Screen lock is a critical security feature for smartphones to prevent unauthorized access. Although various screen unlocking technologies, including fingerprint and facial recognition, have been widely adopted, they still have some limitations. For example, fingerprints can be stolen by special material stickers and facial recognition systems can be cheated by 3D-printed head models. In this paper, we propose EmgAuth, a novel electromyography(EMG)-based smartphone unlocking system based on the Siamese network. EmgAuth enables users to unlock their smartphones by leveraging the EMG data of the smartphone users collected from Myo armbands. When training the Siamese network, we design a special data augmentation technique to make the system re...
This study aims to examine the function and vulnerabilities of biometric systemsintegrated in smartp...
This study introduces a novel authentication methodology; it is based on pattern recognition of fing...
As smartphones become ever more present and interwoven into the daily computing of individuals, a br...
Screen lock is a critical security feature for smartphones to prevent unauthorized access. Although ...
Screen lock is a critical security feature for smart-phones to prevent unauthorized access. Although...
At the present time, mobile devices such as tablet-type PCs and smart phones have widely penetrated ...
Screen locking/unlocking is important for modern smart phones to avoid the unintentional operations ...
Mobile devices users are storing more and more private and often highly sensitive information on the...
Smartphone's are extremely popular and in high demand nowadays. They are easy to handle and very int...
Part 5: Privacy for Mobile ApplicationsInternational audienceThe use of mobile smart devices for sto...
Abstract. The use of mobile smart devices for storing sensitive infor-mation and accessing online se...
Over the past decade, machine learning methods have found their way into a large variety of computer...
Smartphones are ubiquitous devices that enable users to perform many of their routine tasks anytime ...
Pattern Unlock is one in a family of graphical passwords used on smart mobile devices. They were pro...
Abstract. Nowadays, Smartphones are widely used and they have a growing market share of already more...
This study aims to examine the function and vulnerabilities of biometric systemsintegrated in smartp...
This study introduces a novel authentication methodology; it is based on pattern recognition of fing...
As smartphones become ever more present and interwoven into the daily computing of individuals, a br...
Screen lock is a critical security feature for smartphones to prevent unauthorized access. Although ...
Screen lock is a critical security feature for smart-phones to prevent unauthorized access. Although...
At the present time, mobile devices such as tablet-type PCs and smart phones have widely penetrated ...
Screen locking/unlocking is important for modern smart phones to avoid the unintentional operations ...
Mobile devices users are storing more and more private and often highly sensitive information on the...
Smartphone's are extremely popular and in high demand nowadays. They are easy to handle and very int...
Part 5: Privacy for Mobile ApplicationsInternational audienceThe use of mobile smart devices for sto...
Abstract. The use of mobile smart devices for storing sensitive infor-mation and accessing online se...
Over the past decade, machine learning methods have found their way into a large variety of computer...
Smartphones are ubiquitous devices that enable users to perform many of their routine tasks anytime ...
Pattern Unlock is one in a family of graphical passwords used on smart mobile devices. They were pro...
Abstract. Nowadays, Smartphones are widely used and they have a growing market share of already more...
This study aims to examine the function and vulnerabilities of biometric systemsintegrated in smartp...
This study introduces a novel authentication methodology; it is based on pattern recognition of fing...
As smartphones become ever more present and interwoven into the daily computing of individuals, a br...