Acoustic-based sensing and applications: A survey

Y Bai, L Lu, J Cheng, J Liu, Y Chen, J Yu - Computer Networks, 2020 - Elsevier
With advancements of wireless and sensing technologies, recent studies have
demonstrated technical feasibility and effectiveness of using acoustic signals for sensing. In …

Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities

AZ Zaidi, CY Chong, Z Jin, R Parthiban… - Journal of Network and …, 2021 - Elsevier
The advancement in the computational capability and storage size of a modern mobile
device has evolved it into a multi-purpose smart device for individual and business needs …

Deep residual network for smartwatch-based user identification through complex hand movements

S Mekruksavanich, A Jitpattanakul - Sensors, 2022 - mdpi.com
Wearable technology has advanced significantly and is now used in various entertainment
and business contexts. Authentication methods could be trustworthy, transparent, and non …

[HTML][HTML] BehavePassDB: public database for mobile behavioral biometrics and benchmark evaluation

G Stragapede, R Vera-Rodriguez, R Tolosana… - Pattern Recognition, 2023 - Elsevier
Mobile behavioral biometrics have become a popular topic of research, reaching promising
results in terms of authentication, exploiting a multimodal combination of touchscreen and …

A new deep anomaly detection-based method for user authentication using multichannel surface EMG signals of hand gestures

Q Li, Z Luo, J Zheng - IEEE Transactions on Instrumentation …, 2022 - ieeexplore.ieee.org
User authentication plays an important role in securing systems and devices by preventing
unauthorized accesses. Although surface electromyogram (sEMG) has been widely applied …

A systematic survey of multi-factor authentication for cloud infrastructure

SP Otta, S Panda, M Gupta, C Hota - Future Internet, 2023 - mdpi.com
The unauthorized usage of various services and resources in cloud computing is something
that must be protected against. Authentication and access control are the most significant …

IncreAuth: Incremental-Learning-Based Behavioral Biometric Authentication on Smartphones

Z Shen, S Li, X Zhao, J Zou - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Touch behavior biometric has been widely studied for continuous authentication on mobile
devices, which provides a more secure authentication in an implicit process. However, the …

Robust biometric scheme against replay attacks using one-time biometric templates

T Gernot, C Rosenberger - Computers & Security, 2024 - Elsevier
User authentication is an important issue on the Internet and usually solved through static
and often unique passwords. Another method is to use biometrics, but biometric data are …

Device identity-based user authentication on electronic payment system for secure E-wallet apps

MA Hassan, Z Shukur - Electronics, 2021 - mdpi.com
E-wallets are a modern electronic payment system technology that easily recognize
consumer interest, making our transactions very convenient and efficient. E-wallets are …

An anonymous two-factor authentication protocol for IoT-based applications

MJ Sadri, MR Asaar - Computer Networks, 2021 - Elsevier
Internet of things (IoT) allows people to establish a real-time connection with physical
objects. To fulfill this lifelong ambition, the infrastructure of Wireless Sensor Networks …