Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on privacy and security of Internet of Things
Abstract Internet of Things (IoT) has fundamentally changed the way information technology
and communication environments work, with significant advantages derived from wireless …
and communication environments work, with significant advantages derived from wireless …
Recent Trends of Authentication Methods in Extended Reality: A Survey
Extended Reality (XR) is increasingly gaining momentum in industries such as retail, health,
and education. To protect users' personal data, establishing a secure authentication system …
and education. To protect users' personal data, establishing a secure authentication system …
Blinkey: A two-factor user authentication method for virtual reality devices
Virtual Reality (VR) has shown promising potentials in many applications, such as e-
business, healthcare, and social networking. Rich information regarding user's activities and …
business, healthcare, and social networking. Rich information regarding user's activities and …
WiONE: One-shot learning for environment-robust device-free user authentication via commodity Wi-Fi in man–machine system
User authentication is the first and most critical step in protecting a man-machine system
from a malicious spoofer. However, security and privacy are just like the two sides of one …
from a malicious spoofer. However, security and privacy are just like the two sides of one …
Shoulder-surfing resistant authentication for augmented reality
Augmented Reality (AR) Head-Mounted Displays (HMD) are increasingly used in industry to
digitize processes and enhance user experience by enabling real-time interaction with both …
digitize processes and enhance user experience by enabling real-time interaction with both …
PrivacyGuard: Exploring Hidden Cross-App Privacy Leakage Threats In IoT Apps
The increasing use of the Internet of Things (IoT) technology has made our lives convenient,
however, it also poses new security and privacy threats. In this work, we study a new type of …
however, it also poses new security and privacy threats. In this work, we study a new type of …
RF-Rhythm: Secure and usable two-factor RFID authentication
Passive RFID technology is widely used in user authentication and access control. We
propose RF-Rhythm, a secure and usable two-factor RFID authentication system with strong …
propose RF-Rhythm, a secure and usable two-factor RFID authentication system with strong …
Securing PIN‐based authentication in smartwatches with just two gestures
Smartwatches are becoming increasingly ubiquitous as they offer new capabilities to
develop sophisticated applications that make daily life easier and more convenient for …
develop sophisticated applications that make daily life easier and more convenient for …
Sok: A systematic literature review of knowledge-based authentication on augmented reality head-mounted displays
The adoption of Augmented Reality (AR) technology has increased over the years. AR
enhances various activities for consumers and businesses, particularly in industrial contexts …
enhances various activities for consumers and businesses, particularly in industrial contexts …
TouchAccess: Unlock IoT Devices on Touching by Leveraging Human-Induced EM Emanations
Y Liu, Z Xu, Z Qin, L Ou, W ** - IEEE Transactions on Mobile …, 2024 - ieeexplore.ieee.org
Internet of Things (IoT) devices play essential roles in both industry and daily scenarios.
However, unlike smartphones and computers, IoT devices typically lack conventional user …
However, unlike smartphones and computers, IoT devices typically lack conventional user …