A contemporary survey on free space optical communication: Potentials, technical challenges, recent advances and research direction

A Jahid, MH Alsharif, TJ Hall - Journal of network and computer …, 2022 - Elsevier
Due to the unprecedented growth of high speed multimedia services and diversified
applications initiated from the massive connectivity of IoT devices, 5G and beyond 5G (B5G) …

[HTML][HTML] A comprehensive study on IoT privacy and security challenges with focus on spectrum sharing in Next-Generation networks (5G/6G/beyond)

LP Rachakonda, M Siddula, V Sathya - High-Confidence Computing, 2024 - Elsevier
The emergence of the Internet of Things (IoT) has triggered a massive digital transformation
across numerous sectors. This transformation requires efficient wireless communication and …

Secure full duplex integrated sensing and communications

A Bazzi, M Chafii - IEEE Transactions on Information Forensics …, 2023 - ieeexplore.ieee.org
The following paper models a secure full duplex (FD) integrated sensing and
communication (ISAC) scenario, where malicious eavesdroppers aim at intercepting the …

Listen to your fingers: User authentication based on geometry biometrics of touch gesture

H Chen, F Li, W Du, S Yang, M Conn… - Proceedings of the ACM …, 2020 - dl.acm.org
Inputting a pattern or PIN code on the touch screen is a popular method to prevent
unauthorized access to mobile devices. However, these sensitive tokens are highly …

[HTML][HTML] Recommender systems in cybersecurity

L Ferreira, DC Silva, MU Itzazelaia - Knowledge and Information Systems, 2023 - Springer
With the growth of CyberTerrorism, enterprises worldwide have been struggling to stop
intruders from obtaining private data. Despite the efforts made by Cybersecurity experts, the …

Wione: one-shot learning for environment-robust device-free user authentication via commodity wi-fi in man–machine system

Y Gu, H Yan, M Dong, M Wang, X Zhang… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
User authentication is the first and most critical step in protecting a man-machine system
from a malicious spoofer. However, security and privacy are just like the two sides of one …

[HTML][HTML] Gesture recognition of sign language alphabet using a magnetic positioning system

M Rinalduzzi, A De Angelis, F Santoni, E Buchicchio… - Applied Sciences, 2021 - mdpi.com
Hand gesture recognition is a crucial task for the automated translation of sign language,
which enables communication for the deaf. This work proposes the usage of a magnetic …

Openwifi CSI fuzzer for authorized sensing and covert channels

X Jiao, M Mehari, W Liu, M Aslam… - Proceedings of the 14th …, 2021 - dl.acm.org
CSI (Channel State Information) of WiFi systems contains the environment channel
response between the transmitter and the receiver, so the people/objects and their …

mmKey: Universal Virtual Keyboard Using A Single Millimeter-Wave Radio

Y Hu, B Wang, C Wu, KJR Liu - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Keyboard acts as one of the most commonly used mediums for human–computer
interaction. Today, massive Internet-of-Things (IoT) devices are designed without a physical …

Wital: Wifi-based real-time vital signs monitoring during sleep

Y Gu, X Zhang, H Yan, Z Liu, F Ren - Authorea Preprints, 2023 - techrxiv.org
Vital sign (breathing and heartbeat) monitoring is essential for patient care and sleep
disease prevention. Most current solutions are based on wearable sensors or cameras; …