Behavioral biometrics & continuous user authentication on mobile devices: A survey

I Stylios, S Kokolakis, O Thanou, S Chatzis - Information Fusion, 2021 - Elsevier
This paper offers an up-to-date, comprehensive, extensive and targeted survey on
Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our …

Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location

L Fridman, S Weber, R Greenstadt… - IEEE Systems …, 2016 - ieeexplore.ieee.org
Active authentication is the problem of continuously verifying the identity of a person based
on behavioral aspects of their interaction with a computing device. In this paper, we collect …

A survey on behavioral biometric authentication on smartphones

A Mahfouz, TM Mahmoud, AS Eldin - Journal of information security and …, 2017 - Elsevier
Recent research has shown the possibility of using smartphones' sensors and accessories
to extract some behavioral attributes such as touch dynamics, keystroke dynamics and gait …

Hybrid emotion-aware monitoring system based on brainwaves for internet of medical things

W Meng, Y Cai, LT Yang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Driven by an increasing number of connected medical devices, Internet of Medical Things
(IoMT), as an application of Internet of Things (IoT) in healthcare, is developed to help …

Multi-modal decision fusion for continuous authentication

L Fridman, A Stolerman, S Acharya, P Brennan… - Computers & Electrical …, 2015 - Elsevier
Active authentication is the process of continuously verifying a user based on their on-going
interaction with a computer. In this study, we consider a representative collection of …

AI-assisted authentication: state of the art, taxonomy and future roadmap

G Zhu, Y Al-Qaraghuli - arXiv preprint arXiv:2204.12492, 2022 - arxiv.org
Artificial Intelligence (AI) has found its applications in a variety of environments ranging from
data science to cybersecurity. AI helps break through the limitations of traditional algorithms …

Biometric recognition using fusion

M Rane, T Latne, U Bhadade - ICDSMLA 2019: Proceedings of the 1st …, 2020 - Springer
Human identification systems based on biometrics are used in many applications to
increase the security level. There are different biometric traits which are used in various …

My voiceprint is my authenticator: A two-layer authentication approach using voiceprint for voice assistants

YT Chang, MJ Dupuis - … & Communications, Cloud & Big Data …, 2019 - ieeexplore.ieee.org
Voice assistants are a ubiquitous service of contemporary daily life. Their intuitive use and
24-hour-a-day convenience make them popular with an increasing user base. However, the …

Multimodal biometrics authentication using extreme learning machine with feature reduction by adaptive particle swarm optimization

C Vensila, A Boyed Wesley - The Visual Computer, 2024 - Springer
The necessity for personal data protection has become increasingly critical in recent years.
The single trait-based authentication fails in many cases and hence multimodal biometric …

Big data collection gateway for vision-based smart meter reading network

CH Chen, CY Chen, CH Hsia… - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
For building the big data collection infrastruction, a vision-based smart meter reading
network and its gateway is provided to a community gas supply system based on traditional …