Security in smart cities: A brief review of digital forensic schemes for biometric data
A smart city is engineered to be a self-sustained ecosystem driven by Internet-of-Things (IoT)
devices. Smooth functioning of smart cities is conditioned on seamless communication …
devices. Smooth functioning of smart cities is conditioned on seamless communication …
Authentication and authorization for mobile IoT devices using biofeatures: Recent advances and future trends
Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the
purpose of this investigation is to summarise the factors that hinder biometrics models' …
purpose of this investigation is to summarise the factors that hinder biometrics models' …
[HTML][HTML] A survey of identity recognition via data fusion and feature learning
With the rapid development of the Mobile Internet and the Industrial Internet of Things, a
variety of applications put forward an urgent demand for user and device identity …
variety of applications put forward an urgent demand for user and device identity …
A multimodal-Siamese Neural Network (mSNN) for person verification using signatures and EEG
Signatures have long been considered to be one of the most accepted and practical means
of user verification, despite being vulnerable to skilled forgers. In contrast, EEG signals have …
of user verification, despite being vulnerable to skilled forgers. In contrast, EEG signals have …
A continuous smartphone authentication method based on gait patterns and keystroke dynamics
Behavioral biometrics, such as gait patterns and keystroke dynamics, have been becoming
increasingly used in human identity recognition research for enhancing the smartphone …
increasingly used in human identity recognition research for enhancing the smartphone …
An intelligent method for iris recognition using supervised machine learning techniques
In the new millennium, with chaotic situation that exist in the world, people are threaten with
multifarious terrorist attacks. There have been several intelligent ways in order to recognize …
multifarious terrorist attacks. There have been several intelligent ways in order to recognize …
Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues
This paper presents a comprehensive investigation of authentication schemes for smart
mobile devices. We start by providing an overview of existing survey articles published in the …
mobile devices. We start by providing an overview of existing survey articles published in the …
A deep learning approach for iris sensor model identification
The aim of this paper is to propose an algorithm based on convolutional neural networks
(CNN) for iris sensor model identification. This task is important in forensics applications as …
(CNN) for iris sensor model identification. This task is important in forensics applications as …
Al-enabled biometrics in recruiting: Insights from marketers for managers
Both researchers and practitioners are only in the early stages of examining and
understanding the application of artificial intelligence (AI) in terms of marketing themselves …
understanding the application of artificial intelligence (AI) in terms of marketing themselves …
Wihi: WiFi based human identity identification using deep learning
J Ding, Y Wang, X Fu - IEEE Access, 2020 - ieeexplore.ieee.org
Human identity identification based on channel state information (CSI) using commercial
WiFi devices has drawn increasingly attention, and it can be used in many applications such …
WiFi devices has drawn increasingly attention, and it can be used in many applications such …