Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
DOI: 10.1145/3243734.3278523
|View full text |Cite
|
Sign up to set email alerts
|

The House That Knows You

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…With technological advances, biometrics is used as a tool to identify people and collect information about their Peris-Lopez, 2016), the internet of things (Obaidat, Traore, & Woungang, 2019;Duraibi, 2020;Ongun et al, 2018), and health care (Mohsin et al, 2018).…”
Section: Discussionmentioning
confidence: 99%
“…With technological advances, biometrics is used as a tool to identify people and collect information about their Peris-Lopez, 2016), the internet of things (Obaidat, Traore, & Woungang, 2019;Duraibi, 2020;Ongun et al, 2018), and health care (Mohsin et al, 2018).…”
Section: Discussionmentioning
confidence: 99%
“…Shi et al [ 55 ] developed a deep learning user authentication scheme in university office and apartment environments, and could achieve over 94% authentication accuracy for 11 real users based on WiFi signals. Ongun et al [ 38 ] collected data from 15 IoT devices in a lab to classify 6 real users with 86% accuracy, and 5 real users with 97% accuracy.…”
Section: Discussionmentioning
confidence: 99%
“…Another work used total response time metric in order to evaluate usability in financial transaction scenarios [ 36 ], and a study regarding real-time inference in edge devices evaluated response time to consider user perspective advantages of the proposed approach [ 37 ]. An exploratory study regarding user recognition based on Alexa Skills usage is presented in [ 38 ].…”
Section: Related Workmentioning
confidence: 99%