A survey on end-edge-cloud orchestrated network computing paradigms: Transparent computing, mobile edge computing, fog computing, and cloudlet
Sending data to the cloud for analysis was a prominent trend during the past decades,
driving cloud computing as a dominant computing paradigm. However, the dramatically …
driving cloud computing as a dominant computing paradigm. However, the dramatically …
A survey on methods and challenges in EEG based authentication
EEG is the recording of electrical activities of the brain, usually along the scalp surface,
which are the results of synaptic activations of the brain's neurons. In recent years, it has …
which are the results of synaptic activations of the brain's neurons. In recent years, it has …
Towards a universal and privacy preserving EEG-based authentication system
EEG-based authentication has gained much interest in recent years. However, despite its
growing appeal, there are still various challenges to their practical use, such as lack of …
growing appeal, there are still various challenges to their practical use, such as lack of …
A system-driven taxonomy of attacks and defenses in adversarial machine learning
Machine Learning (ML) algorithms, specifically supervised learning, are widely used in
modern real-world applications, which utilize Computational Intelligence (CI) as their core …
modern real-world applications, which utilize Computational Intelligence (CI) as their core …
Mindid: Person identification from brain waves through attention-based recurrent neural network
Person identification technology recognizes individuals by exploiting their unique,
measurable physiological and behavioral characteristics. However, the state-of-the-art …
measurable physiological and behavioral characteristics. However, the state-of-the-art …
Review of EEG-based biometrics in 5G-IoT: Current trends and future prospects
The increasing integration of the Internet of Things (IoT) into daily life has led to significant
changes in our social interactions. The advent of innovative IoT solutions, combined with the …
changes in our social interactions. The advent of innovative IoT solutions, combined with the …
Smartphone user identification/authentication using accelerometer and gyroscope data
With the increasing popularity of smartphones, user identification has become a critical
component to ensure security and privacy. This study looked into how smartphone sensors' …
component to ensure security and privacy. This study looked into how smartphone sensors' …
CABA: Continuous authentication based on BioAura
Most computer systems authenticate users only once at the time of initial login, which can
lead to security concerns. Continuous authentication has been explored as an approach for …
lead to security concerns. Continuous authentication has been explored as an approach for …
Sceptre: a pervasive, non-invasive, and programmable gesture recognition technology
Communication and collaboration between deaf people and hearing people is hindered by
lack of a common language. Although there has been a lot of research in this domain, there …
lack of a common language. Although there has been a lot of research in this domain, there …
A bio-signal based framework to secure mobile devices
Nowadays, mobile devices are often equipped with high-end processing units and large
storage space. Mobile users usually store personal, official, and large amount of multimedia …
storage space. Mobile users usually store personal, official, and large amount of multimedia …