Article
Computer Science, Information Systems
Jianwei Liu, Wenfan Song, Leming Shen, Jinsong Han, Kui Ren
Summary: Biometrics are important for user authentication, but traditional methods are vulnerable to spoofing. This paper introduces MandiPass, a novel biometric-based authentication system that collects intracorporal biometrics from the vibration of the user's mandible using inertial measurement units. MandiPass provides both one-time verification and continuous authentication functions, and has achieved good results in experiments.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2023)
Article
Computer Science, Artificial Intelligence
Salem Alkhalaf
Summary: An innovative control-driven autonomous authentication scheme is proposed for improving the access security of P2P industrial systems by providing authentication based on system control requirements. Support vector machines are used for identification and grouping-based classification to learn sabotage and control requirements based on access and control time, providing a rupture-less industrial process. This scheme helps leverage the detection of autonomous adversaries in P2P industrial control systems and allows for a less complex and latent-free security measure.
Article
Computer Science, Information Systems
Haotian Yan, Haibo Hu, Qingqing Ye
Summary: This paper introduces a Partial Verification Message Authentication Code (PV-MAC) scheme to address the challenge of verifying the integrity of large volumes of high-frequency messages in the context of Industrial Internet of Things (IIoT). By offloading partial verification tasks to devices with more processing power, such as fog nodes, the proposed scheme achieves high efficiency and dynamic workload balancing, while ensuring rigorous security guarantees.
COMPUTERS & SECURITY
(2023)
Article
Engineering, Electrical & Electronic
Jiangwei Xu, Liangliang Wang, Mi Wen, Yu Long, Kefei Chen
Summary: This study proposes a novel low-latency message authentication scheme based on distributed authentication and message priority. It achieves the minimum verification latency of messages through cooperation between RSU and cooperative vehicles and designs a message priority strategy to prioritize the verification of urgent messages. The scheme works well in high-density traffic scenarios and is more suitable for securing emergency messages with ultra-low latency requirements.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2023)
Article
Green & Sustainable Science & Technology
Akriti Verma, Valeh Moghaddam, Adnan Anwar
Summary: Recent studies have shown the potential of motion-based biometrics as a means of user authentication and identification without human cooperation. By integrating this category of biometrics with multi-factor authentication, continuous authentication can be enhanced for better privacy protection on user devices.
Article
Computer Science, Information Systems
Yantao Li, Peng Tao, Shaojiang Deng, Gang Zhou
Summary: DeFFusion is a CNN-based continuous authentication system that uses deep feature fusion to authenticate smartphone users with accelerometers and gyroscopes. The system considers factors such as training data size, time window size, and accuracy comparisons on different features and classifiers. Experimental results show that it achieved the best accuracy in a 5-second time window.
ACM TRANSACTIONS ON SENSOR NETWORKS
(2022)
Article
Computer Science, Information Systems
Ahmad Zairi Zaidi, Chun Yong Chong, Rajendran Parthiban, Ali Safaa Sadiq
Summary: In this paper, a novel classification framework for touch-based continuous mobile device authentication (CMDA) is proposed, which utilizes dynamic selection of classifiers to improve the authentication performance. Various selection methods are evaluated, showing promising potential and feasibility in different scenarios of touch datasets.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS
(2022)
Article
Computer Science, Information Systems
Yantao Li, Jiaxing Luo, Shaojiang Deng, Gang Zhou
Summary: Mobile devices have become increasingly important in our daily lives, highlighting the need for device security and privacy protection. This article presents SearchAuth, a novel continuous authentication system on smartphones that leverages sensor data to capture user behavioral patterns. Using neural architecture search and auto augmentation search, SearchAuth optimizes network architecture and data augmentation policies to train a model for feature extraction. Experimental results demonstrate that SearchAuth outperforms representative authentication schemes, achieving the best accuracy, F1-score, and EER.
ACM TRANSACTIONS ON SENSOR NETWORKS
(2023)
Article
Computer Science, Information Systems
Yantao Li, Li Liu, Huafeng Qin, Shaojiang Deng, Mounim A. El-Yacoubi, Gang Zhou
Summary: Mobile devices are thriving in popularity and playing crucial roles in our daily lives. However, inadequate security measures and weak protection mechanisms lead to severe privacy breaches of unattended devices. To address this, we propose ADFFDA, a novel mobile continuous authentication system utilizing an Adaptive Deep Feature Fusion scheme for effective feature representation, and a transformer-based GAN for Data Augmentation. By leveraging smartphone built-in sensors, ADFFDA extracts deep features, and uses an adaptive-weighted concatenation method to fuse these features. Authentication is performed using the OC-SVM classifier.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2023)
Article
Computer Science, Interdisciplinary Applications
Ertem Esiner, Utku Tefek, Daisuke Mashima, Binbin Chen, Zbigniew Kalbarczyk, David M. Nicol
Summary: In this paper, we propose a provenance solution called F2-Pro to verify the legitimacy of message delivery path and actions performed in industrial control systems (ICSs). F2-Pro provides cryptographically verifiable evidence of message origin and checks by utilizing lightweight cryptographic primitives. It also offers flexibility to support various communication settings and protocols encountered in ICSs. Compatibility testing on a smart power grid testbed shows that F2-Pro incurs low latency overhead using a modest ARM Cortex-A15 processor.
ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS
(2023)
Proceedings Paper
Computer Science, Artificial Intelligence
Elliot Singer, Bengt J. Borgstrom, Kenneth Alperin, Trang Nguyen, Cagri Dagli, Melissa Dale, Arun Ross
Summary: The recent advancements in deep learning have sparked interest in the development of techniques for multimodal identity verification applications, particularly in biometric fusion. To establish performance baselines for proposed approaches, there is a need for large-scale multimodal datasets. This paper examines existing multimodal datasets and introduces the development of the MITLL Trimodal dataset, which includes audio, image, and text data for 553 subjects gathered from YouTube videos and Twitter tweets. The paper presents baseline single modality results using a common processing pipeline, as well as the results obtained by applying a conventional fusion algorithm to individual stream scores.
2023 11TH INTERNATIONAL WORKSHOP ON BIOMETRICS AND FORENSICS, IWBF
(2023)
Article
Computer Science, Interdisciplinary Applications
Dinesh Morkonda Gunasekaran, Prabha Dhandayudam
Summary: Breast cancer is a common disease among women today. The proposed MFU feature selection method uses random forest and logistic regression models to select important features and evaluate data analysis performance. Experimental results demonstrate the high efficiency and performance of this method compared to existing feature selection algorithms.
CONCURRENT ENGINEERING-RESEARCH AND APPLICATIONS
(2021)
Proceedings Paper
Computer Science, Artificial Intelligence
Wei Gan, Xuqiu Chen, Wei Wang, Lu Chen, Jiaxi Wu, Xian Wang, Xin He, Fan Wu
Summary: To meet higher security requirements in mobile Internet, a continuous identity authentication technology based on single authentication improvement has been developed. However, it faces challenges such as low security, low efficiency, and lack of a scientific punishment mechanism. This paper proposes a multi-device continuous authentication mechanism using homomorphic encryption and SVM algorithm, along with a penalty protocol to handle illegal requests. Experimental results confirm the effectiveness of the proposed model and protocol.
ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III
(2022)
Proceedings Paper
Computer Science, Information Systems
Shaojiang Deng, Jiaxing Luo, Yantao Li
Summary: CAuSe is a smartphone continuous authentication system based on CNN and auto augmentation search, which achieves high authentication accuracy by optimizing strategies and training deep feature extractors.
INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2021), PT I
(2021)
Proceedings Paper
Computer Science, Information Systems
Shanoop Johnson, R. Gowtham, Anand R. Nair
Summary: The malware attack has been growing exponentially, with the COVID-19 pandemic increasing the reliance on digital technology. This has pushed the anti-malware communities to develop better software to detect and mitigate these attacks. We propose a static analysis method coupled with machine learning to classify ransomware, effectively improving the classification model's efficiency.
INVENTIVE COMPUTATION AND INFORMATION TECHNOLOGIES, ICICIT 2021
(2022)
Article
Computer Science, Hardware & Architecture
Flavia Bonomo-Braberman, Nick Brettell, Andrea Munaro, Daniel Paulusma
Summary: This article discusses the convexity and mim-width of bipartite graphs, and it proves that for certain families of graphs 7-t, the 7-t-convex graphs can be solved in polynomial time for NP-complete problems. It also explores the bounded and unbounded mim-width of 7-t-convex graphs for different sets 7-t.
JOURNAL OF COMPUTER AND SYSTEM SCIENCES
(2024)
Article
Computer Science, Hardware & Architecture
Keqin Li
Summary: In this paper, we propose a computation offloading strategy to satisfy all UEs served by an MEC and develop an efficient method to find such a strategy. By using Markov chains to characterize UE mobility and calculating the joint probability distribution of UE locations, we can obtain the average response time of UEs and predict the overall average response time of tasks. Additionally, we solve the power constrained MEC speed setting problem.
JOURNAL OF COMPUTER AND SYSTEM SCIENCES
(2024)
Correction
Computer Science, Hardware & Architecture
Peter L. Bartlett, Philip M. Long
JOURNAL OF COMPUTER AND SYSTEM SCIENCES
(2024)
Article
Computer Science, Hardware & Architecture
Philipp Czerner, Roland Guttenberg, Martin Helfrich, Javier Esparza
Summary: This paper presents a construction method that produces population protocols with a small number of states, while achieving near-optimal expected number of interactions, for deciding Presburger predicates.
JOURNAL OF COMPUTER AND SYSTEM SCIENCES
(2024)
Article
Computer Science, Hardware & Architecture
Katharina T. Huber, Leo van Iersel, Remie Janssen, Mark Jones, Vincent Moulton, Yukihiro Murakami, Charles Semple
Summary: This paper investigates the relationship between undirected and directed phylogenetic networks, and provides corresponding algorithms. The study reveals that the directed phylogenetic network is unique under specific conditions. Additionally, an algorithm for directing undirected binary networks is described, applicable to certain classes of directed phylogenetic networks.
JOURNAL OF COMPUTER AND SYSTEM SCIENCES
(2024)
Article
Computer Science, Hardware & Architecture
Francesco Betti Sorbelli, Alfredo Navarra, Lorenzo Palazzetti, Cristina M. Pinotti, Giuseppe Prencipe
Summary: This study discusses the deployment of IoT sensors in an area that needs to be monitored. Drones are used to collect data from the sensors, but they have energy and storage constraints. To maximize the overall reward from the collected data and ensure compliance with energy and storage limits, an optimization problem called Multiple-drone Data-collection Maximization Problem (MDMP) is proposed and solved using an Integer Linear Programming algorithm.
JOURNAL OF COMPUTER AND SYSTEM SCIENCES
(2024)
Article
Computer Science, Hardware & Architecture
Carla Binucci, Emilio Di Giacomo, William J. Lenhart, Giuseppe Liotta, Fabrizio Montecchiani, Martin Nollenburg, Antonios Symvonis
Summary: In this study, we investigate the problem of representing a graph as a storyplan, which is a model for dynamic graph visualization. We prove the NP-completeness of this problem and propose two parameterized algorithms as solutions. We also demonstrate that partial 3-trees always admit a storyplan and can be computed in linear time. Additionally, we show that even if the vertex appearance order is given, the problem of choosing how to draw the frames remains NP-complete.
JOURNAL OF COMPUTER AND SYSTEM SCIENCES
(2024)
Article
Computer Science, Hardware & Architecture
Leszek Gasieniec, Tomasz Jurdzinski, Ralf Klasing, Christos Levcopoulos, Andrzej Lingas, Jie Min, Tomasz Radzik
Summary: This passage describes the Bamboo Garden Trimming Problem and presents approximation algorithms for both Discrete BGT and Continuous BGT.
JOURNAL OF COMPUTER AND SYSTEM SCIENCES
(2024)