[HTML][HTML] Security, privacy, and usability in continuous authentication: A survey

AF Baig, S Eskeland - Sensors, 2021 - mdpi.com
Continuous authentication has been proposed as a possible approach for passive and
seamless user authentication, using sensor data comprising biometric, behavioral, and …

A survey of privacy vulnerabilities of mobile device sensors

P Delgado-Santos, G Stragapede, R Tolosana… - ACM Computing …, 2022 - dl.acm.org
The number of mobile devices, such as smartphones and smartwatches, is relentlessly
increasing, to almost 6.8 billion by 2022, and along with it, the amount of personal and …

[HTML][HTML] GaitPrivacyON: Privacy-preserving mobile gait biometrics using unsupervised learning

P Delgado-Santos, R Tolosana, R Guest… - Pattern Recognition …, 2022 - Elsevier
Numerous studies in the literature have already shown the potential of biometrics on mobile
devices for authentication purposes. However, it has been shown that, the learning …

Examining the current status and emerging trends in continuous authentication technologies through citation network analysis

JJ Jeong, Y Zolotavkin, R Doss - ACM Computing Surveys, 2022 - dl.acm.org
Continuous Authentication (CA) technologies enable users to be authenticated beyond just
the point of entry. In this article, we conduct a comprehensive review of over 2,300 articles to …

Defending touch-based continuous authentication systems from active adversaries using generative adversarial networks

M Agrawal, P Mehrotra, R Kumar… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Previous studies have demonstrated that commonly studied (vanilla) touch-based
continuous authentication systems (V-TCAS) are susceptible to population attack. This …

ELEKTRA: ELEKTRokardiomatrix application to biometric identification with convolutional neural networks

C Fuster-Barceló, P Peris-Lopez, C Camara - Neurocomputing, 2022 - Elsevier
Biometric systems are an uprising technique of identification in today's world. Many different
systems have been used in everyone's daily life in the past years, such as fingerprint, face …

Online handwriting, signature and touch dynamics: tasks and potential applications in the field of security and health

M Faundez-Zanuy, J Mekyska, D Impedovo - Cognitive Computation, 2021 - Springer
Advantageous property of behavioural signals (eg handwriting), in contrast to morphological
ones (eg iris, fingerprint, hand geometry), is the possibility to ask a user to perform many …

ICDAR 2021 competition on on-line signature verification

R Tolosana, R Vera-Rodriguez… - Document Analysis and …, 2021 - Springer
This paper describes the experimental framework and results of the ICDAR 2021
Competition on On-Line Signature Verification (SVC 2021). The goal of SVC 2021 is to …

Internet of things and artificial intelligence in national security: Applications and issues

R Montasari - Countering Cyberterrorism: The Confluence of Artificial …, 2023 - Springer
This Chapter analyses the capabilities of Artificial Intelligence (AI) in preventing and
combatting cyberattacks carried out through or against the Internet of Things (IoT) platforms …

Smartphone touch gesture for right-handed older adults: touch performance and offset models

Y Shao, J Zhou, W Wang - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
Older adults have difficulties with smartphone touch gestures, such as tapping, dragging,
zooming, and rotating. To alleviate these difficulties, this study examined error patterns in …