The advancement in the computational capability and storage size of a modern mobile device has evolved it into a multi-purpose smart device for individual and business needs …
J Zhang, Z Tang, M Li, D Fang, P Nurmi… - Proceedings of the 24th …, 2018 - dl.acm.org
We present CrossSense, a novel system for scaling up WiFi sensing to new environments and larger problems. To reduce the cost of sensing model training data collection …
G Ye, Z Tang, D Fang, Z Zhu, Y Feng, P Xu… - Proceedings of the …, 2018 - dl.acm.org
Despite several attacks have been proposed, text-based CAPTCHAs are still being widely used as a security mechanism. One of the reasons for the pervasive use of text captchas is …
M Shahzad, S Zhang - Proceedings of the ACM on Interactive, Mobile …, 2018 - dl.acm.org
Over the last few years, researchers have proposed several WiFi based gesture recognition systems that can recognize predefined gestures performed by users at runtime. As most …
Mobile Edge Computing (MEC) can facilitate various important image retrieval applications for mobile users by offloading partial computation tasks from resource-limited mobile …
This paper presents a comprehensive investigation of authentication schemes for smart mobile devices. We start by providing an overview of existing survey articles published in the …
Y Yin, L Xie, Z Jiang, F Xiao, J Cao… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Due to the ever-growing powers in sensing, computing, communicating and storing, mobile devices (eg, smartphone, smartwatch, smart glasses) become ubiquitous and an …
Modern mobile devices especially smartphones have rapidly evolved and are widely adopted by people of different ages. Smartphones can assist users in a variety of activities …
C Wu, K He, J Chen, Z Zhao, R Du - 29th USENIX Security Symposium …, 2020 - usenix.org
Fingerprint authentication has gained increasing popularity on mobile devices in recent years. However, it is vulnerable to presentation attacks, which include that an attacker …