A Tutorial On Privacy, RCM and Its Implications in WLAN

D Ficara, RG Garroppo, J Henry - … Communications Surveys & …, 2023 - ieeexplore.ieee.org
The proliferation of Wi-Fi devices has led to the rise of privacy concerns related to MAC
Address-based systems used for people tracking and localization across various …

Dual-grained human mobility learning for location-aware trip recommendation with spatial–temporal graph knowledge fusion

Q Gao, W Wang, L Huang, X Yang, T Li, H Fujita - Information Fusion, 2023 - Elsevier
Trip recommendation is a popular and significant location-aware service that can help
visitors make more accurate travel plans. Its principal purpose is to provide a sequence of …

Bionic tribo-sensors with sweat and smudge-resistant as electronic skin for personal authentication

W Liu, S Zeng, Q Wang, W Cao, K Li, X Zeng, L Guo… - Nano Energy, 2024 - Elsevier
The increasing prevalence of the internet in our daily lives has made cybersecurity and
banking security crucial concerns. Traditional methods such as passwords, fingerprints, and …

Feature extraction and learning approaches for cancellable biometrics: A survey

W Yang, S Wang, J Hu, X Tao… - CAAI Transactions on …, 2024 - Wiley Online Library
Biometric recognition is a widely used technology for user authentication. In the application
of this technology, biometric security and recognition accuracy are two important issues that …

Optimized deep network based spoof detection in automatic speaker verification system

M Neelima, IS Prabha - Multimedia Tools and Applications, 2024 - Springer
Abstract Speaker-verification-system (SVS) is automated nowadays to improve the
authenticity score of digital applications. However, spoofs in the audio signal have reduced …

A Federated Attention-Based Multimodal Biometric Recognition Approach in IoT

L Lin, Y Zhao, J Meng, Q Zhao - Sensors, 2023 - mdpi.com
The rise of artificial intelligence applications has led to a surge in Internet of Things (IoT)
research. Biometric recognition methods are extensively used in IoT access control due to …

[HTML][HTML] Neural networks for intelligent multilevel control of artificial and natural objects based on data fusion: A survey

T Man, VY Osipov, N Zhukova, A Subbotin, DI Ignatov - Information Fusion, 2024 - Elsevier
Today the tasks of complex artificial and natural objects control have come to the fore in the
majority of subject domains. The efficiency and effectiveness of solving these tasks directly …

Heterogeneous fusion of biometric and deep physiological features for accurate porcine cough recognition

B Wang, J Qi, X An, Y Wang - Plos one, 2024 - journals.plos.org
Accurate identification of porcine cough plays a vital role in comprehensive respiratory
health monitoring and diagnosis of pigs. It serves as a fundamental prerequisite for stress …

Multimodal sentiment analysis in realistic environments based on cross-modal hierarchical fusion network

J Huang, P Lu, S Sun, F Wang - Electronics, 2023 - mdpi.com
In the real world, multimodal sentiment analysis (MSA) enables the capture and analysis of
sentiments by fusing multimodal information, thereby enhancing the understanding of real …

[HTML][HTML] Face recognition using ensemble statistical local descriptors

A Eleyan - Journal of King Saud University-Computer and …, 2023 - Elsevier
The use of data fusion can be of a enormous help in boosting classification performance.
Feature fusion is a data fusion technique that is being considered in this study. The effect of …