A survey of wearable devices and challenges

S Seneviratne, Y Hu, T Nguyen, G Lan… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
As smartphone penetration saturates, we are witnessing a new trend in personal mobile
devices-wearable mobile devices or simply wearables as it is often called. Wearables come …

Sensors of smart devices in the internet of everything (IoE) era: big opportunities and massive doubts

M Masoud, Y Jaradat, A Manasrah… - Journal of …, 2019 - Wiley Online Library
Smart device industry allows developers and designers to embed different sensors,
processors, and memories in small‐size electronic devices. Sensors are added to enhance …

A survey on gait recognition via wearable sensors

MD Marsico, A Mecca - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Gait is a biometric trait that can allow user authentication, though it is classified as a “soft”
one due to a certain lack in permanence and to sensibility to specific conditions. The earliest …

SwipePass: Acoustic-based second-factor user authentication for smartphones

Y Chen, T Ni, W Xu, T Gu - Proceedings of the ACM on Interactive …, 2022 - dl.acm.org
Pattern lock-based authentication has been widely adopted in modern smartphones.
However, this scheme relies essentially on passwords, making it vulnerable to various side …

GaitCode: Gait-based continuous authentication using multimodal learning and wearable sensors

I Papavasileiou, Z Qiao, C Zhang, W Zhang, J Bi, S Han - Smart Health, 2021 - Elsevier
The ever-growing threats of security and privacy loss from unauthorized access to mobile
devices have led to the development of various biometric authentication methods for easier …

Contauth: Continual learning framework for behavioral-based user authentication

J Chauhan, YD Kwon, P Hui, C Mascolo - Proceedings of the ACM on …, 2020 - dl.acm.org
User authentication is key in user authorization on smart and personal devices. Over the
years, several authentication mechanisms have been proposed: these also include …

Continuous authentication using biometrics: An advanced review

G Dahia, L Jesus… - … Reviews: Data Mining …, 2020 - Wiley Online Library
The shortcomings of conventional access control systems for high‐security environments
have led to the concert of continuous authentication. Contrary to traditional verification, in …

A systematic comparison of age and gender prediction on imu sensor-based gait traces

T Van Hamme, G Garofalo, E Argones Rúa… - Sensors, 2019 - mdpi.com
Sensors provide the foundation of many smart applications and cyber–physical systems by
measuring and processing information upon which applications can make intelligent …

mmSign: mmWave-based few-shot online handwritten signature verification

M Han, H Yang, T Ni, D Duan, M Ruan… - ACM Transactions on …, 2024 - dl.acm.org
Handwritten signature verification has become one of the most important document
authentication methods that are widely used in the financial, legal, and administrative …

ADLAuth: Passive authentication based on activity of daily living using heterogeneous sensing in smart cities

MN Malik, MA Azam, M Ehatisham-Ul-Haq, W Ejaz… - Sensors, 2019 - mdpi.com
The Internet of Things is a rapidly growing paradigm for smart cities that provides a way of
communication, identification, and sensing capabilities among physically distributed …