A survey on gait recognition

C Wan, L Wang, VV Phoha - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Recognizing people by their gait has become more and more popular nowadays due to the
following reasons. First, gait recognition can work well remotely. Second, gait recognition …

Authentication and authorization for mobile IoT devices using biofeatures: Recent advances and future trends

MA Ferrag, L Maglaras, A Derhab - Security and …, 2019 - Wiley Online Library
Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the
purpose of this investigation is to summarise the factors that hinder biometrics models' …

EarEcho: Using ear canal echo for wearable authentication

Y Gao, W Wang, VV Phoha, W Sun, Z Jin - Proceedings of the ACM on …, 2019 - dl.acm.org
Smart wearable devices have recently become one of the major technological trends and
been widely adopted by the general public. Wireless earphones, in particular, have seen a …

Waveear: Exploring a mmwave-based noise-resistant speech sensing for voice-user interface

C Xu, Z Li, H Zhang, AS Rathore, H Li, C Song… - Proceedings of the 17th …, 2019 - dl.acm.org
Voice-user interface (VUI) has become an integral component in modern personal devices
(\textite. g., smartphones, voice assistant) by fundamentally evolving the information sharing …

Vocalprint: exploring a resilient and secure voice authentication via mmwave biometric interrogation

H Li, C Xu, AS Rathore, Z Li, H Zhang, C Song… - Proceedings of the 18th …, 2020 - dl.acm.org
With the continuing growth of voice-controlled devices, voice metrics have been widely used
for user identification. However, voice biometrics is vulnerable to replay attacks and ambient …

Voice in ear: Spoofing-resistant and passphrase-independent body sound authentication

Y Gao, Y Jin, J Chauhan, S Choi, J Li… - Proceedings of the ACM on …, 2021 - dl.acm.org
With the rapid growth of wearable computing and increasing demand for mobile
authentication scenarios, voiceprint-based authentication has become one of the prevalent …

Contauth: Continual learning framework for behavioral-based user authentication

J Chauhan, YD Kwon, P Hui, C Mascolo - Proceedings of the ACM on …, 2020 - dl.acm.org
User authentication is key in user authorization on smart and personal devices. Over the
years, several authentication mechanisms have been proposed: these also include …

Velody: Nonlinear vibration challenge-response for resilient user authentication

J Li, K Fawaz, Y Kim - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
Biometrics have been widely adopted for enhancing user authentication, benefiting usability
by exploiting pervasive and collectible unique characteristics from physiological or …

Exploring the applications and security threats of Internet of Thing in the cloud computing paradigm: A comprehensive study on the cloud of things

A Nag, MM Hassan, A Das, A Sinha… - Transactions on …, 2024 - Wiley Online Library
Abstract The term “Internet of Things”(IoT) represents a vast interconnected network
comprising ordinary objects enhanced with electronics like sensors, actuators, and wireless …

Wristacoustic: through-wrist acoustic response based authentication for smartwatches

JH Huh, H Shin, HM Kim, E Cheon, Y Song… - Proceedings of the …, 2023 - dl.acm.org
PIN and pattern lock are difficult to accurately enter on small watch screens, and are
vulnerable against guessing attacks. To address these problems, this paper proposes a …