Feature extraction and selection for myoelectric control based on wearable EMG sensors
Specialized myoelectric sensors have been used in prosthetics for decades, but, with recent
advancements in wearable sensors, wireless communication and embedded technologies …
advancements in wearable sensors, wireless communication and embedded technologies …
Sok: Authentication in augmented and virtual reality
Augmented reality (AR) and virtual reality (VR) devices are emerging as prominent
contenders to today's personal computers. As personal devices, users will use AR and VR to …
contenders to today's personal computers. As personal devices, users will use AR and VR to …
Going through the motions:{AR/VR} keylogging from user head motions
Augmented Reality/Virtual Reality (AR/VR) are the next step in the evolution of ubiquitous
computing after personal computers to mobile devices. Applications of AR/VR continue to …
computing after personal computers to mobile devices. Applications of AR/VR continue to …
Your firmware has arrived: A study of firmware update vulnerabilities
Embedded devices are increasingly ubiquitous in our society. Firmware updates are one of
the primary mechanisms to mitigate vulnerabilities in embedded systems. However, the …
the primary mechanisms to mitigate vulnerabilities in embedded systems. However, the …
Privacy leakage via unrestricted motion-position sensors in the age of virtual reality: A study of snoo** typed input on virtual keyboards
Virtual Reality (VR) has gained popularity in numerous fields, including gaming, social
interactions, shop**, and education. In this paper, we conduct a comprehensive study to …
interactions, shop**, and education. In this paper, we conduct a comprehensive study to …
Hidden reality: Caution, your hand gesture inputs in the immersive virtual world are visible to all!
Text entry is an inevitable task while using Virtual Reality (VR) devices in a wide range of
applications such as remote learning, gaming, and virtual meeting. VR users enter …
applications such as remote learning, gaming, and virtual meeting. VR users enter …
[HTML][HTML] A Review on Secure Authentication Mechanisms for Mobile Security
Cybersecurity, complimenting authentication, has become the backbone of the Internet of
Things. In the authentication process, the word authentication is of the utmost importance, as …
Things. In the authentication process, the word authentication is of the utmost importance, as …
A feature extraction issue for myoelectric control based on wearable EMG sensors
With recent advancements in wearable sensors, wireless communication and embedded
computing technologies, wearable EMG armbands are now commercially available and …
computing technologies, wearable EMG armbands are now commercially available and …
Recent Trends of Authentication Methods in Extended Reality: A Survey
Extended Reality (XR) is increasingly gaining momentum in industries such as retail, health,
and education. To protect users' personal data, establishing a secure authentication system …
and education. To protect users' personal data, establishing a secure authentication system …
Towards ubiquitous RE: A perspective on requirements engineering in the era of digital transformation
We are now living in the era of digital transformation: Innovative and digital business models
are transforming the global business world and society. However, the authors of this paper …
are transforming the global business world and society. However, the authors of this paper …