Electromagnetic radiation based continuous authentication in edge computing enabled internet of things
暂无分享,去创建一个
Jun Wang | Rongbo Zhu | Jun Qin | Shubo Liu | Mingtao Ni | Fusheng Wu | Rongbo Zhu | Shubo Liu | Jun Wang | Mingtao Ni | Fusheng Wu | Jun Qin
[1] Jianli Pan,et al. Future Edge Cloud and Edge Computing for Internet of Things Applications , 2018, IEEE Internet of Things Journal.
[2] Lu Zhou,et al. I Walk, Therefore I Am: Continuous User Authentication with Plantar Biometrics , 2018, IEEE Communications Magazine.
[3] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[4] Laurence T. Yang,et al. System-Level Design Optimization for Security-Critical Cyber-Physical-Social Systems , 2017, ACM Trans. Embed. Comput. Syst..
[5] Xin Zhou,et al. Infrared small-target detection using multiscale gray difference weighted image entropy , 2016, IEEE Transactions on Aerospace and Electronic Systems.
[6] Qingquan Li,et al. Local Binary Pattern-Based Hyperspectral Image Classification With Superpixel Guidance , 2018, IEEE Transactions on Geoscience and Remote Sensing.
[7] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[8] Ingo Stengel,et al. A survey of continuous and transparent multibiometric authentication systems , 2015 .
[9] S. Haller,et al. Individual Detection of Patients with Parkinson Disease using Support Vector Machine Analysis of Diffusion Tensor Imaging Data: Initial Results , 2012, American Journal of Neuroradiology.
[10] Lifeng Lai,et al. Keyless Authentication and Authenticated Capacity , 2018, IEEE Transactions on Information Theory.
[11] SeongHan Shin,et al. A secure anonymous password-based authentication protocol with control of authentication numbers , 2016, 2016 International Symposium on Information Theory and Its Applications (ISITA).
[12] Song Guo,et al. Secure Multimedia Big Data in Trust-Assisted Sensor-Cloud for Smart City , 2017, IEEE Communications Magazine.
[13] Tao Feng,et al. Continuous mobile authentication using a novel Graphic Touch Gesture Feature , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[14] Shaohua Wan,et al. NTRU Implementation of Efficient Privacy-Preserving Location-Based Querying in VANET , 2018, Wirel. Commun. Mob. Comput..
[15] Soumik Mondal,et al. A study on continuous authentication using a combination of keystroke and mouse biometrics , 2017, Neurocomputing.
[16] Tao Feng,et al. Multi resolution touch panel with built-in fingerprint sensing support , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[17] Juan E. Tapiador,et al. Real-time electrocardiogram streams for continuous authentication , 2017, Appl. Soft Comput..
[18] Lei Shu,et al. Challenges and Research Issues of Data Management in IoT for Large-Scale Petrochemical Plants , 2018, IEEE Systems Journal.
[19] Bo Zhao,et al. Powermitter: Data exfiltration from air-gapped computer through switching power supply , 2018, China Communications.
[20] Paul Rad,et al. A Privacy-Aware Architecture at the Edge for Autonomous Real-Time Identity Reidentification in Crowds , 2018, IEEE Internet of Things Journal.
[21] Bing Chen,et al. Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues , 2018, IEEE Access.
[22] Susmita Sur-Kolay,et al. CABA: Continuous Authentication Based on BioAura , 2017, IEEE Transactions on Computers.
[23] Mohsen Guizani,et al. Security in the Internet of Things Supported by Mobile Edge Computing , 2018, IEEE Communications Magazine.
[24] Vanga Odelu,et al. A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards , 2015, IEEE Transactions on Information Forensics and Security.
[25] Xiuping Jia,et al. Effective Sequential Classifier Training for SVM-Based Multitemporal Remote Sensing Image Classification , 2017, IEEE Transactions on Image Processing.
[26] Suhardi,et al. Smart campus features, technologies, and applications: A systematic literature review , 2017, 2017 International Conference on Information Technology Systems and Innovation (ICITSI).
[27] David Hutchison,et al. The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog From a Security and Resilience Perspective , 2017, IEEE Journal on Selected Areas in Communications.
[28] Ivana Podnar Žarko,et al. Edge Computing Architecture for Mobile Crowdsensing , 2018, IEEE Access.
[29] Shang-Ho Tsai,et al. On Performance of Sparse Fast Fourier Transform and Enhancement Algorithm , 2017, IEEE Transactions on Signal Processing.
[30] Lei Ma,et al. A kind of mouse behavior authentication method on dynamic soft keyboard , 2016, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[31] Xiangyu Wang,et al. RF Sensing in the Internet of Things: A General Deep Learning Framework , 2018, IEEE Communications Magazine.
[32] Yan Zhang,et al. Mobile Edge Computing: A Survey , 2018, IEEE Internet of Things Journal.
[33] Xiang Chen,et al. Security in Mobile Edge Caching with Reinforcement Learning , 2018, IEEE Wireless Communications.
[34] Shreyasi Das,et al. Methodology for partial fingerprint enrollment and authentication on mobile devices , 2016, 2016 International Conference on Biometrics (ICB).
[35] Rodrigo Roman,et al. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..
[36] Yi Mu,et al. Constructing an Authentication Token to Access External Services in Service Aggregation , 2010, 2010 IEEE International Conference on Services Computing.
[37] Puneet Gupta,et al. Multibiometric Authentication System Using Slap Fingerprints, Palm Dorsal Vein, and Hand Geometry , 2018, IEEE Transactions on Industrial Electronics.
[38] John A. Richards,et al. Remote Sensing Digital Image Analysis: An Introduction , 1999 .
[39] Xiaoming Liu,et al. On Continuous User Authentication via Typing Behavior , 2014, IEEE Transactions on Image Processing.
[40] Vishal M. Patel,et al. Efficient and Low Latency Detection of Intruders in Mobile Active Authentication , 2018, IEEE Transactions on Information Forensics and Security.
[41] Muttukrishnan Rajarajan,et al. Continuous face authentication scheme for mobile devices with tracking and liveness detection , 2018, Microprocess. Microsystems.
[42] Kim-Kwang Raymond Choo,et al. Multi-dimensional data indexing and range query processing via Voronoi diagram for internet of things , 2019, Future Gener. Comput. Syst..
[43] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[44] Mary M. Conte,et al. Local image statistics: maximum-entropy constructions and perceptual salience. , 2012, Journal of the Optical Society of America. A, Optics, image science, and vision.
[45] Jie Xu,et al. Computation Peer Offloading for Energy-Constrained Mobile Edge Computing in Small-Cell Networks , 2017, IEEE/ACM Transactions on Networking.
[46] Peter Corcoran,et al. Mobile-Edge Computing and the Internet of Things for Consumers: Extending cloud computing and services to the edge of the network , 2016, IEEE Consumer Electronics Magazine.
[47] Bill Triggs,et al. Histograms of oriented gradients for human detection , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[48] Maode Ma,et al. Secure Group Mobility Support for 6LoWPAN Networks , 2018, IEEE Internet of Things Journal.
[49] Sheikh Iqbal Ahamed,et al. Your Phone Knows You: Almost Transparent Authentication for Smartphones , 2014, 2014 IEEE 38th Annual Computer Software and Applications Conference.
[50] Ting He,et al. Location Privacy in Mobile Edge Clouds: A Chaff-Based Approach , 2017, IEEE Journal on Selected Areas in Communications.
[51] Xiaoyan Wang,et al. Big Data Privacy Preserving in Multi-Access Edge Computing for Heterogeneous Internet of Things , 2018, IEEE Communications Magazine.