[HTML][HTML] Object detection under the lens of privacy: A critical survey of methods, challenges, and future directions

J Moon, M Bukhari, C Kim, Y Nam, M Maqsood, S Rho - ICT Express, 2024 - Elsevier
This paper presents critical surveillance system functions and considers advances and
challenges for privacy and ethical implications. We examine privacy-protection strategies …

[HTML][HTML] Sensor-based authentication in smartphone: A systematic review

ML Shuwandy, AS Jouda, MA Ahmed, MM Salih… - Journal of Engineering …, 2024 - Elsevier
With the widespread usage of smartphones, users not just using their smartphone for calls
and messaging only, but they are using it for a variety of purposes such as banking …

Toothsonic: Earable authentication via acoustic toothprint

Z Wang, Y Ren, Y Chen, J Yang - Proceedings of the ACM on Interactive …, 2022 - dl.acm.org
Earables (ear wearables) are rapidly emerging as a new platform encompassing a diverse
range of personal applications. The traditional authentication methods hence become less …

Teethpass: Dental occlusion-based user authentication via in-ear acoustic sensing

Y **e, F Li, Y Wu, H Chen, Z Zhao… - IEEE INFOCOM 2022 …, 2022 - ieeexplore.ieee.org
With the rapid development of mobile devices and the fast increase of sensitive data, secure
and convenient mobile authentication technologies are desired. Except for traditional …

LipAuth: Securing smartphone user authentication with lip motion patterns

L Kuang, F Zeng, D Liu, H Cao… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Modern smartphones hold massive amounts of private and potentially sensitive user data
(eg, identity and messages). User authentication is the key measure to protect such sensitive …

Implicit iot authentication using on-phone ann models and breathing data

S Vhaduri, SV Dibbo, W Cheung - Internet of Things, 2023 - Elsevier
The expansionist nature of the Internet of Things (IoT) with smart sensing has integrated
smart technology into the fabric of daily life. From digital health check-ups and personal …

MagSign: Harnessing dynamic magnetism for user authentication on IoT devices

H Cao, D Liu, H Jiang, J Luo - IEEE Transactions on Mobile …, 2022 - ieeexplore.ieee.org
User authentication is a critical module to achieve security and privacy protections,
especially for pervasive Internet of Things (IoT) deployments. However, existing methods on …

Data-augmentation-enabled continuous user authentication via passive vibration response

H Cao, H Jiang, K Yang, S Chen, W Wu… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Continuous identity authentication is critical for privacy protection throughout an entire user
login session. In this article, we propose a continuous user authentication mechanism …

Secure traffic sign recognition: An attention-enabled universal image inpainting mechanism against light patch attacks

H Cao, L Yuan, G Xu, Z He, Z Fang, Y Fang - arxiv preprint arxiv …, 2024 - arxiv.org
Traffic sign recognition systems play a crucial role in assisting drivers to make informed
decisions while driving. However, due to the heavy reliance on deep learning technologies …

HandKey: Knocking-triggered robust vibration signature for keyless unlocking

H Cao, D Liu, H Jiang, C Cai, T Zheng… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Door lock is regarded as a critical line of defending the privacy and security of personal
areas. However, for inner doors in environments like factories, existing locking mechanisms …