Filters








304 Hits in 5.1 sec

Surf Session Events' Profiling Using Smartphones' Embedded Sensors

Diana Gomes, Dinis Moreira, João Costa, Ricardo Graça, João Madureira
2019 Sensors  
In this work, we propose a novel method for wave, paddle, sprint paddle, dive, lay, and sit events detection in the context of a surf session, which enables its entire profiling with 88.1% accuracy for  ...  These findings verify the precision, validity and thoroughness of the proposed solution in constituting a complete surf session profiling system, suitable for real-time implementation and with market potential  ...  Acknowledgments: The authors would like to give a special thanks to the surfers, centres and schools that voluntarily collaborated in surf sessions' data collection and the interviews' phase.  ... 
doi:10.3390/s19143138 fatcat:tlrsckmonvebdetj2quiltrwbu

On the Best Sensor for Keystrokes Inference Attack on Android

Ahmed Al-Haiqi, Mahamod Ismail, Rosdiadee Nordin
2013 Procedia Technology - Elsevier  
One of the most recently exposed security threats on smartphone platforms is the potential use of motion sensors to infer user keystrokes.  ...  We design and implement a benchmark experiment, against which the performances of several commodity smartphone-sensors are compared, in terms of inference accuracy.  ...  Embedding sensors into smartphones had made them an unprecedented platform, combining communications, computing and sensing capabilities.  ... 
doi:10.1016/j.protcy.2013.12.285 fatcat:3alw4bygqvdcrkiezuup7p5zsy

Draw It As Shown: Behavioral Pattern Lock for Mobile User Authentication

Yeeun Ku, Leo Hyun Park, Sooyeon Shin, Taekyoung Kwon
2019 IEEE Access  
INDEX TERMS Behavioral authentication, android pattern lock, smartphone, machine learning.  ...  Input patterns are susceptible to various attacks, such as guessing attacks, smudge attacks, and shoulder surfing attacks.  ...  In DIAS, we consider the touchscreen and the following three sensors that are commonly embedded in current smartphones: accelerometer, gyroscope, and magnetometer.  ... 
doi:10.1109/access.2019.2918647 fatcat:t4xzq6egvrdpzahubgoqdm2j5u

Authentication of Smartphone Users Using Behavioral Biometrics [article]

Abdulaziz Alzubaidi, Jugal Kalita
2019 arXiv   pre-print
Smartphones and tablets have become ubiquitous in our daily lives. Smartphones, in particular, have become more than personal assistants.  ...  Smartphones are small in size, so they are easy to handle and to stow and carry in users' pockets or purses. However, mobile devices are also susceptible to various problems.  ...  multi-touch events per session (ATMT).  ... 
arXiv:1911.04104v1 fatcat:yxx7pagj3ff6rok7zaq3f5psua

Identification and Prediction of User Behavior Depending on the Context of the Use of Smart Mobile Devices [chapter]

Sinisa Husnjak, Dragan Perakovic, Ivan Forenbacher, Ivan Jovovic
2016 DAAAM Proceedings  
Smart mobile devices (smartphones) represent an important factor in access to information and communications networks.  ...  The context of use of smart mobile devices represents a joint impact of smart mobile devices and mobile applications, used information and communications services and the user's environment.  ...  Acknowledgements This research has been carried out as part of the project "Research of the context of the use of smart mobile devices and related information and communication services", funded as part  ... 
doi:10.2507/26th.daaam.proceedings.061 fatcat:652a6zt45vcxdekwigoooy52ry

Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access

Sandeep Gupta, Attaullah Buriro, Bruno Crispo
2018 Mobile Information Systems  
Apart from their conventional use, that is, calling and texting, they have also been used to perform multiple security sensitive activities, such as online banking and shopping, social networking, taking  ...  Smartphones are the most popular and widespread personal devices.  ...  [124] proposed a grip-based authentication solution, which profiles grip gestures using pressure sensors mounted on the lateral and back sides of a smartphone and achieved a 2% ERR, which is equivalent  ... 
doi:10.1155/2018/2649598 fatcat:dulbgwxnbnd53bnhalsisrxqly

Keystrokes Inference Attack on Android: A Comparative Evaluation of Sensors and Their Fusion

Ahmed Al-Haiqi, Mahamod Ismail, Rosdiadee Nordin
2013 Journal of ICT Research and Applications  
Introducing motion sensors into smartphon range of applications in human However, built-in sensors that detect accelerometers), might also reveal information about taps on touch screens main user input  ...  We consider individual sensors shipped on Android phones, and study few options of preprocessing their raw datasets as well as fu several sensors' readings gyroscope, and the potential sensors with magnetometer  ...  Acknowledgements Sensors in Keystrokes Inference Attack on Android  ... 
doi:10.5614/itbj.ict.res.appl.2013.7.2.2 fatcat:sbezngjgqjbtvfxohw3wnifmha

Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey [article]

Mohammed Abuhamad, Ahmed Abusnaina, DaeHun Nyang, David Mohaisen
2020 arXiv   pre-print
The survey provides an overview of the current state-of-the-art approaches for continuous user authentication using behavioral biometrics captured by smartphones' embedded sensors, including insights and  ...  This task is made possible with today's smartphones' embedded sensors that enable continuous and implicit user authentication by capturing behavioral biometrics and traits.  ...  Most of the studies use embedded motion sensors such as accelerometer, gyroscope, and orientation sensors.  ... 
arXiv:2001.08578v2 fatcat:ykt7jpmeefgadil3n3y52z43t4

Digital Remembrance Based User Validation for Internet of Things [IoT]

Sunain Kowser
2016 International Journal Of Engineering And Computer Science  
Many existing authentication challenge questions are generic, and the answers to which can easily be found online using websites suchas 192.com or from screening user's online profiles (e.g. company profiles  ...  In other words, they are a combination of many types of media, audio, video and images that have been recorded using a range of devices and sensors [13] , [14] .  ... 
doi:10.18535/ijecs/v5i5.16 fatcat:7sypd5ffmreuhknpuqmhengszq

Digital Memories Based Mobile User Authentication for IoT

Nathan Shone, Chelsea Dobbins, William Hurst, Qi Shi
2015 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing  
Many existing authentication challenge questions are generic, and the answers to which can easily be found online using websites such as 192.com or from screening user's online profiles (e.g. company profiles  ...  In other words, they are a combination of many types of media, audio, video and images that have been recorded using a range of devices and sensors [13] , [14] .  ... 
doi:10.1109/cit/iucc/dasc/picom.2015.270 dblp:conf/IEEEcit/ShoneDHS15 fatcat:5fm64ct7sjadjk4gbwuopbwlga

Modern Authentication Techniques in Smart Phones: Security and Usability Perspective

Usman Shafique, Hikmat Khan, Sabah-ud-din Waqar, Asma Sher, Adnan Zeb, Uferah Shafi, Rahim Ullah, Rehmat Ullah
2017 International Journal of Advanced Computer Science and Applications  
A smartphone has more advanced computing ability and connectivity than basic featured phones.  ...  In this paper, we critically analyze the attacks and the vulnerabilities in smartphones' authentication mechanisms.  ...  Here user can be authenticated by using data captured by sensors at of the mobile device and the behavior of the user. Here a unique profile will be maintained for the user.  ... 
doi:10.14569/ijacsa.2017.080142 fatcat:ybsroqfojbg27om3c73tn62o54

Where is the energy spent inside my app?

Abhinav Pathak, Y. Charlie Hu, Ming Zhang
2012 Proceedings of the 7th ACM european conference on Computer Systems - EuroSys '12  
This paper first presents eprof, the first fine-grained energy profiler for smartphone apps.  ...  The case study highlights the fact that most of the energy in smartphone apps is spent in I/O, and I/O events are clustered, often due to a few routines.  ...  Table 3 : Session description for the apps used in case study.  ... 
doi:10.1145/2168836.2168841 dblp:conf/eurosys/PathakHZ12 fatcat:f55wzwtgf5afpdir6q5vemvsoy

Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones

Chao Shen, Tianwen Yu, Sheng Yuan, Yunpeng Li, Xiaohong Guan
2016 Sensors  
This paper investigates the feasibility and applicability of using motion-sensor behavior data for user authentication on smartphones.  ...  Analyses are conducted using data from 48 participants with 129,621 passcode samples across various operational scenarios and different types of smartphones.  ...  smartphone authentication.  ... 
doi:10.3390/s16030345 pmid:27005626 pmcid:PMC4813920 fatcat:obmqyzppjnfdplzpjegn5trpu4

Bayesian Networks-Based Interval Training Guidance System for Cancer Rehabilitation [chapter]

Myung-kyung Suh, Kyujoong Lee, Alfred Heu, Ani Nahapetian, Majid Sarrafzadeh
2010 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
We have developed an application program on the popular lightweight iPhone platform, embedded with several leveraged sensors.  ...  In this work, we use behavioral cueing using music and performance feedback, combined with a social network interface, to provide motivation during interval training exercise sessions.  ...  Furthermore, the iPhone has an in-built accelerometer, a light and a proximity sensor. By using an embedded 3-axis accelerometer on the iPhone, activity patterns are detected.  ... 
doi:10.1007/978-3-642-12607-9_16 fatcat:omlqzwol5fbvvocrlqoe7s7xvi

Interval training guidance system with music and wireless group exercise motivations

Myung-kyung Suh, Kyujoong Lee, Ani Nahapetian, Majid Sarrafzadeh
2009 2009 IEEE International Symposium on Industrial Embedded Systems  
In this work, we use behavioral cueing using music and performance feedback to provide motivation during interval training exercise sessions.  ...  By measuring performance of the user through sensor readings, specifically accelerometers embedded in the iPhone, we are able to play the right song to match the user's workout plan.  ...  Furthermore, the iPhone has an in-built accelerometer, a light and a proximity sensor. By using an embedded 3-axis accelerometer on the iPhone, activity patterns are detected.  ... 
doi:10.1109/sies.2009.5196202 dblp:conf/sies/SuhLNS09 fatcat:ibdzinnymfba3defw5b2egx6ri
« Previous Showing results 1 — 15 out of 304 results