A survey on end-edge-cloud orchestrated network computing paradigms: Transparent computing, mobile edge computing, fog computing, and cloudlet

J Ren, D Zhang, S He, Y Zhang, T Li - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Sending data to the cloud for analysis was a prominent trend during the past decades,
driving cloud computing as a dominant computing paradigm. However, the dramatically …

A survey on methods and challenges in EEG based authentication

AJ Bidgoly, HJ Bidgoly, Z Arezoumand - Computers & Security, 2020 - Elsevier
EEG is the recording of electrical activities of the brain, usually along the scalp surface,
which are the results of synaptic activations of the brain's neurons. In recent years, it has …

Towards a universal and privacy preserving EEG-based authentication system

AJ Bidgoly, HJ Bidgoly, Z Arezoumand - Scientific Reports, 2022 - nature.com
EEG-based authentication has gained much interest in recent years. However, despite its
growing appeal, there are still various challenges to their practical use, such as lack of …

A system-driven taxonomy of attacks and defenses in adversarial machine learning

K Sadeghi, A Banerjee… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Machine Learning (ML) algorithms, specifically supervised learning, are widely used in
modern real-world applications, which utilize Computational Intelligence (CI) as their core …

Mindid: Person identification from brain waves through attention-based recurrent neural network

X Zhang, L Yao, SS Kanhere, Y Liu, T Gu… - Proceedings of the ACM …, 2018 - dl.acm.org
Person identification technology recognizes individuals by exploiting their unique,
measurable physiological and behavioral characteristics. However, the state-of-the-art …

Review of EEG-based biometrics in 5G-IoT: Current trends and future prospects

T Beyrouthy, N Mostafa, A Roshdy, AS Karar, S Alkork - Applied Sciences, 2024 - mdpi.com
The increasing integration of the Internet of Things (IoT) into daily life has led to significant
changes in our social interactions. The advent of innovative IoT solutions, combined with the …

Smartphone user identification/authentication using accelerometer and gyroscope data

E Al-Mahadeen, M Alghamdi, AS Tarawneh… - Sustainability, 2023 - mdpi.com
With the increasing popularity of smartphones, user identification has become a critical
component to ensure security and privacy. This study looked into how smartphone sensors' …

CABA: Continuous authentication based on BioAura

A Mosenia, S Sur-Kolay… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Most computer systems authenticate users only once at the time of initial login, which can
lead to security concerns. Continuous authentication has been explored as an approach for …

Sceptre: a pervasive, non-invasive, and programmable gesture recognition technology

P Paudyal, A Banerjee, SKS Gupta - Proceedings of the 21st …, 2016 - dl.acm.org
Communication and collaboration between deaf people and hearing people is hindered by
lack of a common language. Although there has been a lot of research in this domain, there …

A bio-signal based framework to secure mobile devices

P Kumar, R Saini, PP Roy, DP Dogra - Journal of Network and Computer …, 2017 - Elsevier
Nowadays, mobile devices are often equipped with high-end processing units and large
storage space. Mobile users usually store personal, official, and large amount of multimedia …