Your Smart Speaker Can" Hear" Your Heartbeat!

F Zhang, Z Wang, B Jin, J Xiong, D Zhang - Proceedings of the ACM on …, 2020 - dl.acm.org
Vital sign monitoring is a common practice amongst medical professionals, and plays a key
role in patient care and clinical diagnosis. Traditionally, dedicated equipment is employed to …

Contauth: Continual learning framework for behavioral-based user authentication

J Chauhan, YD Kwon, P Hui, C Mascolo - Proceedings of the ACM on …, 2020 - dl.acm.org
User authentication is key in user authorization on smart and personal devices. Over the
years, several authentication mechanisms have been proposed: these also include …

TouchID: User authentication on mobile devices via inertial-touch gesture analysis

X Zhang, Y Yin, L Xie, H Zhang, Z Ge, S Lu - Proceedings of the ACM on …, 2020 - dl.acm.org
Due to the widespread use of mobile devices, it is essential to authenticate users on mobile
devices to prevent sensitive information leakage. In this paper, we propose TouchID, which …

Smart sleep monitoring system via passively sensing human vibration signals

F Li, M Valero, J Clemente, Z Tse… - IEEE sensors journal, 2020 - ieeexplore.ieee.org
In this paper, a bed-mounted vibration sensor-based system is proposed to monitor vital
parameters during sleep, including heartbeat rate (HR) and respiratory rate (RR), body …

Helena: Real-time contact-free monitoring of sleep activities and events around the bed

J Clemente, M Valero, F Li, C Wang… - 2020 IEEE …, 2020 - ieeexplore.ieee.org
In this paper, we introduce a novel real-time and contact-free sensor system, Helena, that
can be mounted on a bed frame to continuously monitor sleep activities (entry/exit of bed …

Vibration-based pervasive computing and intelligent sensing

Y Huang, K Wu - CCF Transactions on Pervasive Computing and …, 2020 - Springer
We are now in the era of the Internet of Things (IoT). Various smart devices can upload their
sensor data that characterize our physical world's environment to the server. The …

A survey on mobile user perceptions of sensitive data and authentication methods

V Tsoukas, A Gkogkidis, A Kakarountas - Proceedings of the 24th Pan …, 2020 - dl.acm.org
The rapid evolution of mobile phone devices resulted in the conversion of a simple
communication device to a complicated small portable computer offering a plethora of …

[PDF][PDF] Dense Deep Neural Network Architecture for Keystroke Dynamics Authentication in Mobile Phone

LA Gabralla - Adv. Sci. Technol. Eng. Syst. J, 2020 - pdfs.semanticscholar.org
The ever-growing technology in mobile smartphones has enabled users to store sensitive
and private information; as a result, it required the need for an improved security system …

Developing Wearable Applications with Innovative Sensing Modalities for Human Activity Recognition and Key Generation

Q Lin - 2020 - unsworks.unsw.edu.au
Innovative sensing modalities for wearable devices continue to emerge with the
advancement of microelectromechanical systems and material science. Compared to …

Smart earpieces that know who you are quietly

H Lei, J Liu, Y Zou, K Wu - Proceedings of the 18th Conference on …, 2020 - dl.acm.org
User authentication and identification on smart devices has great significance in keeping
data privacy and recommending personalized services. Existing few research works …