Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Authentication and authorization for mobile IoT devices using biofeatures: Recent advances and future trends
Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the
purpose of this investigation is to summarise the factors that hinder biometrics models' …
purpose of this investigation is to summarise the factors that hinder biometrics models' …
Continuous user identification in distance learning: a recent technology perspective
The worldwide shift to distance learning at Higher Education Institutions (HEIs) during the
COVID-19 global pandemic has raised several concerns about the credibility of online …
COVID-19 global pandemic has raised several concerns about the credibility of online …
Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones
Current smartphones generally cannot continuously authenticate users during runtime. This
poses severe security and privacy threats: A malicious user can manipulate the phone if …
poses severe security and privacy threats: A malicious user can manipulate the phone if …
A study on continuous authentication using a combination of keystroke and mouse biometrics
In this paper we focus on a context independent continuous authentication system that
reacts on every separate action performed by a user. We contribute with a robust dynamic …
reacts on every separate action performed by a user. We contribute with a robust dynamic …
Machine and deep learning applications to mouse dynamics for continuous user authentication
Static authentication methods, like passwords, grow increasingly weak with advancements
in technology and attack strategies. Continuous authentication has been proposed as a …
in technology and attack strategies. Continuous authentication has been proposed as a …
Continuous authentication of mobile user: Fusion of face image and inertial measurement unit data
Mobile devices can carry large amounts of personal data, but are often left unsecured. PIN
locks are inconvenient to use and thus have seen low adoption (33% of users). While …
locks are inconvenient to use and thus have seen low adoption (33% of users). While …
Continuous authentication using one-dimensional multi-resolution local binary patterns (1DMRLBP) in ECG biometrics
W Louis, M Komeili… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
The objective of a continuous authentication system is to continuously monitor the identity of
subjects using biometric systems. In this paper, we proposed a novel feature extraction and …
subjects using biometric systems. In this paper, we proposed a novel feature extraction and …
Continuous authentication with touch behavioral biometrics and voice on wearable glasses
Wearable glasses are on the rising edge of development with great user popularity.
However, user data stored on these devices bring privacy risks to the owner. To better …
However, user data stored on these devices bring privacy risks to the owner. To better …
Intrusion detection using mouse dynamics
Compared to other behavioural biometrics, mouse dynamics is a less explored area.
General purpose data sets containing unrestricted mouse usage data are usually not …
General purpose data sets containing unrestricted mouse usage data are usually not …
A lightweight continuous authentication protocol for the Internet of Things
YH Chuang, NW Lo, CY Yang, SW Tang - Sensors, 2018 - mdpi.com
Modern societies are moving toward an information-oriented environment. To gather and
utilize information around people's modern life, tiny devices with all kinds of sensing devices …
utilize information around people's modern life, tiny devices with all kinds of sensing devices …