Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A systematic review of human activity recognition based on mobile devices: overview, progress and trends
Due to the ever-growing powers in sensing, computing, communicating and storing, mobile
devices (eg, smartphone, smartwatch, smart glasses) become ubiquitous and an …
devices (eg, smartphone, smartwatch, smart glasses) become ubiquitous and an …
Online banking user authentication methods: a systematic literature review
Online banking has become increasingly popular in recent years, making it a target for
cyberattacks. Banks have implemented various user authentication methods to protect their …
cyberattacks. Banks have implemented various user authentication methods to protect their …
EchoHand: High accuracy and presentation attack resistant hand authentication on commodity mobile devices
Biometric authentication schemes, ie, fingerprint and face authentication, raise serious
privacy concerns. To alleviate such concerns, hand authentication has been proposed …
privacy concerns. To alleviate such concerns, hand authentication has been proposed …
Uncovering user interactions on smartphones via contactless wireless charging side channels
Today, there is an increasing number of smartphones supporting wireless charging that
leverages electromagnetic induction to transmit power from a wireless charger to the …
leverages electromagnetic induction to transmit power from a wireless charger to the …
SwipePass: Acoustic-based second-factor user authentication for smartphones
Pattern lock-based authentication has been widely adopted in modern smartphones.
However, this scheme relies essentially on passwords, making it vulnerable to various side …
However, this scheme relies essentially on passwords, making it vulnerable to various side …
Beyond the pixel world: A novel acoustic-based face anti-spoofing system for smartphones
2D face presentation attacks are one of the most notorious and pervasive face spoofing
types, which have caused pressing security issues to facial authentication systems. While …
types, which have caused pressing security issues to facial authentication systems. While …
Authentisense: A scalable behavioral biometrics authentication scheme using few-shot learning for mobile platforms
Mobile applications are widely used for online services sharing a large amount of personal
data online. One-time authentication techniques such as passwords and physiological …
data online. One-time authentication techniques such as passwords and physiological …
LipAuth: Securing smartphone user authentication with lip motion patterns
Modern smartphones hold massive amounts of private and potentially sensitive user data
(eg, identity and messages). User authentication is the key measure to protect such sensitive …
(eg, identity and messages). User authentication is the key measure to protect such sensitive …
HearFit: Fitness monitoring on smart speakers via active acoustic sensing
Fitness can help to strengthen muscles, increase resistance to diseases and improve body
shape. Nowadays, more and more people tend to exercise at home/office, since they lack …
shape. Nowadays, more and more people tend to exercise at home/office, since they lack …
Fine-grained and context-aware behavioral biometrics for pattern lock on smartphones
Pattern lock has been widely used in smartphones as a simple and effective authentication
mechanism, which however is shown to be vulnerable to various attacks. In this paper, we …
mechanism, which however is shown to be vulnerable to various attacks. In this paper, we …