Skip to content

Research

Page 15 of 21

Vec2Face+ for Face Dataset Generation

research note

Vec2Face+ for Face Dataset Generation

·12 min read·Haiyu Wu, Jaskirat Singh, Sicong Tian et al.

Vec2Face+ is a synthetic face-dataset generation method aimed at face recognition training, with the central claim that the remaining gap between synthetic and real training data is not just about …

researchface-recognitionsynthetic-datadataset-generationidentity-consistency

Read note → Source paper ↗

MFAz: Historical Access Based Multi-Factor Authorization

research note

MFAz: Historical Access Based Multi-Factor Authorization

·9 min read·Eyasu Getahun Chekole, Howard Halim, Jianying Zhou

MFAz tackles a gap that standard access control and MFA do not address: once a session is already established, an attacker who steals or reuses the session identifier can often bypass the original …

researchaccess-controlsession-hijackingmulti-factor-authorizationblockchain

Read note → Source paper ↗

BlowPrint: Blow-Based Multi-Factor Biometrics for Smartphone User Authentication

research note

BlowPrint: Blow-Based Multi-Factor Biometrics for Smartphone User Authentication

·10 min read·Howard Halim, Eyasu Getahun Chekole, Daniël Reijsbergen et al.

BlowPrint tackles a pretty specific but practical problem in smartphone authentication: can a behavioral signal that is contactless, quick to perform, and hard to spoof be paired with a standard ph…

researchbiometricssmartphone-authenticationbehavioral-biometricsmultifactor-authentication

Read note → Source paper ↗

Physical Layer-Based Device Fingerprinting for Wireless Security: From Theory to Practice

research note

Physical Layer-Based Device Fingerprinting for Wireless Security: From Theory to Practice

·7 min read·Junqing Zhang, Francesco Ardizzon, Mattia Piana et al.

This paper addresses the problem of secure device authentication in wireless communications, particularly for resource-constrained Internet of Things (IoT) devices where traditional cryptographic m…

researchphysical-layer-authenticationdevice-fingerprintingradio-frequency-fingerprintinginternet-of-things-security

Read note → Source paper ↗

Articles are CC BY 4.0 — feel free to quote with attribution