Language Models (LLMs)☆12Mar 27, 2024Updated last year
- ChatGPT + DALL-E + WhatsApp = AI Assistant 🚀☆12Oct 31, 2023Updated 2 years ago
- Code for the paper:<LARNet:Lie Algebra Residual Network for Profile Face Recognition>(ICML2021)☆10Aug 19, 2021Updated 4 years ago
- ☆16Oct 13, 2022Updated 3 years ago
- ☆10Jun 11, 2025Updated 8 months ago
- A tool to bechmark soilidity smart contracts and snippets☆14Mar 1, 2020Updated 6 years ago
- Implementation of Thin-Plate-Splines (TPS) in PyTorch.☆13Mar 10, 2020Updated 5 years ago
- Code for 'Geospatial Entity Resolution' paper (WWW 2022)☆19Apr 27, 2023Updated 2 years ago
- なりすまし検出(anti-spoof-mn3)のWebカメラ向けデモ☆14Dec 3, 2021Updated 4 years ago
- Decentralized sponsorship and funding app for anyone. ✨☆12Apr 30, 2023Updated 2 years ago
- Implementation of Practical Facial Landmark Detector (PFLD) on Pytorch☆14Jul 23, 2023Updated 2 years ago
- ☆16Aug 4, 2024Updated last year
- Bot Detection by Building Markov Chain Models of Bots Network Behavior☆16Feb 6, 2021Updated 5 years ago
- A prototype of rule generator for process-aware monitoring system implementing IEC-60870-5-104 protocol and Bro monitoring tool.☆14May 27, 2019Updated 6 years ago
- AFD Dataset Cleaned☆15Apr 9, 2020Updated 5 years ago
- Neo4j Cybersecurity Demo☆18Mar 16, 2022Updated 3 years ago
- Unsupervised Face Morphing Attack Detection via Self-paced Anomaly Detection☆19Aug 11, 2022Updated 3 years ago
- Offline handwritten signature verification☆17Nov 21, 2018Updated 7 years ago
- AI-powered tool designed to help security professionals detect vulnerabilities at machine speed and extract insights from extensive bug b…☆18Aug 27, 2024Updated last year
- ☆18Jun 1, 2021Updated 4 years ago
- YOLOv3 - Neural Networks for Object Detection in satellite Imagery.☆20May 26, 2022Updated 3 years ago
- Consume custom TensorFlow model to automate KYC☆20Mar 2, 2020Updated 6 years ago
- ☆22Jun 10, 2024Updated last year
- Use quality aware network for face recognition☆17May 1, 2019Updated 6 years ago
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Aug 7, 2024Updated last year
- PyTorch implementation of the PushPull layer for CNNs.☆24May 20, 2020Updated 5 years ago
- Python script to evaluation the correctness of SpO2 estimation algorithms☆21May 3, 2020Updated 5 years ago
- ☆22May 11, 2022Updated 3 years ago
- PyTorch training code for FastSeg: https://github.com/ekzhang/fastseg☆19Aug 15, 2021Updated 4 years ago
- Classification with PyTorch.☆24Oct 20, 2019Updated 6 years ago
- ☆26Feb 19, 2023Updated 3 years ago
- App for Faceswapping using OpenCV, dlib and Tkinter☆19Aug 24, 2017Updated 8 years ago
- Probabilistic Face Embeddings[2019-ICCV]☆23Apr 28, 2020Updated 5 years ago
- A contactless fever thermometer with auto-aim☆26Jul 25, 2020Updated 5 years ago