Magthief: Stealing private app usage data on mobile devices via built-in magnetometer
Various characteristics of mobile applications (apps) and associated in-app services have
been used reveal potentially-sensitive user information; however, privacy concerns have …
been used reveal potentially-sensitive user information; however, privacy concerns have …
Leakage or identification: Behavior-irrelevant user identification leveraging leakage current on laptops
The convenience of laptops brings with it the risk of information leakage, and conventional
security systems based on the password or the explicit biometric do little to alleviate this …
security systems based on the password or the explicit biometric do little to alleviate this …
Replay-resistant Disk Fingerprinting via Unintentional Electromagnetic Emanations
W Song, J Liu, Y Liu, J Han - … of the 27th International Symposium on …, 2024 - dl.acm.org
External disks (abbr., disks) are common data storage peripherals for hosts. Verifying the
disk's legitimacy is crucial to prevent security issues on a host like privacy leakage and virus …
disk's legitimacy is crucial to prevent security issues on a host like privacy leakage and virus …
Aircarft signal feature extraction and recognition based on deep learning
Radio signal recognition has a wide application in future communication systems and the
vehicular communication, whose core is the extraction of signal features such as …
vehicular communication, whose core is the extraction of signal features such as …
An efficient optimized mouse and keystroke dynamics framework for continuous non-intrusive user authentication
PA Thomas, KP Mathew - Wireless Personal Communications, 2022 - Springer
In recent years, user authentication based on mouse and keystroke dynamic is the most
wanted topic to identify the external user and to secure information. Additionally based on …
wanted topic to identify the external user and to secure information. Additionally based on …
MagneComm+: Near-Field Electromagnetic Induction Communication With Magnetometer
Near-field communication (NFC) technology emerges as a vital role with appealing benefits
for users to improve mobile device's functionality. Although today's most smartphones and …
for users to improve mobile device's functionality. Although today's most smartphones and …
LeakThief: Stealing the Behavior Information of Laptop via Leakage Current
Smart devices are proliferating in every aspect of our lives, providing convenience but also
exposing us to the risk of information leakage at any moment. Attackers can monitor the user …
exposing us to the risk of information leakage at any moment. Attackers can monitor the user …
Design of intelligent distance music education system based on pan-communication technology
Y Lin - 2021 International Conference on Artificial Intelligence …, 2021 - ieeexplore.ieee.org
Design of the intelligent distance music education system based on Pan-communication
technology is presented in this paper. This paper uses the different principles of the size of …
technology is presented in this paper. This paper uses the different principles of the size of …
Towards a UHF RFID Electromagnetic Fingerprint-Based Web Resolver for Digital Twins
SMN Hasnaeen, S Neupane… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
The viability of utilizing the frequency domain elec-tromagnetic (EM) fingerprint of passive
Ultra-High Frequency (UHF) Radiofrequency Identification (RFID) tags as the basis for a …
Ultra-High Frequency (UHF) Radiofrequency Identification (RFID) tags as the basis for a …