User authentication schemes using machine learning methods—a review
N Siddiqui, L Pryor, R Dave - Proceedings of International Conference on …, 2021 - Springer
With the recent advancements in technology, more and more people rely on their personal
devices to store their sensitive information. Concurrently, the environment in which these …
devices to store their sensitive information. Concurrently, the environment in which these …
Sensor-based mHealth authentication for real-time remote healthcare monitoring system: A multilayer systematic review
The new and groundbreaking real-time remote healthcare monitoring system on sensor-
based mobile health (mHealth) authentication in telemedicine has considerably bounded …
based mobile health (mHealth) authentication in telemedicine has considerably bounded …
AnswerAuth: A bimodal behavioral biometric-based user authentication scheme for smartphones
In this paper, we present a behavioral biometric-based smartphone user authentication
mechanism, namely, AnswerAuth, which relies on the very common users' behavior …
mechanism, namely, AnswerAuth, which relies on the very common users' behavior …
RiskCog: Unobtrusive real-time user authentication on mobile devices in the wild
Recent hardware advances have led to the development and consumerization of mobile
devices, which mainly include smartphones and various wearable devices. To protect the …
devices, which mainly include smartphones and various wearable devices. To protect the …
Good Intentions, Risky Inventions: A Method for Assessing the Risks and Benefits of AI in Mobile and Wearable Uses
Integrating Artificial Intelligence (AI) into mobile and wearables offers numerous benefits at
individual, societal, and environmental levels. Yet, it also spotlights concerns over emerging …
individual, societal, and environmental levels. Yet, it also spotlights concerns over emerging …
Actions speak louder than (pass) words: Passive authentication of smartphone users via deep temporal features
Prevailing user authentication schemes on smartphones rely on explicit user interaction,
where a user types in a passcode or presents a biometric cue such as face, fingerprint, or …
where a user types in a passcode or presents a biometric cue such as face, fingerprint, or …
Fine-grained and context-aware behavioral biometrics for pattern lock on smartphones
Pattern lock has been widely used in smartphones as a simple and effective authentication
mechanism, which however is shown to be vulnerable to various attacks. In this paper, we …
mechanism, which however is shown to be vulnerable to various attacks. In this paper, we …
Demystifying authentication concepts in smartphones: Ways and types to secure access
Smartphones are the most popular and widespread personal devices. Apart from their
conventional use, that is, calling and texting, they have also been used to perform multiple …
conventional use, that is, calling and texting, they have also been used to perform multiple …
Draw it as shown: Behavioral pattern lock for mobile user authentication
Android pattern lock is still popularly used for mobile user authentication. Unfortunately,
however, many concerns have been raised regarding its security and usability. User-created …
however, many concerns have been raised regarding its security and usability. User-created …
A review of continuous authentication using behavioral biometrics
The present study carries out a literature review on the topic of Continuous Authentication
(CA) using behavioral biometrics. CA systems have been proposed in order to solve the …
(CA) using behavioral biometrics. CA systems have been proposed in order to solve the …