Security in IoMT communications: A survey

D Koutras, G Stergiopoulos, T Dasaklis… - Sensors, 2020 - mdpi.com
The Internet of Medical Things (IoMT) couples IoT technologies with healthcare services in
order to support real-time, remote patient monitoring and treatment. However, the …

A survey on COVID-19 impact in the healthcare domain: worldwide market implementation, applications, security and privacy issues, challenges and future prospects

T Shakeel, S Habib, W Boulila, A Koubaa… - Complex & intelligent …, 2023 - Springer
Extensive research has been conducted on healthcare technology and service
advancements during the last decade. The Internet of Medical Things (IoMT) has …

EarEcho: Using ear canal echo for wearable authentication

Y Gao, W Wang, VV Phoha, W Sun, Z Jin - Proceedings of the ACM on …, 2019 - dl.acm.org
Smart wearable devices have recently become one of the major technological trends and
been widely adopted by the general public. Wireless earphones, in particular, have seen a …

A survey on gait recognition

C Wan, L Wang, VV Phoha - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Recognizing people by their gait has become more and more popular nowadays due to the
following reasons. First, gait recognition can work well remotely. Second, gait recognition …

Voice in ear: Spoofing-resistant and passphrase-independent body sound authentication

Y Gao, Y Jin, J Chauhan, S Choi, J Li… - Proceedings of the ACM on …, 2021 - dl.acm.org
With the rapid growth of wearable computing and increasing demand for mobile
authentication scenarios, voiceprint-based authentication has become one of the prevalent …

RF-identity: Non-intrusive person identification based on commodity RFID devices

C Feng, J Xiong, L Chang, F Wang, J Wang… - Proceedings of the ACM …, 2021 - dl.acm.org
Person identification plays a critical role in a large range of applications. Recently, RF based
person identification becomes a hot research topic due to the contact-free nature of RF …

Unlock with your heart: Heartbeat-based authentication on commercial mobile phones

L Wang, K Huang, K Sun, W Wang, C Tian… - Proceedings of the …, 2018 - dl.acm.org
In this paper, we propose to use the vibration of the chest in response to the heartbeat as a
biometric feature to authenticate the user on mobile devices. We use the built-in …

Contauth: Continual learning framework for behavioral-based user authentication

J Chauhan, YD Kwon, P Hui, C Mascolo - Proceedings of the ACM on …, 2020 - dl.acm.org
User authentication is key in user authorization on smart and personal devices. Over the
years, several authentication mechanisms have been proposed: these also include …

Beyond respiration: Contactless sleep sound-activity recognition using RF signals

C Liu, J Xiong, L Cai, L Feng, X Chen… - Proceedings of the ACM …, 2019 - dl.acm.org
Sleep sound-activities including snore, cough and somniloquy are closely related to sleep
quality, sleep disorder and even illnesses. To obtain the information of these activities …

Adaptive deep feature fusion for continuous authentication with data augmentation

Y Li, L Liu, H Qin, S Deng… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Mobile devices are becoming increasingly popular and are playing significant roles in our
daily lives. Insufficient security and weak protection mechanisms, however, cause serious …