Authentication and authorization for mobile IoT devices using biofeatures: Recent advances and future trends

MA Ferrag, L Maglaras, A Derhab - Security and …, 2019 - Wiley Online Library
Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the
purpose of this investigation is to summarise the factors that hinder biometrics models' …

Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities

AZ Zaidi, CY Chong, Z Jin, R Parthiban… - Journal of Network and …, 2021 - Elsevier
The advancement in the computational capability and storage size of a modern mobile
device has evolved it into a multi-purpose smart device for individual and business needs …

CrossSense: Towards cross-site and large-scale WiFi sensing

J Zhang, Z Tang, M Li, D Fang, P Nurmi… - Proceedings of the 24th …, 2018 - dl.acm.org
We present CrossSense, a novel system for scaling up WiFi sensing to new environments
and larger problems. To reduce the cost of sensing model training data collection …

Yet another text captcha solver: A generative adversarial network based approach

G Ye, Z Tang, D Fang, Z Zhu, Y Feng, P Xu… - Proceedings of the …, 2018 - dl.acm.org
Despite several attacks have been proposed, text-based CAPTCHAs are still being widely
used as a security mechanism. One of the reasons for the pervasive use of text captchas is …

Augmenting user identification with WiFi based gesture recognition

M Shahzad, S Zhang - Proceedings of the ACM on Interactive, Mobile …, 2018 - dl.acm.org
Over the last few years, researchers have proposed several WiFi based gesture recognition
systems that can recognize predefined gestures performed by users at runtime. As most …

A cloud-guided feature extraction approach for image retrieval in mobile edge computing

S Wang, C Ding, N Zhang, X Liu, A Zhou… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Mobile Edge Computing (MEC) can facilitate various important image retrieval applications
for mobile users by offloading partial computation tasks from resource-limited mobile …

Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues

MA Ferrag, L Maglaras, A Derhab, H Janicke - Telecommunication …, 2020 - Springer
This paper presents a comprehensive investigation of authentication schemes for smart
mobile devices. We start by providing an overview of existing survey articles published in the …

A Systematic Review of Human Activity Recognition Based On Mobile Devices: Overview, Progress and Trends

Y Yin, L Xie, Z Jiang, F Xiao, J Cao… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Due to the ever-growing powers in sensing, computing, communicating and storing, mobile
devices (eg, smartphone, smartwatch, smart glasses) become ubiquitous and an …

TouchWB: Touch behavioral user authentication based on web browsing on smartphones

W Meng, Y Wang, DS Wong, S Wen, Y Xiang - Journal of Network and …, 2018 - Elsevier
Modern mobile devices especially smartphones have rapidly evolved and are widely
adopted by people of different ages. Smartphones can assist users in a variety of activities …

Liveness is not enough: Enhancing fingerprint authentication with behavioral biometrics to defeat puppet attacks

C Wu, K He, J Chen, Z Zhao, R Du - 29th USENIX Security Symposium …, 2020 - usenix.org
Fingerprint authentication has gained increasing popularity on mobile devices in recent
years. However, it is vulnerable to presentation attacks, which include that an attacker …