M Hu, K Zhang, R You, B Tu - Computers & Security, 2023 - Elsevier
To prevent the leakage of personal information on smartphones, a method that can authenticate the smartphone user's identity throughout the session is essential. Sensor …
Y Li, L Liu, S Deng, H Qin… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Over the last years, sensor-based continuous authentication on mobile devices has achieved great success on personal information protection. These proposed mechanisms …
C Zhao, F Gao, Z Shen - Computers & Security, 2024 - Elsevier
With continuous authentication, smartphones can constantly calculate authentication scores to verify a user's identity while interacting with the smartphones after logging in. Among …
Smartphones have become crucial for our daily life activities and are increasingly loaded with our personal information to perform several sensitive tasks, including, mobile banking …
Z Yang, Y Li, G Zhou - IEEE Transactions on Mobile Computing, 2024 - ieeexplore.ieee.org
With the rapid development of the Internet of Things (IoTs) and mobile communications, mobile devices have become indispensable in our daily lives. Given the substantial amount …
Y Li, P Tao, S Deng, G Zhou - ACM Transactions on Sensor Networks …, 2021 - dl.acm.org
Smartphones have become crucial and important in our daily life, but the security and privacy issues have been major concerns of smartphone users. In this article, we present …
Y Li, B Zou, S Deng, G Zhou - IEEE Internet Computing, 2020 - ieeexplore.ieee.org
With the increasing prevalence of mobile devices, people prefer to use smartphones to make payments, take photos, and collect personal vital information. Due to the high …
Y Li, L Liu, H Qin, S Deng… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Mobile devices are becoming increasingly popular and are playing significant roles in our daily lives. Insufficient security and weak protection mechanisms, however, cause serious …
Y Li, C Ouyang, H Huang - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
In recent years, sensor-based continuous authentication on mobile devices has proven highly effective in safeguarding personal information. However, these proposed approaches …