A review of security issues and solutions for precision health in Internet-of-Medical-Things systems

N Li, M Xu, Q Li, J Liu, S Bao, Y Li, J Li… - Security and …, 2023 - sands.edpsciences.org
Precision medicine provides a holistic perspective of an individual's health, including
genetic, environmental, and lifestyle aspects to realize individualized therapy. The …

Heat transfer-inspired network for image super-resolution reconstruction

M Zhang, Q Wu, J Guo, Y Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Image super-resolution (SR) is a critical image preprocessing task for many applications.
How to recover features as accurately as possible is the focus of SR algorithms. Most …

A Survey on Acoustic Side Channel Attacks on Keyboards

A Taheritajar, ZM Harris, R Rahaeimehr - arXiv preprint arXiv:2309.11012, 2023 - arxiv.org
In today's digital world, protecting personal and sensitive information is crucial. A new threat
has emerged called acoustic side-channel attacks on keyboards, which exploit unintentional …

Application of an autonomous object behavior model to classify the cybersecurity state

VV Semenov, IS Lebedev, ME Sukhoparov… - … Conference on Next …, 2019 - Springer
This paper considers the issues of ensuring the cybersecurity of autonomous objects.
Prerequisites that determine the application of additional independent methods for …

Behavioral acoustic emanations: Attack and verification of pin entry using keypress sounds

S Panda, Y Liu, GP Hancke, UM Qureshi - Sensors, 2020 - mdpi.com
This paper explores the security vulnerability of Personal Identification Number (PIN) or
numeric passwords. Entry Device (PEDs) that use small strings of data (PINs, keys or …

Keypad entry inference with sensor fusion from mobile and smart wearables

Y Liu, UM Qureshi, GP Hancke - Computers & Security, 2022 - Elsevier
This paper investigates the threat of password leakage from sensors on mobile phones and
smart wearables. We investigate attack methods for recovering a short random number …

Processing of signal information in problems of monitoring information security of unmanned autonomous objects

VV Semenov, IS Lebedev - Nauchno-Tekhnicheskii Vestnik …, 2019 - search.proquest.com
Abstract Subject of Research. We consider problematic issues of ensuring the information
security of autonomous unmanned objects. Prerequisites are revealed that determine the …

Short-range audio channels security: Survey of mechanisms, applications, and research challenges

M Caprolu, S Sciancalepore… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Short-range audio channels have appealing distinguishing characteristics: ease of use, low
deployment costs, and easy to tune frequencies, to cite a few. Moreover, thanks to their …

Выявление аномального функционирования устройств индустрии 4.0 на основе поведенческих паттернов

МЕ Сухопаров, ВВ Семенов… - Проблемы …, 2020 - elibrary.ru
Исследуется задача выявления аномального функционирования устройств
«Индустрии 4.0» на основе поведенческих паттернов, использующих информацию …

ArmSpy: Video-assisted PIN Inference Leveraging Keystroke-induced Arm Posture Changes

Y Chen, Y Du, C Xu, Y Yu, H Liu, H Dai… - IEEE INFOCOM 2022 …, 2022 - ieeexplore.ieee.org
PIN inference attack leveraging keystroke-induced side-channel information poses a
substantial threat to the security of people's privacy and properties. Among various PIN …