Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A systematic deconstruction of human-centric privacy & security threats on mobile phones
Mobile phones are most likely the subject of targeted attacks, such as software exploits. The
resources needed to carry out such attacks are becoming increasingly available and, hence …
resources needed to carry out such attacks are becoming increasingly available and, hence …
An investigation of shoulder surfing attacks on touch-based unlock events
This paper contributes to our understanding of user-centered attacks on smartphones. In
particular, we investigate the likelihood of so-called shoulder surfing attacks during touch …
particular, we investigate the likelihood of so-called shoulder surfing attacks during touch …
Understanding shoulder surfer behavior and attack patterns using virtual reality
In this work, we explore attacker behavior during shoulder surfing. As such behavior is often
opportunistic and difficult to observe in real world settings, we leverage the capabilities of …
opportunistic and difficult to observe in real world settings, we leverage the capabilities of …
SigA: rPPG-based authentication for virtual reality head-mounted display
Consumer-grade virtual reality head-mounted displays (VR-HMD) are becoming
increasingly popular. Despite VR's convenience and booming applications, VR-based …
increasingly popular. Despite VR's convenience and booming applications, VR-based …
Don't Peek at My Chart: Privacy‐preserving Visualization for Mobile Devices
Data visualizations have been widely used on mobile devices like smartphones for various
tasks (eg, visualizing personal health and financial data), making it convenient for people to …
tasks (eg, visualizing personal health and financial data), making it convenient for people to …
Introduction to Authentication using Behavioral Biometrics
The trend of ubiquitous computing goes in parallel with ubiquitous authentication, as users
must confirm their identity several times a day on their devices. Passwords are increasingly …
must confirm their identity several times a day on their devices. Passwords are increasingly …
'can you set it up on your own?'–investigating users' ability to participate in remote-based virtual reality studies
The availability of consumer-grade virtual reality (VR) devices allows user studies to be
conducted remotely, that is in users' homes. In this way, diverse populations can be reached …
conducted remotely, that is in users' homes. In this way, diverse populations can be reached …
" What you think is private is no longer"--Investigating the Aftermath of Shoulder Surfing on Smartphones in Everyday Life through the Eyes of the Victims
Shoulder surfing has been studied extensively, however, it remains unexplored whether and
how it impacts users. Understanding this is important as it determines whether shoulder …
how it impacts users. Understanding this is important as it determines whether shoulder …
An Intersection Attack on the CirclePIN Smartwatch Authentication Mechanism
D Chefrour, Y Sedira, S Chabbi - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
We present a thorough security analysis of a recent smartwatch authentication mechanism
called CirclePIN, which was considered resilient to several attacks, including shoulder …
called CirclePIN, which was considered resilient to several attacks, including shoulder …
Exploring Vulnerabilities in Remote VR User Studies
This position paper explores the possibilities and challenges of using Virtual Reality (VR) in
remote user studies. Highlighting the immersive nature of VR, the paper identifies key …
remote user studies. Highlighting the immersive nature of VR, the paper identifies key …