A survey of privacy vulnerabilities of mobile device sensors
The number of mobile devices, such as smartphones and smartwatches, is relentlessly
increasing, to almost 6.8 billion by 2022, and along with it, the amount of personal and …
increasing, to almost 6.8 billion by 2022, and along with it, the amount of personal and …
Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile Authentication
Throughout the past several decades, mobile devices have evolved in capability and
popularity at growing rates while improvement in security has fallen behind. As smartphones …
popularity at growing rates while improvement in security has fallen behind. As smartphones …
[HTML][HTML] BehavePassDB: public database for mobile behavioral biometrics and benchmark evaluation
Mobile behavioral biometrics have become a popular topic of research, reaching promising
results in terms of authentication, exploiting a multimodal combination of touchscreen and …
results in terms of authentication, exploiting a multimodal combination of touchscreen and …
[HTML][HTML] Mobile behavioral biometrics for passive authentication
Current mobile user authentication systems based on PIN codes, fingerprint, and face
recognition have several shortcomings. Such limitations have been addressed in the …
recognition have several shortcomings. Such limitations have been addressed in the …
Network Detection of Interactive {SSH} Impostors Using Deep Learning
Impostors who have stolen a user's SSH login credentials can inflict significant harm to the
systems to which the user has remote access. We consider the problem of identifying such …
systems to which the user has remote access. We consider the problem of identifying such …
TypeFormer: Transformers for mobile keystroke biometrics
The broad usage of mobile devices nowadays, the sensitiveness of the information
contained in them, and the shortcomings of current mobile user authentication methods are …
contained in them, and the shortcomings of current mobile user authentication methods are …
Mobile keystroke biometrics using transformers
Among user authentication methods, behavioural biometrics has proven to be effective
against identity theft as well as user-friendly and unobtrusive. One of the most popular traits …
against identity theft as well as user-friendly and unobtrusive. One of the most popular traits …
Keystroke verification challenge (KVC): biometric and fairness benchmark evaluation
Analyzing keystroke dynamics (KD) for biometric verification has several advantages: it is
among the most discriminative behavioral traits; keyboards are among the most common …
among the most discriminative behavioral traits; keyboards are among the most common …
edBB-Demo: biometrics and behavior analysis for online educational platforms
We present edBB-Demo, a demonstrator of an AI-powered research platform for student
monitoring in remote education. The edBB platform aims to study the challenges associated …
monitoring in remote education. The edBB platform aims to study the challenges associated …
Biometric identification based on keystroke dynamics
The purpose of the paper is to study how changes in neural network architecture and its
hyperparameters affect the results of biometric identification based on keystroke dynamics …
hyperparameters affect the results of biometric identification based on keystroke dynamics …