In today's era of advanced technologies, the concerns related to global security have led to video surveillance gadgets. Human gait recognition as a biometric is considered an evolving …
J Tian - Biomedical Signal Processing and Control, 2022 - Elsevier
Gait event detection is a critical task in numerous healthcare applications to identify and recognize a user's gait, such as based on accelerometer-based data. Many deep neural …
Z He, W Wang, J Dong, T Tan - Pattern Recognition, 2023 - Elsevier
Gait recognition is widely used in social security applications due to its advantages in long- distance human identification. Recently, sequence-based methods have achieved high …
In general, biometry-based control systems may not rely on individual expected behavior or cooperation to operate appropriately. Instead, such systems should be aware of malicious …
In general, biometry-based control systems may not rely on individual expected behavior or cooperation to operate appropriately. Instead, such systems should be aware of malicious …
M Jia, H Yang, D Huang, Y Wang - Proceedings of the 27th ACM …, 2019 - dl.acm.org
This paper investigates a new attack method to gait recognition systems. Different from typical spoofing attacks that require impostors to mimic certain clothing or walking styles, it …
DM Shila, E Eyisi - … Conference On Trust, Security And Privacy …, 2018 - ieeexplore.ieee.org
This paper presents an implicit and continuous user verification service, called dCASTRA, for mobile devices based on walking patterns inferred from smart phone sensors. We use …
WA Alsaggaf, I Mehmood, EF Khairullah… - Computational …, 2021 - Wiley Online Library
Surveillance remains an important research area, and it has many applications. Smart surveillance requires a high level of accuracy even when persons are uncooperative. Gait …
Y Wu, M Hassan, W Hu - Proceedings of the ACM on Interactive, Mobile …, 2022 - dl.acm.org
Recent works have shown that wearable or implanted devices attached at different locations of the body can generate an identical security key from their independent measurements of …