Adaptive biometric systems: Review and perspectives

PH Pisani, A Mhenni, R Giot, E Cherrier, N Poh… - ACM Computing …, 2019 - dl.acm.org
With the widespread of computing and mobile devices, authentication using biometrics has
received greater attention. Although biometric systems usually provide good solutions, the …

A systematic literature review on latest keystroke dynamics based models

S Roy, J Pradhan, A Kumar, DRD Adhikary… - IEEE …, 2022 - ieeexplore.ieee.org
The purpose of this study is to conduct a comprehensive evaluation and analysis of the most
recent studies on the implications of keystroke dynamics (KD) patterns in user …

High security user authentication enabled by piezoelectric keystroke dynamics and machine learning

A Huang, S Gao, J Chen, L Xu… - IEEE Sensors Journal, 2020 - ieeexplore.ieee.org
With the rapid development of electric and information technologies, security issues are
becoming a pressing concern. This has given rise to a plethora of authentication techniques …

Double serial adaptation mechanism for keystroke dynamics authentication based on a single password

A Mhenni, E Cherrier, C Rosenberger, NEB Amara - Computers & Security, 2019 - Elsevier
Cyber-attacks have spread all over the world to steal information such as trade secrets,
intellectual property and banking data. Facing the danger of the insecurity of saved data …

Analysis of Doddington zoo classification for user dependent template update: Application to keystroke dynamics recognition

A Mhenni, E Cherrier, C Rosenberger… - Future Generation …, 2019 - Elsevier
Biometric authentication systems are increasingly considered in different access control
applications. Regarding that users have completely different interactions with these …

Exploring Earable-based Passive User Authentication via Interpretable In-ear Breathing Biometrics

F Han, P Yang, Y Feng, H Du… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
As earable devices have become indispensable smart devices in people's lives, earable-
based user authentication has gradually attracted widespread attention. In our work, we …

Vulnerability of adaptive strategies of keystroke dynamics based authentication against different attack types

A Mhenni, D Migdal, E Cherrier… - … on Cyberworlds (CW …, 2019 - ieeexplore.ieee.org
The attacks considered for keystroke dynamics study especially adaptive strategies have
commonly treated impersonation attempts known as zero-effort attacks. These attacks are …

[PDF][PDF] Authentification biométrique: comment (ré) concilier sécurité, utilisabilité et respect de la vie privée?

E Cherrier - 2021 - theses.hal.science
Authentification biométrique: comment (ré)concilier sécurité, utilisabilité et respect de la vie
privée? Page 1 HAL Id: tel-03326656 https://theses.hal.science/tel-03326656v2 Submitted on …

Deep learning vs hand-crafted features for face recognition under uncontrolled conditions

L Ouannes, AB Khalifa… - … Conference on Signal …, 2019 - ieeexplore.ieee.org
Facial recognition in degraded conditions has become a very active and widely used area in
several fields such as video surveillance and access control. Indeed, the presence of facial …

Towards engineering reliable keystroke biometrics systems

A Shah - 2020 - search.proquest.com
In this thesis, we argue that most of the work in the literature on behaviouralbased biometric
systems using AI and machine learning is immature and unreliable. Our analysis and …