A survey of wearable devices and challenges
As smartphone penetration saturates, we are witnessing a new trend in personal mobile
devices-wearable mobile devices or simply wearables as it is often called. Wearables come …
devices-wearable mobile devices or simply wearables as it is often called. Wearables come …
Sensors of smart devices in the internet of everything (IoE) era: big opportunities and massive doubts
Smart device industry allows developers and designers to embed different sensors,
processors, and memories in small‐size electronic devices. Sensors are added to enhance …
processors, and memories in small‐size electronic devices. Sensors are added to enhance …
A survey on gait recognition via wearable sensors
MD Marsico, A Mecca - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Gait is a biometric trait that can allow user authentication, though it is classified as a “soft”
one due to a certain lack in permanence and to sensibility to specific conditions. The earliest …
one due to a certain lack in permanence and to sensibility to specific conditions. The earliest …
SwipePass: Acoustic-based second-factor user authentication for smartphones
Pattern lock-based authentication has been widely adopted in modern smartphones.
However, this scheme relies essentially on passwords, making it vulnerable to various side …
However, this scheme relies essentially on passwords, making it vulnerable to various side …
GaitCode: Gait-based continuous authentication using multimodal learning and wearable sensors
The ever-growing threats of security and privacy loss from unauthorized access to mobile
devices have led to the development of various biometric authentication methods for easier …
devices have led to the development of various biometric authentication methods for easier …
Contauth: Continual learning framework for behavioral-based user authentication
User authentication is key in user authorization on smart and personal devices. Over the
years, several authentication mechanisms have been proposed: these also include …
years, several authentication mechanisms have been proposed: these also include …
Continuous authentication using biometrics: An advanced review
G Dahia, L Jesus… - … Reviews: Data Mining …, 2020 - Wiley Online Library
The shortcomings of conventional access control systems for high‐security environments
have led to the concert of continuous authentication. Contrary to traditional verification, in …
have led to the concert of continuous authentication. Contrary to traditional verification, in …
A systematic comparison of age and gender prediction on imu sensor-based gait traces
Sensors provide the foundation of many smart applications and cyber–physical systems by
measuring and processing information upon which applications can make intelligent …
measuring and processing information upon which applications can make intelligent …
mmSign: mmWave-based few-shot online handwritten signature verification
Handwritten signature verification has become one of the most important document
authentication methods that are widely used in the financial, legal, and administrative …
authentication methods that are widely used in the financial, legal, and administrative …
ADLAuth: Passive authentication based on activity of daily living using heterogeneous sensing in smart cities
The Internet of Things is a rapidly growing paradigm for smart cities that provides a way of
communication, identification, and sensing capabilities among physically distributed …
communication, identification, and sensing capabilities among physically distributed …