All Stories

  1. Deep Generative Attacks and Countermeasures for Data-Driven Offline Signature Verification
  2. Keystroke Dynamics Against Academic Dishonesty in the Age of LLMs
  3. Spotting Fake Profiles in Social Networks via Keystroke Dynamics
  4. Dictionary Attack on IMU-based Gait Authentication
  5. iCTGAN–An Attack Mitigation Technique for Random-vector Attack on Accelerometer-based Gait Authentication Systems
  6. IDeAuth: A novel behavioral biometric-based implicit deauthentication scheme for smartphones
  7. GANTouch: An Attack-Resilient Framework for Touch-based Continuous Authentication System
  8. Treadmill Assisted Gait Spoofing (TAGS)
  9. On the Inference of Soft Biometrics from Typing Patterns Collected in a Multi-device Environment
  10. Touchless Typing Using Head Movement-based Gestures
  11. Continuous Authentication Using One-class Classifiers and their Fusion
  12. Continuous Authentication via Unlabeled Phone Movement Patterns
  13. Continuous Authentication of Smartphone Users by Fusing Typing, Swiping and Phone Movement Patterns
  14. Attacking touch-based biometric using Lego (EV3 robots)
  15. Treadmill attack on gait-based authentication systems
  16. Geometrical Localization Algorithm for Three Dimensional Wireless Sensor Networks
  17. Context-aware active authentication using smartphone accelerometer measurements
  18. Inferring PINs just by observing hand movements