Cited By
View all- Mahfouz A(2024)User Authentication in the IoT and IIoT EnvironmentSmart and Agile Cybersecurity for IoT and IIoT Environments10.4018/979-8-3693-3451-5.ch008(169-194)Online publication date: 30-Jun-2024
- Zhang TJi QYe ZAkanda MMahdad AShi CWang YSaxena NChen YLuo BLiao XXu JKirda ELie D(2024)SAFARI: Speech-Associated Facial Authentication for AR/VR Settings via Robust VIbration SignaturesProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670358(153-167)Online publication date: 2-Dec-2024
- Yang YWang YChen YYe ZLi XXia ZRen YOkoshi TKo JLiKamWa R(2024)TouchTone: Smartwatch Privacy Protection via Unobtrusive Finger Touch GesturesProceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services10.1145/3643832.3661884(141-154)Online publication date: 3-Jun-2024
- Show More Cited By