Feature extraction and selection for myoelectric control based on wearable EMG sensors

A Phinyomark, R N. Khushaba, E Scheme - Sensors, 2018 - mdpi.com
Specialized myoelectric sensors have been used in prosthetics for decades, but, with recent
advancements in wearable sensors, wireless communication and embedded technologies …

Sok: Authentication in augmented and virtual reality

S Stephenson, B Pal, S Fan… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Augmented reality (AR) and virtual reality (VR) devices are emerging as prominent
contenders to today's personal computers. As personal devices, users will use AR and VR to …

Going through the motions:{AR/VR} keylogging from user head motions

C Slocum, Y Zhang, N Abu-Ghazaleh… - 32nd USENIX Security …, 2023 - usenix.org
Augmented Reality/Virtual Reality (AR/VR) are the next step in the evolution of ubiquitous
computing after personal computers to mobile devices. Applications of AR/VR continue to …

Your firmware has arrived: A study of firmware update vulnerabilities

Y Wu, J Wang, Y Wang, S Zhai, Z Li, Y He… - 33rd USENIX Security …, 2024 - usenix.org
Embedded devices are increasingly ubiquitous in our society. Firmware updates are one of
the primary mechanisms to mitigate vulnerabilities in embedded systems. However, the …

Privacy leakage via unrestricted motion-position sensors in the age of virtual reality: A study of snoo** typed input on virtual keyboards

Y Wu, C Shi, T Zhang, P Walker, J Liu… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Virtual Reality (VR) has gained popularity in numerous fields, including gaming, social
interactions, shop**, and education. In this paper, we conduct a comprehensive study to …

Hidden reality: Caution, your hand gesture inputs in the immersive virtual world are visible to all!

SRK Gopal, D Shukla, JD Wheelock… - 32nd USENIX Security …, 2023 - usenix.org
Text entry is an inevitable task while using Virtual Reality (VR) devices in a wide range of
applications such as remote learning, gaming, and virtual meeting. VR users enter …

[HTML][HTML] A Review on Secure Authentication Mechanisms for Mobile Security

SSU Hasan, A Ghani, A Daud, H Akbar, MF Khan - Sensors, 2025 - mdpi.com
Cybersecurity, complimenting authentication, has become the backbone of the Internet of
Things. In the authentication process, the word authentication is of the utmost importance, as …

A feature extraction issue for myoelectric control based on wearable EMG sensors

A Phinyomark, E Scheme - 2018 IEEE Sensors Applications …, 2018 - ieeexplore.ieee.org
With recent advancements in wearable sensors, wireless communication and embedded
computing technologies, wearable EMG armbands are now commercially available and …

Recent Trends of Authentication Methods in Extended Reality: A Survey

L Hallal, J Rhinelander, R Venkat - Applied System Innovation, 2024 - mdpi.com
Extended Reality (XR) is increasingly gaining momentum in industries such as retail, health,
and education. To protect users' personal data, establishing a secure authentication system …

Towards ubiquitous RE: A perspective on requirements engineering in the era of digital transformation

K Villela, A Hess, M Koch, R Falcao… - 2018 IEEE 26th …, 2018 - ieeexplore.ieee.org
We are now living in the era of digital transformation: Innovative and digital business models
are transforming the global business world and society. However, the authors of this paper …