[PDF][PDF] Unobservable re-authentication for smartphones.

L Li, X Zhao, G Xue - NDSS, 2013 - Citeseer
The widespread usage of smartphones gives rise to new security and privacy concerns.
Smartphones are becoming a personal entrance to networks, and may store private …

Using data augmentation in continuous authentication on smartphones

Y Li, H Hu, G Zhou - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
As personal computing platforms, smartphones are commonly used to store private,
sensitive, and security information, such as photographs, emails, and Android Pay. To …

Implicit smartphone user authentication with sensors and contextual machine learning

WH Lee, RB Lee - 2017 47th Annual IEEE/IFIP International …, 2017 - ieeexplore.ieee.org
Authentication of smartphone users is important because a lot of sensitive data is stored in
the smartphone and the smartphone is also used to access various cloud data and services …

Implicit sensor-based authentication of smartphone users with smartwatch

WH Lee, R Lee - Proceedings of the Hardware and Architectural Support …, 2016 - dl.acm.org
Smartphones are now frequently used by end-users as the portals to cloud-based services,
and smartphones are easily stolen or co-opted by an attacker. Beyond the initial login …

[HTML][HTML] Identifying smartphone users based on how they interact with their phones

MA Alqarni, SH Chauhdary, MN Malik… - … -centric Computing and …, 2020 - Springer
The continuous advancement in the Internet of Things technology allows people to connect
anywhere at any time, thus showing great potential in technology like smart devices …

Secure pick up: Implicit authentication when you start using the smartphone

WH Lee, X Liu, Y Shen, H Jin, RB Lee - Proceedings of the 22nd ACM on …, 2017 - dl.acm.org
We propose Secure Pick Up (SPU), a convenient, lightweight, in-device, non-intrusive and
automatic-learning system for smartphone user authentication. Operating in the background …

[HTML][HTML] Implicit authentication method for smartphone users based on rank aggregation and random forest

MWA El-Soud, T Gaber, F AlFayez… - Alexandria Engineering …, 2021 - Elsevier
Currently, the smartphone devices have become an essential part of our daily activities.
Smartphone'users run various essential applications (such as banking and e-health Apps) …

SNNAuth: Sensor-Based Continuous Authentication on Smartphones Using Spiking Neural Networks

Y Li, X Sun, Z Yang, H Huang - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Sensor-based continuous authentication mechanisms have demonstrated promising
capabilities in enhancing the security of smart devices. In this article, we present SNNAuth, a …

Conceivable security risks and authentication techniques for smart devices: A comparative evaluation of security practices

SM Muzammal, MA Shah, SJ Zhang… - International journal of …, 2016 - Springer
With the rapidly escalating use of smart devices and fraudulent transaction of users' data
from their devices, efficient and reliable techniques for authentication of the smart devices …

Sensor-based implicit authentication of smartphone users

WH Lee, RB Lee - 2017 47th Annual IEEE/IFIP International …, 2017 - ieeexplore.ieee.org
Authentication of smartphone users is important because a lot of sensitive data is stored in
the smartphone and the smartphone is also used to access various cloud data and services …