Privacy-preserving sensor-based continuous authentication and user profiling: a review

L Hernández-Álvarez, JM de Fuentes… - Sensors, 2020 - mdpi.com
Ensuring the confidentiality of private data stored in our technological devices is a
fundamental aspect for protecting our personal and professional information. Authentication …

A survey of human-computer interaction (HCI) & natural habits-based behavioural biometric modalities for user recognition schemes

S Gupta, C Maple, B Crispo, K Raja, A Yautsiukhin… - Pattern Recognition, 2023 - Elsevier
The proliferation of Internet of Things (IoT) systems is having a profound impact across all
aspects of life. Recognising and identifying particular users is central to delivering the …

TouchPass: Towards behavior-irrelevant on-touch user authentication on smartphones leveraging vibrations

X Xu, J Yu, Y Chen, Q Hua, Y Zhu, YC Chen… - Proceedings of the 26th …, 2020 - dl.acm.org
With increasing private and sensitive data stored in mobile devices, secure and effective
mobile-based user authentication schemes are desired. As the most natural way to contact …

SwipePass: Acoustic-based second-factor user authentication for smartphones

Y Chen, T Ni, W Xu, T Gu - Proceedings of the ACM on Interactive …, 2022 - dl.acm.org
Pattern lock-based authentication has been widely adopted in modern smartphones.
However, this scheme relies essentially on passwords, making it vulnerable to various side …

AnswerAuth: A bimodal behavioral biometric-based user authentication scheme for smartphones

A Buriro, B Crispo, M Conti - Journal of information security and …, 2019 - Elsevier
In this paper, we present a behavioral biometric-based smartphone user authentication
mechanism, namely, AnswerAuth, which relies on the very common users' behavior …

EchoHand: High accuracy and presentation attack resistant hand authentication on commodity mobile devices

C Wu, J Chen, K He, Z Zhao, R Du… - Proceedings of the 2022 …, 2022 - dl.acm.org
Biometric authentication schemes, ie, fingerprint and face authentication, raise serious
privacy concerns. To alleviate such concerns, hand authentication has been proposed …

Taprint: Secure text input for commodity smart wristbands

W Chen, L Chen, Y Huang, X Zhang, L Wang… - The 25th Annual …, 2019 - dl.acm.org
Smart wristband has become a dominant device in the wearable ecosystem, providing
versatile functions such as fitness tracking, mobile payment, and transport ticketing …

Listen to your fingers: User authentication based on geometry biometrics of touch gesture

H Chen, F Li, W Du, S Yang, M Conn… - Proceedings of the ACM …, 2020 - dl.acm.org
Inputting a pattern or PIN code on the touch screen is a popular method to prevent
unauthorized access to mobile devices. However, these sensitive tokens are highly …

A Systematic Review of Human Activity Recognition Based On Mobile Devices: Overview, Progress and Trends

Y Yin, L Xie, Z Jiang, F Xiao, J Cao… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Due to the ever-growing powers in sensing, computing, communicating and storing, mobile
devices (eg, smartphone, smartwatch, smart glasses) become ubiquitous and an …

PrinTracker: Fingerprinting 3D printers using commodity scanners

Z Li, AS Rathore, C Song, S Wei, Y Wang… - Proceedings of the 2018 …, 2018 - dl.acm.org
As 3D printing technology begins to outpace traditional manufacturing, malicious users
increasingly have sought to leverage this widely accessible platform to produce unlawful …