Deep learning and machine learning, better together than apart: A review on biometrics mobile authentication

S Kokal, M Vanamala, R Dave - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
Throughout the past several decades, mobile devices have evolved in capability and
popularity at growing rates while improvement in security has fallen behind. As smartphones …

MotionID: Towards practical behavioral biometrics-based implicit user authentication on smartphones

MA Alawami, T Abuhmed, M Abuhamad… - Pervasive and Mobile …, 2024 - Elsevier
Traditional one-time authentication mechanisms cannot authenticate smartphone users'
identities throughout the session—the concept of using behavioral-based biometrics …

A survey on fingerprinting technologies for smartphones based on embedded transducers

A Berdich, B Groza, R Mayrhofer - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Smartphones are a vital technology, they improve our social interactions, provide us a great
deal of information, and bring forth the means to control various emerging technologies, like …

Internet of healthcare things security vulnerabilities and jamming attack analysis

K Sharma - Expert Systems, 2022 - Wiley Online Library
With the advent of the internet in the recent past, communication and transferring data are no
longer challenging. The internet of things (IoT) and many other mobile devices are another …

Cloudshield: real-time anomaly detection in the cloud

Z He, G Hu, RB Lee - Proceedings of the Thirteenth ACM Conference on …, 2023 - dl.acm.org
In cloud computing, it is desirable if suspicious activities can be detected by automatic
anomaly detection systems. Although anomaly detection has been investigated in the past, it …

Secure Cache and Processor Architectures Against Side-Channel, Speculative Execution and Impostor Attacks

G Hu - 2024 - search.proquest.com
Modern computer systems are increasingly vulnerable to a growing number of attacks, with
hardware caches being a critical performance optimization feature and a prime target for …

Fingerprinting smartphones from embedded transducers

AM Berdich, B Groza - 2023 - dspace.upt.ro
Due to the significant privacy risks that smartphones present and due to their importance in
device authentication and forensics investigations, fingerprinting smartphones have become …

Security Meets Deep Learning

Z He - 2021 - search.proquest.com
Recent years have witnessed the rapid development of deep learning in many domains.
These successes inspire using deep learning in the area of security. However, there are at …