Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma...
详细信息
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)may be vulnerable to a broad range of attacks(e.g.,eavesdropping and side-channel attacks).Hence,there have been attempts to design biometric-based authentication solutions,which rely on physiological and behavioral *** characteristics need continuous monitoring and specific environmental settings,which can be challenging to implement in ***,we can also leverage Artificial Intelligence(AI)in the extraction and classification of physiological characteristics from IoT devices processing to facilitate ***,we review the literature on the use of AI in physiological characteristics recognition pub-lished after *** use the three-layer architecture of the IoT(i.e.,sensing layer,feature layer,and algorithm layer)to guide the discussion of existing approaches and their *** also identify a number of future research opportunities,which will hopefully guide the design of next generation solutions.
These days almost all people in the world use the Internet as the internet is constantly evolving. cyber attack scale are increased thanks to cybercriminals that have become sophisticated in employing threats. Since t...
详细信息
Mobile Opportunistic Networks (MONs) often experience frequent interruptions in end-to-end connections, which increases the likelihood of message loss during delivery and makes users more susceptible to various cyber ...
详细信息
Managing data has changed significantly because of cloud computing, which offers scalabe, flexible and reasonably priced solutions to enterprises and to people as well such as Amazon, Google, and Microsoft expanding t...
详细信息
With the rapid growth of the number of processors in a multiprocessor system, faulty processors occur in it with a probability that rises quickly. The probability of a subsystem with an appropriate size being fault-fr...
详细信息
Ensuring the security of web applications is paramount in safeguarding sensitive data and maintaining user trust. This study presents a comprehensive overview of strategies for building and maintaining secure web appl...
详细信息
The evolution of political campaigns is evident with the ascent of social media. Ideological beliefs are increasingly disseminated through political-affiliated fan pages. The interaction between politicians and the ge...
详细信息
Image inpainting aims to restore a realistic image from a damaged or incomplete version. Although Transformer-based methods have achieved impressive results by modeling long-range dependencies, the inherent quadratic ...
详细信息
Sarcasm and satire are common ways to communicate complicated ideas with humor and irony, both expressing criticism or mockery. Detecting sarcasm vs. satire in real life can foster better communication by understandin...
详细信息
As the competition between threat actors and defenders in the security landscape continues, honeypot deployments become more common as a source of threat intelligence. Yet, documentation for these systems is usually s...
详细信息
暂无评论