Skip to content

Research

Page 14 of 21

Privacy-Preserving Federated Learning Framework for Risk-Based Adaptive Authentication

research note

Privacy-Preserving Federated Learning Framework for Risk-Based Adaptive Authentication

·9 min read·Yaser Baseri, Abdelhakim Senhaji Hafid, Dimitrios Makrakis et al.

FL-RBA2 is a federated learning framework for risk-based adaptive authentication (RBA) that tries to solve two problems at once: privacy leakage from centralized risk engines and poor model quality…

researchfederated-learningadaptive-authenticationrisk-based-authenticationdifferential-privacy

Read note → Source paper ↗

AirSignatureDB: Exploring In-Air Signature Biometrics in the Wild and its Privacy Concerns

research note

AirSignatureDB: Exploring In-Air Signature Biometrics in the Wild and its Privacy Concerns

·7 min read·Marta Robledo-Moreno, Ruben Vera-Rodriguez, Ruben Tolosana et al.

This work introduces AirSignatureDB, a novel, publicly accessible dataset of in-air signature biometrics collected from 108 users in unconstrained real-world conditions using 83 different smartphon…

researchbehavioral-biometricsin-air-signaturesmobile-biometricsinertial-sensors

Read note → Source paper ↗

DIRF: A Framework for Digital Identity Protection and Clone Governance in Agentic AI Systems

research note

DIRF: A Framework for Digital Identity Protection and Clone Governance in Agentic AI Systems

·9 min read·Hammad Atta, Muhammad Zeeshan Baig, Yasir Mehmood et al.

This paper addresses the escalating threats to personal digital identity posed by generative AI technologies, including unauthorized cloning, impersonation, and monetization of digital likeness att…

researchdigital-identity-protectiongenerative-ai-securityidentity-governanceai-monitization-control

Read note → Source paper ↗

Is It Really You? Exploring Biometric Verification Scenarios in Photorealistic Talking-Head Avatar Videos

research note

Is It Really You? Exploring Biometric Verification Scenarios in Photorealistic Talking-Head Avatar Videos

·8 min read·Laura Pedrouzo-Rodriguez, Pedro Delgado-DeRobles, Luis F. Gomez et al.

This paper investigates biometric verification in photorealistic talking-head avatar videos, where attackers may perform impersonation attacks by stealing a victim's avatar to replicate their appea…

researchbiometric-verificationavatar-securitybehavioral-biometricsgraph-convolutional-networks

Read note → Source paper ↗

Articles are CC BY 4.0 — feel free to quote with attribution