Internet of Things for education: A smart and secure system for schools monitoring and alerting

KN Qureshi, A Naveed, Y Kashif, G Jeon - Computers & Electrical …, 2021 - Elsevier
The education system is one of the mechanisms and aspiration to build the society and
contribute to human capital, well-being, and wealth. Security and privacy concerns in the …

Are you really muted?: A privacy analysis of mute buttons in video conferencing apps

Y Yang, J West, GK Thiruvathukal… - arXiv preprint arXiv …, 2022 - arxiv.org
Video conferencing apps (VCAs) make it possible for previously private spaces--bedrooms,
living rooms, and kitchens--into semi-public extensions of the office. For the most part, users …

Privacy-from-birth: Protecting sensed data from malicious sensors with VERSA

IDO Nunes, S Hwang, S Jakkamsetti… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
With the growing popularity of the Internet-of-Things (IoT), massive numbers of specialized
devices are deployed worldwide, in many everyday settings, including homes, offices …

Continuous user authentication by contactless wireless sensing

F Wang, Z Li, J Han - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
This paper presents BodyPIN, which is a continuous user authentication system by
contactless wireless sensing using commodity Wi-Fi. BodyPIN can track the current user's …

Automated behavior identification of home security camera traffic

S Liu, X Xu, Z Nan - 2023 International Joint Conference on …, 2023 - ieeexplore.ieee.org
With the widespread use of IoT devices in the market, home security cameras (HSCs) have
become one of the most commonly used devices. However, the security risks of these …

User behavior classification in encrypted cloud camera traffic

J Wang, Z Cao, C Kang, G Xiong - 2019 IEEE Global …, 2019 - ieeexplore.ieee.org
Home surveillance cameras have been widely used in recent years, however, what comes
next is the increasing events of users' privacy disclosure. Most cameras use video …

A low-calculation contactless continuous authentication based on postural transition

S Liu, Y Chen, H Wang, H Liang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Currently, available contactless continuous authentication (CA) techniques depend on
physiological biometrics to identify individuals at long intervals through complex feature …

[图书][B] Root-of-trust architectures for low-end embedded systems

S Jakkamsetti - 2023 - search.proquest.com
Abstract Internet-of-Things (IoT),“smart”, and Cyber-Physical Systems (CPS) devices have
become increasingly popular and commonplace over the past two decades. Some of them …

Rethinking privacy risks from wireless surveillance camera

Q Huang, Y Lu, Z Luo, H Wang, F Wu, G Chen… - ACM Transactions on …, 2023 - dl.acm.org
Wireless home surveillance cameras are gaining popularity in elderly/baby care and
burglary detection in an effort to make our life safer than ever before. However, even though …

User presence inference via encrypted traffic of wireless camera in smart homes

X Ji, Y Cheng, W Xu, X Zhou - Security and Communication …, 2018 - Wiley Online Library
Wireless cameras are widely deployed in smart homes for security guarding, baby
monitoring, fall detection, and so on. Those security cameras, which are supposed to protect …