Security in smart cities: A brief review of digital forensic schemes for biometric data

A Ross, S Banerjee, A Chowdhury - Pattern Recognition Letters, 2020 - Elsevier
A smart city is engineered to be a self-sustained ecosystem driven by Internet-of-Things (IoT)
devices. Smooth functioning of smart cities is conditioned on seamless communication …

Authentication and authorization for mobile IoT devices using biofeatures: Recent advances and future trends

MA Ferrag, L Maglaras, A Derhab - Security and …, 2019 - Wiley Online Library
Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the
purpose of this investigation is to summarise the factors that hinder biometrics models' …

[HTML][HTML] A survey of identity recognition via data fusion and feature learning

Z Qin, P Zhao, T Zhuang, F Deng, Y Ding, D Chen - Information Fusion, 2023 - Elsevier
With the rapid development of the Mobile Internet and the Industrial Internet of Things, a
variety of applications put forward an urgent demand for user and device identity …

A multimodal-Siamese Neural Network (mSNN) for person verification using signatures and EEG

DD Chakladar, P Kumar, PP Roy, DP Dogra… - Information …, 2021 - Elsevier
Signatures have long been considered to be one of the most accepted and practical means
of user verification, despite being vulnerable to skilled forgers. In contrast, EEG signals have …

A continuous smartphone authentication method based on gait patterns and keystroke dynamics

I Lamiche, G Bin, Y **g, Z Yu, A Hadid - Journal of Ambient Intelligence …, 2019 - Springer
Behavioral biometrics, such as gait patterns and keystroke dynamics, have been becoming
increasingly used in human identity recognition research for enhancing the smartphone …

An intelligent method for iris recognition using supervised machine learning techniques

N Ahmadi, M Nilashi, S Samad, TA Rashid… - Optics & Laser …, 2019 - Elsevier
In the new millennium, with chaotic situation that exist in the world, people are threaten with
multifarious terrorist attacks. There have been several intelligent ways in order to recognize …

Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues

MA Ferrag, L Maglaras, A Derhab, H Janicke - Telecommunication …, 2020 - Springer
This paper presents a comprehensive investigation of authentication schemes for smart
mobile devices. We start by providing an overview of existing survey articles published in the …

A deep learning approach for iris sensor model identification

F Marra, G Poggi, C Sansone, L Verdoliva - Pattern Recognition Letters, 2018 - Elsevier
The aim of this paper is to propose an algorithm based on convolutional neural networks
(CNN) for iris sensor model identification. This task is important in forensics applications as …

Al-enabled biometrics in recruiting: Insights from marketers for managers

P van Esch, J Stewart Black… - Australasian …, 2021 - journals.sagepub.com
Both researchers and practitioners are only in the early stages of examining and
understanding the application of artificial intelligence (AI) in terms of marketing themselves …

Wihi: WiFi based human identity identification using deep learning

J Ding, Y Wang, X Fu - IEEE Access, 2020 - ieeexplore.ieee.org
Human identity identification based on channel state information (CSI) using commercial
WiFi devices has drawn increasingly attention, and it can be used in many applications such …