Security in IoMT communications: A survey
The Internet of Medical Things (IoMT) couples IoT technologies with healthcare services in
order to support real-time, remote patient monitoring and treatment. However, the …
order to support real-time, remote patient monitoring and treatment. However, the …
A survey on COVID-19 impact in the healthcare domain: worldwide market implementation, applications, security and privacy issues, challenges and future prospects
Extensive research has been conducted on healthcare technology and service
advancements during the last decade. The Internet of Medical Things (IoMT) has …
advancements during the last decade. The Internet of Medical Things (IoMT) has …
EarEcho: Using ear canal echo for wearable authentication
Smart wearable devices have recently become one of the major technological trends and
been widely adopted by the general public. Wireless earphones, in particular, have seen a …
been widely adopted by the general public. Wireless earphones, in particular, have seen a …
A survey on gait recognition
C Wan, L Wang, VV Phoha - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Recognizing people by their gait has become more and more popular nowadays due to the
following reasons. First, gait recognition can work well remotely. Second, gait recognition …
following reasons. First, gait recognition can work well remotely. Second, gait recognition …
Voice in ear: Spoofing-resistant and passphrase-independent body sound authentication
With the rapid growth of wearable computing and increasing demand for mobile
authentication scenarios, voiceprint-based authentication has become one of the prevalent …
authentication scenarios, voiceprint-based authentication has become one of the prevalent …
RF-identity: Non-intrusive person identification based on commodity RFID devices
Person identification plays a critical role in a large range of applications. Recently, RF based
person identification becomes a hot research topic due to the contact-free nature of RF …
person identification becomes a hot research topic due to the contact-free nature of RF …
Unlock with your heart: Heartbeat-based authentication on commercial mobile phones
In this paper, we propose to use the vibration of the chest in response to the heartbeat as a
biometric feature to authenticate the user on mobile devices. We use the built-in …
biometric feature to authenticate the user on mobile devices. We use the built-in …
Contauth: Continual learning framework for behavioral-based user authentication
User authentication is key in user authorization on smart and personal devices. Over the
years, several authentication mechanisms have been proposed: these also include …
years, several authentication mechanisms have been proposed: these also include …
Beyond respiration: Contactless sleep sound-activity recognition using RF signals
Sleep sound-activities including snore, cough and somniloquy are closely related to sleep
quality, sleep disorder and even illnesses. To obtain the information of these activities …
quality, sleep disorder and even illnesses. To obtain the information of these activities …
Adaptive deep feature fusion for continuous authentication with data augmentation
Mobile devices are becoming increasingly popular and are playing significant roles in our
daily lives. Insufficient security and weak protection mechanisms, however, cause serious …
daily lives. Insufficient security and weak protection mechanisms, however, cause serious …