Behavioral biometrics for continuous authentication in the internet-of-things era: An artificial intelligence perspective

Y Liang, S Samtani, B Guo, Z Yu - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
In the Internet-of-Things (IoT) era, user authentication is essential to ensure the security of
connected devices and the customization of passive services. However, conventional …

A survey on gait recognition

C Wan, L Wang, VV Phoha - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Recognizing people by their gait has become more and more popular nowadays due to the
following reasons. First, gait recognition can work well remotely. Second, gait recognition …

Push the limit of acoustic gesture recognition

Y Wang, J Shen, Y Zheng - IEEE Transactions on Mobile …, 2020 - ieeexplore.ieee.org
With the flourish of the smart devices and their applications, controlling devices using
gestures has attracted increasing attention for ubiquitous sensing and interaction. Recent …

[HTML][HTML] A survey on deploying mobile deep learning applications: A systemic and technical perspective

Y Wang, J Wang, W Zhang, Y Zhan, S Guo… - Digital Communications …, 2022 - Elsevier
With the rapid development of mobile devices and deep learning, mobile smart applications
using deep learning technology have sprung up. It satisfies multiple needs of users, network …

EarEcho: Using ear canal echo for wearable authentication

Y Gao, W Wang, VV Phoha, W Sun, Z ** - Proceedings of the ACM on …, 2019 - dl.acm.org
Smart wearable devices have recently become one of the major technological trends and
been widely adopted by the general public. Wireless earphones, in particular, have seen a …

Mask does not matter: Anti-spoofing face authentication using mmWave without on-site registration

W Xu, W Song, J Liu, Y Liu, X Cui, Y Zheng… - Proceedings of the 28th …, 2022 - dl.acm.org
Face authentication (FA) schemes are universally adopted. However, current FA systems
are mainly camera-based and hence susceptible to face occlusion (eg, facial masks) and …

Vocalprint: exploring a resilient and secure voice authentication via mmwave biometric interrogation

H Li, C Xu, AS Rathore, Z Li, H Zhang, C Song… - Proceedings of the 18th …, 2020 - dl.acm.org
With the continuing growth of voice-controlled devices, voice metrics have been widely used
for user identification. However, voice biometrics is vulnerable to replay attacks and ambient …

Metasense: few-shot adaptation to untrained conditions in deep mobile sensing

T Gong, Y Kim, J Shin, SJ Lee - Proceedings of the 17th Conference on …, 2019 - dl.acm.org
Recent improvements in deep learning and hardware support offer a new breakthrough in
mobile sensing; we could enjoy context-aware services and mobile healthcare on a mobile …

UFace: Your Smartphone Can" Hear" Your Facial Expression!

S Wang, L Zhong, Y Fu, L Chen, J Ren… - Proceedings of the ACM …, 2024 - dl.acm.org
Facial expression recognition (FER) is a crucial task for human-computer interaction and a
multitude of multimedia applications that typically call for friendly, unobtrusive, ubiquitous …

UltraSE: single-channel speech enhancement using ultrasound

K Sun, X Zhang - Proceedings of the 27th annual international …, 2021 - dl.acm.org
Robust speech enhancement is considered as the holy grail of audio processing and a key
requirement for human-human and human-machine interaction. Solving this task with single …