User authentication schemes using machine learning methods—a review

N Siddiqui, L Pryor, R Dave - Proceedings of International Conference on …, 2021 - Springer
With the recent advancements in technology, more and more people rely on their personal
devices to store their sensitive information. Concurrently, the environment in which these …

Sensor-based mHealth authentication for real-time remote healthcare monitoring system: A multilayer systematic review

ML Shuwandy, BB Zaidan, AA Zaidan… - Journal of medical …, 2019 - Springer
The new and groundbreaking real-time remote healthcare monitoring system on sensor-
based mobile health (mHealth) authentication in telemedicine has considerably bounded …

AnswerAuth: A bimodal behavioral biometric-based user authentication scheme for smartphones

A Buriro, B Crispo, M Conti - Journal of information security and …, 2019 - Elsevier
In this paper, we present a behavioral biometric-based smartphone user authentication
mechanism, namely, AnswerAuth, which relies on the very common users' behavior …

RiskCog: Unobtrusive real-time user authentication on mobile devices in the wild

T Zhu, Z Qu, H Xu, J Zhang, Z Shao… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Recent hardware advances have led to the development and consumerization of mobile
devices, which mainly include smartphones and various wearable devices. To protect the …

Good Intentions, Risky Inventions: A Method for Assessing the Risks and Benefits of AI in Mobile and Wearable Uses

M Constantinides, EP Bogucka, S Scepanovic… - Proceedings of the …, 2024 - dl.acm.org
Integrating Artificial Intelligence (AI) into mobile and wearables offers numerous benefits at
individual, societal, and environmental levels. Yet, it also spotlights concerns over emerging …

Actions speak louder than (pass) words: Passive authentication of smartphone users via deep temporal features

D Deb, A Ross, AK Jain… - … on biometrics (ICB), 2019 - ieeexplore.ieee.org
Prevailing user authentication schemes on smartphones rely on explicit user interaction,
where a user types in a passcode or presents a biometric cue such as face, fingerprint, or …

Fine-grained and context-aware behavioral biometrics for pattern lock on smartphones

D Shi, D Tao, J Wang, M Yao, Z Wang, H Chen… - Proceedings of the …, 2021 - dl.acm.org
Pattern lock has been widely used in smartphones as a simple and effective authentication
mechanism, which however is shown to be vulnerable to various attacks. In this paper, we …

Demystifying authentication concepts in smartphones: Ways and types to secure access

S Gupta, A Buriro, B Crispo - Mobile Information Systems, 2018 - Wiley Online Library
Smartphones are the most popular and widespread personal devices. Apart from their
conventional use, that is, calling and texting, they have also been used to perform multiple …

Draw it as shown: Behavioral pattern lock for mobile user authentication

Y Ku, LH Park, S Shin, T Kwon - IEEE Access, 2019 - ieeexplore.ieee.org
Android pattern lock is still popularly used for mobile user authentication. Unfortunately,
however, many concerns have been raised regarding its security and usability. User-created …

A review of continuous authentication using behavioral biometrics

IC Stylios, O Thanou, I Androulidakis… - Proceedings of the …, 2016 - dl.acm.org
The present study carries out a literature review on the topic of Continuous Authentication
(CA) using behavioral biometrics. CA systems have been proposed in order to solve the …