2018 IEEE SmartWorld, Ubiquitous Intelligence &Amp; Computing, Advanced &Amp; Trusted Computing, Scalable Computing &Amp; Commu 2018
DOI: 10.1109/smartworld.2018.00163
|View full text |Cite
|
Sign up to set email alerts
|

Non-Intrusive Biometric Identification for Personalized Computing Using Wireless Big Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 18 publications
0
6
0
Order By: Relevance
“…User identity authentication is an important premise for almost all applications because it can prevent illegal access to private information. Currently, a great deal of applications based on CSI realize user's identity recognition, including WiFi-ID [112], WiWho [113], WifiU [114], FreeSense [115], Wii [116], Chen et al [117], AutoID [118], Wi-Sign [119], Liu et al [120], BodyPIN [121], BioID [122], WiPIN [128], Shi et al [160], and WiAU [161]. Many user authentication systems apply pattern-based methods except WiAU [161], NeuralWave [162], FingerPass [163], Kong et al [163], and WiPIN [128].…”
Section: E Discussion On User Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…User identity authentication is an important premise for almost all applications because it can prevent illegal access to private information. Currently, a great deal of applications based on CSI realize user's identity recognition, including WiFi-ID [112], WiWho [113], WifiU [114], FreeSense [115], Wii [116], Chen et al [117], AutoID [118], Wi-Sign [119], Liu et al [120], BodyPIN [121], BioID [122], WiPIN [128], Shi et al [160], and WiAU [161]. Many user authentication systems apply pattern-based methods except WiAU [161], NeuralWave [162], FingerPass [163], Kong et al [163], and WiPIN [128].…”
Section: E Discussion On User Authenticationmentioning
confidence: 99%
“…Most experimental environments contain 2-3 kinds of scenarios, such as the office, laboratory, and apartment, etc. Like crowd counting, most authentication applications utilize walking to determine user identity except BioID [122] and Wi-Sign [119], which utilities lip-motion and hand-motion to identify user's identity, respectively. The best recognition accuracy is Wii [116], which achieves 98.7% for two user's authentications.…”
Section: E Discussion On User Authenticationmentioning
confidence: 99%
“…Similarly, Hong et al [62] also applied the sliding window approach to detect the starting and ending points. In the BioID [68], the authors determined the starting and ending points of the lip movements by setting thresholds. In addition, the thresholds were experimentally determined.…”
Section: Signal Segmentationmentioning
confidence: 99%
“…Furthermore, in [146], a CSI-based method for biometric identification is presented. The proposed method namely BioID tracks simple lip motions to identify different users.…”
Section: Channel State Information (Csi)mentioning
confidence: 99%