A survey of human gait-based artificial intelligence applications

EJ Harris, IH Khoo, E Demircan - Frontiers in Robotics and AI, 2022 - frontiersin.org
We performed an electronic database search of published works from 2012 to mid-2021 that
focus on human gait studies and apply machine learning techniques. We identified six key …

ASL-3DCNN: American sign language recognition technique using 3-D convolutional neural networks

S Sharma, K Kumar - Multimedia Tools and Applications, 2021 - Springer
The communication between a person from the impaired community with a person who does
not understand sign language could be a tedious task. Sign language is the art of conveying …

Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile Authentication

S Kokal, M Vanamala, R Dave - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
Throughout the past several decades, mobile devices have evolved in capability and
popularity at growing rates while improvement in security has fallen behind. As smartphones …

Multi-scale and multi-direction GAN for CNN-based single palm-vein identification

H Qin, MA El-Yacoubi, Y Li, C Liu - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Despite recent advances of deep neural networks in hand vein identification, the existing
solutions assume the availability of a large and rich set of training image samples. These …

Indoor objects detection and recognition for an ICT mobility assistance of visually impaired people

M Afif, R Ayachi, E Pissaloux, Y Said, M Atri - Multimedia Tools and …, 2020 - Springer
Indoor object detection in real scene presents a challenging computer vision task; it is also a
key component of an ICT autonomous displacement assistance of Visually Impaired People …

Detecting deepfake, faceswap and face2face facial forgeries using frequency cnn

A Kohli, A Gupta - Multimedia Tools and Applications, 2021 - Springer
The face of a person plays a vital role in any communication or visual content. To enhance
this visual content, popular and easy accessible editing tools are used. However, there …

DeFFusion: CNN-based continuous authentication using deep feature fusion

Y Li, P Tao, S Deng, G Zhou - ACM Transactions on Sensor Networks …, 2021 - dl.acm.org
Smartphones have become crucial and important in our daily life, but the security and
privacy issues have been major concerns of smartphone users. In this article, we present …

Hybrid image analysis model for hashtag recommendation through the use of deep learning methods

D Połap - Expert Systems with Applications, 2023 - Elsevier
Content tags of a given image are the basic mechanism used in social networking services.
One of the most commonly used websites like Instagram, Facebook, or Twitter is the …

MMAuth: A continuous authentication framework on smartphones using multiple modalities

Z Shen, S Li, X Zhao, J Zou - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
With the wide use of smartphones, more private data are collected and saved in the
smartphones. This raises higher requirements for secure and effective user authentication …

IncreAuth: Incremental-Learning-Based Behavioral Biometric Authentication on Smartphones

Z Shen, S Li, X Zhao, J Zou - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Touch behavior biometric has been widely studied for continuous authentication on mobile
devices, which provides a more secure authentication in an implicit process. However, the …