Comprehensive survey: Biometric user authentication application, evaluation, and discussion
In this paper, we present a comprehensive review of the literature on biometric user
authentication, encompassing an analysis of key aspects such as the selection of biometric …
authentication, encompassing an analysis of key aspects such as the selection of biometric …
Deep speaker embeddings for Speaker Verification: Review and experimental comparison
The construction of speaker-specific acoustic models for automatic speaker recognition is
almost exclusively based on deep neural network-based speaker embeddings. This work …
almost exclusively based on deep neural network-based speaker embeddings. This work …
Cascaded speech separation denoising and dereverberation using attention and TCN-WPE networks for speech devices
X Zhang, J Tang, H Cao, C Wang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
In an actual indoor acoustic environment, the signal processing technique to extract the low-
noise and low-reverberation speech signal of a particular speaker from the mixed audio …
noise and low-reverberation speech signal of a particular speaker from the mixed audio …
A self-attentional ResNet-LightGBM model for IoT-enabled voice liveness detection
X Sun, J Fu, B Wei, Z Li, Y Li… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Voice user interface (VUI) brings high efficiency and convenience for the applications of
Internet of Things (IoT), meanwhile, it can also cause increasingly serious security issues …
Internet of Things (IoT), meanwhile, it can also cause increasingly serious security issues …
{MicGuard}: A Comprehensive Detection System against Out-of-band Injection Attacks for Different Level Microphone-based Devices
The integration of microphones into sensors and systems, serving as input interfaces to
intelligent applications and industrial manufacture, has raised growing public concerns …
intelligent applications and industrial manufacture, has raised growing public concerns …
A comprehensive review on secure biometric-based continuous authentication and user profiling
Authentication systems are pivotal in fortifying security measures against unauthorized
access. Yet, they often fall short of effectively combating impersonation attacks, leaving …
access. Yet, they often fall short of effectively combating impersonation attacks, leaving …
Mean Estimation of Numerical Data under (ϵ, δ)-Utility-optimized Local Differential Privacy
Utility-optimized local differential privacy (ULDP) considers input domain including non-
sensitive values which reduces utility loss by leaking some non-sensitive values, without …
sensitive values which reduces utility loss by leaking some non-sensitive values, without …
U-Architecture for Face Recognition to Prevent Cyber and Spoofing Attacks in IoT
Preventing cyber assaults is crucial in the setting of a smart city, which is more vulnerable to
such threats. Spoofing is a kind of cyber assault that is becoming more widespread across …
such threats. Spoofing is a kind of cyber assault that is becoming more widespread across …
改进卷积神经网络的单词级语音活体检测方法.
**志刚, 宋晓婷, 郭琪美… - Journal of Chongqing …, 2024 - search.ebscohost.com
为提高智能家居语音验证系统中重放语音的检测精度ꎬ 提出了一种新型的单词级语音活体检测
方法ꎬ 采用轻量型卷积全局门控循环神经网络(light convolutional global gate recurrent neural …
方法ꎬ 采用轻量型卷积全局门控循环神经网络(light convolutional global gate recurrent neural …
[CYTOWANIE][C] COMPREHENSIVE SURVEY: BIOMETRIC USER AUTHENTICATION APPLICATION, EVALUATION, AND
R Alrawili, AAS AlQahtani, MK Khan - 2023