IncreAuth: Incremental-Learning-Based Behavioral Biometric Authentication on Smartphones
Z Shen, S Li, X Zhao, J Zou - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Touch behavior biometric has been widely studied for continuous authentication on mobile
devices, which provides a more secure authentication in an implicit process. However, the …
devices, which provides a more secure authentication in an implicit process. However, the …
Integrating handcrafted features with deep representations for smartphone authentication
Recent research demonstrates the potential of touch dynamics as a usable and privacy-
preserving scheme for smartphone authentication. Most existing approaches rely on …
preserving scheme for smartphone authentication. Most existing approaches rely on …
B2auth: A contextual fine-grained behavioral biometric authentication framework for real-world deployment
Several behavioral biometric authentication frameworks have been proposed to
authenticate smartphone users based on the analysis of sensors and services. These …
authenticate smartphone users based on the analysis of sensors and services. These …
TIM: Secure and usable authentication for smartphones
With the widespread popularity of smartphones and mobile applications, they have
gradually penetrated and are widely used in our daily lives, eg, we use them for online …
gradually penetrated and are widely used in our daily lives, eg, we use them for online …
Touch keystroke dynamics for demographic classification
Soft biometric traits are not fully distinctive in recognition tasks, but they can effectively
added to biometric recognition systems to improve the overall performance. In this work, the …
added to biometric recognition systems to improve the overall performance. In this work, the …
Toward robust detection of puppet attacks via characterizing fingertip-touch behaviors
Fingerprint authentication has gained increasing popularity on mobile devices in recent
years. However, it is vulnerable to presentation attacks, which include that an attacker …
years. However, it is vulnerable to presentation attacks, which include that an attacker …
A framework of dynamic selection method for user classification in touch-based continuous mobile device authentication
Continuous authentication can provide a mechanism to continuously monitor mobile devices
while a user is actively using it, after passing the initial-login authentication phase. Touch …
while a user is actively using it, after passing the initial-login authentication phase. Touch …
CT-Auth: Capacitive touchscreen-based continuous authentication on smartphones
Z Shen, S Li, X Zhao, J Zou - IEEE Transactions on Knowledge …, 2023 - ieeexplore.ieee.org
Continuous authentication, which provides identity verification using behavioral biometrics
in an implicit and transparent manner, has shown potentials for protecting privacy. As the …
in an implicit and transparent manner, has shown potentials for protecting privacy. As the …
Behavioral embedding for continuous user verification in global settings
In recent years, user identity verification techniques based on mobile touch interaction are
becoming more reliable and prominent. These techniques can be integrated in many types …
becoming more reliable and prominent. These techniques can be integrated in many types …
Single-Sensor Sparse Adversarial Perturbation Attacks Against Behavioural Biometrics
R Gunawardena, S Jayawardena… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
In Internet of Things (IoT) deployments, sensing applications have emerged as critical tools.
They combine data streams from heterogeneous, untrusted sensors to provide valuable …
They combine data streams from heterogeneous, untrusted sensors to provide valuable …