A systematic review of human activity recognition based on mobile devices: overview, progress and trends

Y Yin, L **e, Z Jiang, F **ao, J Cao… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Due to the ever-growing powers in sensing, computing, communicating and storing, mobile
devices (eg, smartphone, smartwatch, smart glasses) become ubiquitous and an …

Online banking user authentication methods: a systematic literature review

NA Karim, OA Khashan, H Kanaker… - Ieee …, 2023 - ieeexplore.ieee.org
Online banking has become increasingly popular in recent years, making it a target for
cyberattacks. Banks have implemented various user authentication methods to protect their …

EchoHand: High accuracy and presentation attack resistant hand authentication on commodity mobile devices

C Wu, J Chen, K He, Z Zhao, R Du… - Proceedings of the 2022 …, 2022 - dl.acm.org
Biometric authentication schemes, ie, fingerprint and face authentication, raise serious
privacy concerns. To alleviate such concerns, hand authentication has been proposed …

Uncovering user interactions on smartphones via contactless wireless charging side channels

T Ni, X Zhang, C Zuo, J Li, Z Yan… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Today, there is an increasing number of smartphones supporting wireless charging that
leverages electromagnetic induction to transmit power from a wireless charger to the …

SwipePass: Acoustic-based second-factor user authentication for smartphones

Y Chen, T Ni, W Xu, T Gu - Proceedings of the ACM on Interactive …, 2022 - dl.acm.org
Pattern lock-based authentication has been widely adopted in modern smartphones.
However, this scheme relies essentially on passwords, making it vulnerable to various side …

Beyond the pixel world: A novel acoustic-based face anti-spoofing system for smartphones

C Kong, K Zheng, S Wang, A Rocha… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
2D face presentation attacks are one of the most notorious and pervasive face spoofing
types, which have caused pressing security issues to facial authentication systems. While …

Authentisense: A scalable behavioral biometrics authentication scheme using few-shot learning for mobile platforms

H Fereidooni, J König, P Rieger, M Chilese… - arxiv preprint arxiv …, 2023 - arxiv.org
Mobile applications are widely used for online services sharing a large amount of personal
data online. One-time authentication techniques such as passwords and physiological …

LipAuth: Securing smartphone user authentication with lip motion patterns

L Kuang, F Zeng, D Liu, H Cao… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Modern smartphones hold massive amounts of private and potentially sensitive user data
(eg, identity and messages). User authentication is the key measure to protect such sensitive …

HearFit: Fitness monitoring on smart speakers via active acoustic sensing

Y **e, F Li, Y Wu, Y Wang - IEEE INFOCOM 2021-IEEE …, 2021 - ieeexplore.ieee.org
Fitness can help to strengthen muscles, increase resistance to diseases and improve body
shape. Nowadays, more and more people tend to exercise at home/office, since they lack …

Fine-grained and context-aware behavioral biometrics for pattern lock on smartphones

D Shi, D Tao, J Wang, M Yao, Z Wang, H Chen… - Proceedings of the …, 2021 - dl.acm.org
Pattern lock has been widely used in smartphones as a simple and effective authentication
mechanism, which however is shown to be vulnerable to various attacks. In this paper, we …