Echoattack: Practical inaudible attacks to smart earbuds

G Li, Z Cao, T Li - Proceedings of the 21st Annual International …, 2023 - dl.acm.org
Recent years have shown substantial interest in revealing vulnerability issues of voice-
controllable systems on smartphones and smart speakers. While significant prior works have …

BudsAuth: Towards Gesture-Wise Continuous User Authentication Through Earbuds Vibration Sensing

Y Wang, T Yang, C Wang, F Li, P Hu… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The surge in popularity of wireless headphones, particularly wireless earbuds, as smart
wearables, has been notable in recent years. These devices, empowered by artificial …

Earspeech: Exploring in-ear occlusion effect on earphones for data-efficient airborne speech enhancement

F Han, P Yang, Y Zuo, F Shang, F Xu… - Proceedings of the ACM on …, 2024 - dl.acm.org
Earphones have become a popular voice input and interaction device. However, airborne
speech is susceptible to ambient noise, making it necessary to improve the quality and …

Piezobud: A piezo-aided secure earbud with practical speaker authentication

G Li, H Zeng, H Guo, Y Ren, A Dixon, Z Cao… - Proceedings of the 22nd …, 2024 - dl.acm.org
With the advancement of AI-powered personal voice assistants, speaker authentication via
earbuds has become increasingly vital, serving as a critical interface between users and …

From Virtual Touch to Tesla Command: Unlocking Unauthenticated Control Chains From Smart Glasses for Vehicle Takeover

X Zhang, Y Tu, Y Long, L Shan… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
This paper studies vulnerabilities at the intersection of wearable devices and automated
control systems. Particularly, we focus on exploiting smart glasses as an entry point and …

FuzzyTrack: User Adaptive Cervical Spine Motion Prediction with Earable Inertial Sensing

C Luo, Y Li, G Chen, X Li, J Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The widespread use of electronic devices has contributed to an increase in poor posture,
particularly when it comes to the cervical spine, leading to various cervical vertebral pain …

Spatio-temporal dual-attention transformer for time-series behavioral biometrics

KN Nguyen, S Rasnayaka… - … and Identity Science, 2024 - ieeexplore.ieee.org
Continuous Authentication (CA) using behavioral biometrics is a type of biometric
identification that recognizes individuals based on their unique behavioral characteristics …

A classifications framework for continuous biometric authentication (2018–2024)

D Boshoff, GP Hancke - Computers & Security, 2025 - Elsevier
The increase in personal devices, the amount of private and sensitive information these
devices store/process, and the importance of this information have introduced vital security …

HCR-Auth: Reliable Bone Conduction Earphone Authentication with Head Contact Response

Z He, J Chen, C Wu, K He, R Du, J Jia, Y Gu… - Proceedings of the ACM …, 2024 - dl.acm.org
Earables, or ear wearables, are increasingly being used for a variety of personal
applications, prompting the development of authentication schemes to safeguard user …

Char: Composite head-body activities recognition with a single earable device

P Zhu, Y Zou, W Li, K Wu - 2023 IEEE International Conference …, 2023 - ieeexplore.ieee.org
The increasing popularity of earable devices stimulates great academic interest to design
novel head gesture-based interaction technologies. But existing works simply consider it as …