Behavioral biometrics for continuous authentication in the internet-of-things era: An artificial intelligence perspective
In the Internet-of-Things (IoT) era, user authentication is essential to ensure the security of
connected devices and the customization of passive services. However, conventional …
connected devices and the customization of passive services. However, conventional …
A survey on gait recognition
C Wan, L Wang, VV Phoha - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Recognizing people by their gait has become more and more popular nowadays due to the
following reasons. First, gait recognition can work well remotely. Second, gait recognition …
following reasons. First, gait recognition can work well remotely. Second, gait recognition …
Push the limit of acoustic gesture recognition
With the flourish of the smart devices and their applications, controlling devices using
gestures has attracted increasing attention for ubiquitous sensing and interaction. Recent …
gestures has attracted increasing attention for ubiquitous sensing and interaction. Recent …
[HTML][HTML] A survey on deploying mobile deep learning applications: A systemic and technical perspective
With the rapid development of mobile devices and deep learning, mobile smart applications
using deep learning technology have sprung up. It satisfies multiple needs of users, network …
using deep learning technology have sprung up. It satisfies multiple needs of users, network …
EarEcho: Using ear canal echo for wearable authentication
Smart wearable devices have recently become one of the major technological trends and
been widely adopted by the general public. Wireless earphones, in particular, have seen a …
been widely adopted by the general public. Wireless earphones, in particular, have seen a …
Mask does not matter: Anti-spoofing face authentication using mmWave without on-site registration
Face authentication (FA) schemes are universally adopted. However, current FA systems
are mainly camera-based and hence susceptible to face occlusion (eg, facial masks) and …
are mainly camera-based and hence susceptible to face occlusion (eg, facial masks) and …
Vocalprint: exploring a resilient and secure voice authentication via mmwave biometric interrogation
With the continuing growth of voice-controlled devices, voice metrics have been widely used
for user identification. However, voice biometrics is vulnerable to replay attacks and ambient …
for user identification. However, voice biometrics is vulnerable to replay attacks and ambient …
Metasense: few-shot adaptation to untrained conditions in deep mobile sensing
Recent improvements in deep learning and hardware support offer a new breakthrough in
mobile sensing; we could enjoy context-aware services and mobile healthcare on a mobile …
mobile sensing; we could enjoy context-aware services and mobile healthcare on a mobile …
UFace: Your Smartphone Can" Hear" Your Facial Expression!
Facial expression recognition (FER) is a crucial task for human-computer interaction and a
multitude of multimedia applications that typically call for friendly, unobtrusive, ubiquitous …
multitude of multimedia applications that typically call for friendly, unobtrusive, ubiquitous …
UltraSE: single-channel speech enhancement using ultrasound
Robust speech enhancement is considered as the holy grail of audio processing and a key
requirement for human-human and human-machine interaction. Solving this task with single …
requirement for human-human and human-machine interaction. Solving this task with single …