[PDF][PDF] A systematic review of security and privacy issues in the internet of medical things; the role of machine learning approaches
Background The Internet of Medical Things (IoMTs) is gradually replacing the traditional
healthcare system. However, little attention has been paid to their security requirements in …
healthcare system. However, little attention has been paid to their security requirements in …
Behavioral biometrics & continuous user authentication on mobile devices: A survey
This paper offers an up-to-date, comprehensive, extensive and targeted survey on
Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our …
Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our …
Deep residual network for smartwatch-based user identification through complex hand movements
Wearable technology has advanced significantly and is now used in various entertainment
and business contexts. Authentication methods could be trustworthy, transparent, and non …
and business contexts. Authentication methods could be trustworthy, transparent, and non …
Advances on networked ehealth information access and sharing: Status, challenges and prospects
Abstarct Internet of Medical Things (IoMT) is no longer a futuristic technology and has
become a day-to-day reality with the increasing ease of availing modern internet services …
become a day-to-day reality with the increasing ease of availing modern internet services …
Toward secure and provable authentication for Internet of Things: Realizing industry 4.0
The Internet of Things (IoT) has many applications, including Industry 4.0. There are a
number of challenges when deploying IoT devices in the Industry 4.0 setting, partly due to …
number of challenges when deploying IoT devices in the Industry 4.0 setting, partly due to …
Deep learning-based continuous authentication for an IoT-enabled healthcare service
Abstract The Internet of Things (IoT) has introduced a new dimension to the Internet in the
last decade; nonetheless, security, particularly attacks on authentication, continue to be a …
last decade; nonetheless, security, particularly attacks on authentication, continue to be a …
Implicit IoT authentication using on-phone ANN models and breathing data
The expansionist nature of the Internet of Things (IoT) with smart sensing has integrated
smart technology into the fabric of daily life. From digital health check-ups and personal …
smart technology into the fabric of daily life. From digital health check-ups and personal …
Wearable sport activity classification based on deep convolutional neural network
YL Hsu, HC Chang, YJ Chiu - IEEE Access, 2019 - ieeexplore.ieee.org
This paper develops a wearable sport activity classification system and its associated deep
learning-based sport activity classification algorithm for accurately recognizing sport …
learning-based sport activity classification algorithm for accurately recognizing sport …
Gait analysis using smartwatches
Monitoring gait characteristics is an important tool used in many areas including
orthopedics, sports, rehabilitation and neurology. Current methods applied to analyze the …
orthopedics, sports, rehabilitation and neurology. Current methods applied to analyze the …
[HTML][HTML] Human activity recognition based on hybrid learning algorithm for wearable sensor data
Abstract Human Activity Recognition (HAR), based on sensor devices and the Internet of
Things (IoT), attracted many researchers since it has diversified applications in health …
Things (IoT), attracted many researchers since it has diversified applications in health …