IncreAuth: Incremental-Learning-Based Behavioral Biometric Authentication on Smartphones

Z Shen, S Li, X Zhao, J Zou - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Touch behavior biometric has been widely studied for continuous authentication on mobile
devices, which provides a more secure authentication in an implicit process. However, the …

Integrating handcrafted features with deep representations for smartphone authentication

Y Song, Z Cai - Proceedings of the ACM on Interactive, Mobile …, 2022 - dl.acm.org
Recent research demonstrates the potential of touch dynamics as a usable and privacy-
preserving scheme for smartphone authentication. Most existing approaches rely on …

B2auth: A contextual fine-grained behavioral biometric authentication framework for real-world deployment

A Mahfouz, A Hamdy, MA Eldin… - Pervasive and Mobile …, 2024 - Elsevier
Several behavioral biometric authentication frameworks have been proposed to
authenticate smartphone users based on the analysis of sensors and services. These …

TIM: Secure and usable authentication for smartphones

GC Yang, Q Hu, MR Asghar - Journal of information security and …, 2022 - Elsevier
With the widespread popularity of smartphones and mobile applications, they have
gradually penetrated and are widely used in our daily lives, eg, we use them for online …

Touch keystroke dynamics for demographic classification

L Cascone, M Nappi, F Narducci, C Pero - Pattern Recognition Letters, 2022 - Elsevier
Soft biometric traits are not fully distinctive in recognition tasks, but they can effectively
added to biometric recognition systems to improve the overall performance. In this work, the …

Toward robust detection of puppet attacks via characterizing fingertip-touch behaviors

C Wu, K He, J Chen, Z Zhao… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Fingerprint authentication has gained increasing popularity on mobile devices in recent
years. However, it is vulnerable to presentation attacks, which include that an attacker …

A framework of dynamic selection method for user classification in touch-based continuous mobile device authentication

AZ Zaidi, CY Chong, R Parthiban, AS Sadiq - Journal of Information Security …, 2022 - Elsevier
Continuous authentication can provide a mechanism to continuously monitor mobile devices
while a user is actively using it, after passing the initial-login authentication phase. Touch …

CT-Auth: Capacitive touchscreen-based continuous authentication on smartphones

Z Shen, S Li, X Zhao, J Zou - IEEE Transactions on Knowledge …, 2023 - ieeexplore.ieee.org
Continuous authentication, which provides identity verification using behavioral biometrics
in an implicit and transparent manner, has shown potentials for protecting privacy. As the …

Behavioral embedding for continuous user verification in global settings

M Levi, I Hazan, N Agmon, S Eden - Computers & Security, 2022 - Elsevier
In recent years, user identity verification techniques based on mobile touch interaction are
becoming more reliable and prominent. These techniques can be integrated in many types …

Single-Sensor Sparse Adversarial Perturbation Attacks Against Behavioural Biometrics

R Gunawardena, S Jayawardena… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
In Internet of Things (IoT) deployments, sensing applications have emerged as critical tools.
They combine data streams from heterogeneous, untrusted sensors to provide valuable …