Ubiquitous acoustic sensing on commodity iot devices: A survey
With the proliferation of Internet-of-Things (IoT) devices, acoustic sensing attracts significant
attention in recent years. It exploits acoustic transceivers such as microphones and speakers …
attention in recent years. It exploits acoustic transceivers such as microphones and speakers …
On-phone CNN model-based implicit authentication to secure IoT wearables
The connectivity of smart technologies, such as smartphones and smart wearables, is ever-
increasing with the emergence of the internet of things (IoT). This technological …
increasing with the emergence of the internet of things (IoT). This technological …
Push the limit of device-free acoustic sensing on commercial mobile devices
Device-free acoustic sensing has obsessed with renovating human-computer interaction
techniques for all-sized mobile devices in various applications. Recent advances have …
techniques for all-sized mobile devices in various applications. Recent advances have …
HandLock: Enabling 2-FA for smart home voice assistants using inaudible acoustic signal
The use of voice-control technology has become mainstream and is growing worldwide.
While voice assistants provide convenience through automation and control of home …
While voice assistants provide convenience through automation and control of home …
PD-FMCW: Push the limit of device-free acoustic sensing using phase difference in FMCW
Device-free acoustic sensing has obsessed with renovating human-computer interaction
techniques for all-sized mobile devices in various applications. Recent advances have …
techniques for all-sized mobile devices in various applications. Recent advances have …
Jawthenticate: Microphone-free Speech-based Authentication using Jaw Motion and Facial Vibrations
In this paper, we present Jawthenticate, an earable system that authenticates a user using
audible or inaudible speech without using a microphone. This system can overcome the …
audible or inaudible speech without using a microphone. This system can overcome the …
Enhanced cell phone security: An ultrasonic and sensor fusion-based persistent cell phone protection method integrating anti-theft & identity authentication
J Zhang, L ** malls, restaurants, and book shops usually offer free WiFi to customers, but they
cannot afford non-customers (ie, WiFi free riders) consuming their limited bandwidth. To …
cannot afford non-customers (ie, WiFi free riders) consuming their limited bandwidth. To …
Smart_Auth: user identity authentication based on smartphone motion sensors
Z Wang, N Zhou, F Chen, X Feng, F Liu… - … on Image, Vision …, 2021 - ieeexplore.ieee.org
Nowadays, the smartphone saves a lot of the private information of users. The traditional
authentication methods, such as passwords or patterns, have some limitations, so it is not …
authentication methods, such as passwords or patterns, have some limitations, so it is not …
Secure voice input on augmented reality headsets
Voice-based input is usually used as the primary input method for augmented reality (AR)
headsets due to immersive AR experience and good recognition performance. However …
headsets due to immersive AR experience and good recognition performance. However …