Article
Computer Science, Information Systems
Eva Rodriguez, Beatriz Otero, Norma Gutierrez, Ramon Canal
Summary: The widespread use of mobile devices and mobile services has posed serious cybersecurity challenges, leading to the adoption of Deep Learning models for more efficient detection of attacks. This paper provides a comprehensive survey of recent cybersecurity works using DL in mobile and wireless networks, covering various aspects of cybersecurity and identifying effective DL methods for different threats and attacks.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2021)
Article
Engineering, Electrical & Electronic
Mohit Singh, R. Abhishek Shankar, Byunghoo Jung
Summary: High definition 6 degrees of freedom tracking in the Personal Area Tracking region offers a wide range of applications. A tracking system based on AC magnetic field and IMUs has been developed to achieve comparable performance with portability, low power consumption, and good user experience in Virtual/Augmented Reality applications. Challenges associated with magnetic field symmetry were addressed by implementing a motion correlation method for 8-octant tracking, achieving minimal position jitter and latency.
IEEE SENSORS JOURNAL
(2021)
Article
Computer Science, Software Engineering
Mathias Parger, Chengcheng Tang, Yuanlu Xu, Christopher D. Twigg, Lingling Tao, Yijing Li, Robert Wang, Markus Steinberger
Summary: Tracking body and hand motions in 3D space is essential for social and self-presence in augmented and virtual environments. In this article, we propose a new data-driven framework for egocentric body tracking to overcome occlusion problems in optimization methods. We collect a large-scale motion capture dataset and simulate occlusion patterns to estimate occluded body parts using a deep neural network. Our method achieves high-fidelity poses in egocentric scenarios.
IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS
(2022)
Review
Computer Science, Theory & Methods
Leysan Nurgalieva, Alisa Frik, Gavin Doherty
Summary: This article focuses on the considerations and practices of privacy and security in software development, and presents a foundation for future interventions to promote behavioral changes in organizations and individuals.
ACM COMPUTING SURVEYS
(2023)
Article
Computer Science, Hardware & Architecture
Samaikya Valluripally, Aniket Gulhane, Khaza Anuarul Hoque, Prasad Calyam
Summary: Social Virtual Reality Learning Environments offer a new medium for flexible and immersive learning environments, requiring a focus on user safety issues caused by attacks.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Article
Computer Science, Software Engineering
Roshan Venkatakrishnan, Rohith Venkatakrishnan, Balagopal Raveendranath, Christopher C. Pagano, Andrew C. Robb, Wen-Chieh Lin, Sabarish V. Babu
Summary: User representations are crucial for virtual experiences, affecting how users interact with the virtual world. This study investigates how different representations of the end-effector impact users' perceptions of dynamic affordances. Results show that representing the end-effector as a hand increases embodiment but may decrease performance or increase workload. VR system designers should carefully consider the goals and requirements of the application when choosing the type of end-effector representation for users.
IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS
(2023)
Article
Computer Science, Software Engineering
Roshan Venkatakrishnan, Rohith Venkatakrishnan, Balagopal Raveendranath, Christopher C. C. Pagano, Andrew C. C. Robb, Wen-Chieh Lin, Sabarish V. V. Babu
Summary: User representations are crucial to virtual experiences, including input devices and virtual representations of users in scenes. This study investigated how different representations of the end-effector affected users' perceptions of dynamic affordances. The results showed that representing the end-effector as a hand led to increased embodiment but also decreased performance compared to a virtual controller or a high-fidelity glove. Therefore, when designing VR applications, system designers should carefully consider the priorities and target requirements to choose the appropriate end-effector representation for users to embody in immersive virtual experiences.
IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS
(2023)
Article
Computer Science, Information Systems
Karoline Brehm, Yan Shvartzhnaider
Summary: We discuss the privacy concerns and challenges of implementing virtual reality technologies in established social contexts, using the theory of contextual integrity. We analyze the information flows within and between the real and virtual environments that may violate existing privacy norms.
IEEE SECURITY & PRIVACY
(2023)
Article
Computer Science, Information Systems
Samaikya Valluripally, Benjamin Frailey, Brady Kruse, Boonakij Palipatana, Roland Oruche, Aniket Gulhane, Khaza Anuarul Hoque, Prasad Calyam
Summary: Virtual Reality Learning Environments (VRLEs) are immersive environments integrated with wearable devices used in distance learning scenarios. Unauthorized access to these devices can lead to security and privacy attacks that negatively affect the user experience. This article proposes a novel anomaly detection method to identify potential attacks and prevent disruption of the user experience.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2023)
Article
Engineering, Electrical & Electronic
Shiwei Cheng, Jialing Wang, Danyi Sheng, Yijian Chen
Summary: Biometric authentication using a hybrid brain-computer interface (BCI), combining electroencephalogram (EEG) and eye movement data features, achieved an average accuracy of 84.36% (highest 88.35%) in identifying shoulder surfers in anti-shoulder-surfing experiments, outperforming single feature-based approaches. Additional experiments demonstrated the effectiveness of the approach in reducing user misidentification. This approach holds great potential for implementing hybrid BCI authentication in anti-shoulder-surfing applications.
IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT
(2023)
Article
Computer Science, Software Engineering
Shohei Mori, Dieter Schmalstieg, Denis Kalkofen
Summary: Multi-layer images are widely used for viewing natural scenes in virtual reality, but removing obstructive objects or editing the content is challenging. Researchers propose a multi-layer inpainting approach that addresses this issue in two stages.
IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS
(2023)
Article
Physics, Multidisciplinary
Stefan Kutschera, Wolfgang Slany, Patrick Ratschiller, Sarina Gursch, Havard Dagenborg
Summary: Privacy and security require reliable and readily available sources of randomness, such as ultra-high energy cosmic rays. We utilized a prototype based on existing muon detection technology to extract random bit sequences from cosmic ray detections. Our results show that this method passed established randomness tests, providing insights into the use of ultra-high energy cosmic rays as an entropy source.
Article
Computer Science, Information Systems
Min Choi, Abir EL Azzaoui, Sushil Kumar Singh, Mikail Mohammed Salim, Sekione Reward Jeremiah, Jong Hyuk Park
Summary: The term "Metaverse" has gained significant attention in both industry and academia. This paper provides a comprehensive survey on current metaverse projects worldwide, highlighting the security issues associated with them and presenting recent solutions and technologies to enhance the metaverse experience and security.
HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES
(2022)
Article
Computer Science, Information Systems
Pier Paolo Tricomi, Federica Nenna, Luca Pajola, Mauro Conti, Luciano Gamberi
Summary: Augmented and Virtual Reality (AR and VR), collectively known as Extended Reality (XR), are gaining popularity due to advancements in technology and the need for remote connections. User interaction with XR generates behavioral data, which can be used for profiling users, but several factors affect profiling efficiency. This study provides a comprehensive analysis of user profiling in virtual technologies, using machine learning to identify users and infer their attributes. The framework proposed in this study achieves high accuracy in user identification and attribute inference in both AR and VR, with VR proving more effective due to the presence of eye sensors.
Article
Computer Science, Software Engineering
Mikhail Sizintsev, Niluthpol Chowdhury Mithun, Han-Pang Chiu, Supun Samarasekera, Rakesh Kumar
Summary: This paper addresses the challenge of fast and accurate dynamic occlusion reasoning for large scale outdoor AR applications. The proposed method involves utilizing instance segmentation and depth estimation to infer the metric distance of real objects in the scene, minimizing latency in occlusion rendering. The solution is implemented in a low latency real-time framework and can be extended to optical-see-through AR.
IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS
(2021)