A contemporary survey on free space optical communication: Potentials, technical challenges, recent advances and research direction
Due to the unprecedented growth of high speed multimedia services and diversified
applications initiated from the massive connectivity of IoT devices, 5G and beyond 5G (B5G) …
applications initiated from the massive connectivity of IoT devices, 5G and beyond 5G (B5G) …
[HTML][HTML] A comprehensive study on IoT privacy and security challenges with focus on spectrum sharing in Next-Generation networks (5G/6G/beyond)
The emergence of the Internet of Things (IoT) has triggered a massive digital transformation
across numerous sectors. This transformation requires efficient wireless communication and …
across numerous sectors. This transformation requires efficient wireless communication and …
Secure full duplex integrated sensing and communications
A Bazzi, M Chafii - IEEE Transactions on Information Forensics …, 2023 - ieeexplore.ieee.org
The following paper models a secure full duplex (FD) integrated sensing and
communication (ISAC) scenario, where malicious eavesdroppers aim at intercepting the …
communication (ISAC) scenario, where malicious eavesdroppers aim at intercepting the …
Listen to your fingers: User authentication based on geometry biometrics of touch gesture
Inputting a pattern or PIN code on the touch screen is a popular method to prevent
unauthorized access to mobile devices. However, these sensitive tokens are highly …
unauthorized access to mobile devices. However, these sensitive tokens are highly …
[HTML][HTML] Recommender systems in cybersecurity
L Ferreira, DC Silva, MU Itzazelaia - Knowledge and Information Systems, 2023 - Springer
With the growth of CyberTerrorism, enterprises worldwide have been struggling to stop
intruders from obtaining private data. Despite the efforts made by Cybersecurity experts, the …
intruders from obtaining private data. Despite the efforts made by Cybersecurity experts, the …
Wione: one-shot learning for environment-robust device-free user authentication via commodity wi-fi in man–machine system
User authentication is the first and most critical step in protecting a man-machine system
from a malicious spoofer. However, security and privacy are just like the two sides of one …
from a malicious spoofer. However, security and privacy are just like the two sides of one …
[HTML][HTML] Gesture recognition of sign language alphabet using a magnetic positioning system
Hand gesture recognition is a crucial task for the automated translation of sign language,
which enables communication for the deaf. This work proposes the usage of a magnetic …
which enables communication for the deaf. This work proposes the usage of a magnetic …
Openwifi CSI fuzzer for authorized sensing and covert channels
CSI (Channel State Information) of WiFi systems contains the environment channel
response between the transmitter and the receiver, so the people/objects and their …
response between the transmitter and the receiver, so the people/objects and their …
mmKey: Universal Virtual Keyboard Using A Single Millimeter-Wave Radio
Keyboard acts as one of the most commonly used mediums for human–computer
interaction. Today, massive Internet-of-Things (IoT) devices are designed without a physical …
interaction. Today, massive Internet-of-Things (IoT) devices are designed without a physical …
Wital: Wifi-based real-time vital signs monitoring during sleep
Vital sign (breathing and heartbeat) monitoring is essential for patient care and sleep
disease prevention. Most current solutions are based on wearable sensors or cameras; …
disease prevention. Most current solutions are based on wearable sensors or cameras; …