Exploring the applications and security threats of Internet of Thing in the cloud computing paradigm: A comprehensive study on the cloud of things

A Nag, MM Hassan, A Das, A Sinha… - Transactions on …, 2024 - Wiley Online Library
Abstract The term “Internet of Things”(IoT) represents a vast interconnected network
comprising ordinary objects enhanced with electronics like sensors, actuators, and wireless …

Vocal resonance: Using internal body voice for wearable authentication

R Liu, C Cornelius, R Rawassizadeh… - Proceedings of the …, 2018 - dl.acm.org
We observe the advent of body-area networks of pervasive wearable devices, whether for
health monitoring, personal assistance, entertainment, or home automation. For many …

Eyespyvr: Interactive eye sensing using off-the-shelf, smartphone-based vr headsets

K Ahuja, R Islam, V Parashar, K Dey… - Proceedings of the …, 2018 - dl.acm.org
Low cost virtual reality (VR) headsets powered by smartphones are becoming ubiquitous.
Their unique position on the user's face opens interesting opportunities for interactive …

Using AI to hack IA: A new stealthy spyware against voice assistance functions in smart phones

R Zhang, X Chen, J Lu, S Wen, S Nepal… - arXiv preprint arXiv …, 2018 - arxiv.org
Intelligent Personal Assistant (IA), also known as Voice Assistant (VA), has become
increasingly popular as a human-computer interaction mechanism. Most smartphones have …

Using AI to attack VA: a stealthy spyware against voice assistances in smart phones

R Zhang, X Chen, S Wen, X Zheng, Y Ding - IEEE Access, 2019 - ieeexplore.ieee.org
Voice Assistants (VAs) are increasingly popular for human-computer interaction (HCI)
smartphones. To help users automatically conduct various tasks, these tools usually come …

Who activated my voice assistant? A stealthy attack on android phones without users' awareness

R Zhang, X Chen, S Wen, J Zheng - … ML4CS 2019, Xi'an, China, September …, 2019 - Springer
Abstract Voice Assistant (VAs) are increasingly popular for human-computer interaction
(HCI) smartphones. To help users automatically conduct various tasks, these tools usually …

[PDF][PDF] Enhancing AI-based Conversational Dialogue Systems

R Zhang - 2023 - researchbank.swinburne.edu.au
Dialogue system is a popular Human-Computer Interaction (HCI) approach in daily life. The
advancement of natural language processing (NLP) has made dialogue systems more …

[PDF][PDF] Studying the Security Centric Intelligence on Android Malware Detection

X Chen - 2020 - researchbank.swinburne.edu.au
Android malware detection has long been a critical challenge. Statistic analysis and
machine learning based solutions have yielded promising performance on automatic …

걸음걸이비디오를활용한웨어러블기기사용자걸음걸이가속도신호추정

이두형, 최원석, 이동훈 - 정보보호학회논문지, 2017 - dbpia.co.kr
웨어러블 기기에서 측정되는 사용자의 걸음걸이로 인한 가속도 신호를 인증 기술에 적용하는
연구결과들이 최근에 발표되고 있다. 현재까지 발표된 걸음걸이 가속도 신호 기반의 인증 …

A Study on Estimation of Gait Acceleration Signal Using Gait Video Signal in Wearable Device

D Lee, W Choi, DH Lee - Journal of the Korea Institute of …, 2017 - koreascience.kr
Researches that apply the acceleration signal due to user's gait measured at the wearable
device to the authentication technology are being introduced recently. The gait acceleration …