[1] |
LAI C Z , MA Y X , LU R X ,et al. A novel authentication scheme supporting multiple user access for 5G and beyond[J]. IEEE Transactions on Dependable and Secure Computing, 2023,20(4): 2970-2987.
|
[2] |
ZHANG Y H , DENG R H , BERTINO E ,et al. Robust and universal seamless handover authentication in 5G HetNets[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(2): 858-874.
|
[3] |
FAN C N , HUANG J J , ZHONG M Z ,et al. ReHand:secure region-based fast handover with user anonymity for small cell networks in mobile communications[J]. IEEE Transactions on Information Forensics and Security, 2020,15: 927-942.
|
[4] |
LI G J , LAI C Z , LU R X ,et al. SecCDV:a security reference architecture for cybertwin-driven 6G V2X[J]. IEEE Transactions on Vehicular Technology, 2022,71(5): 4535-4550.
|
[5] |
LAI C Z , WANG M H , ZHENG D . SPDT:secure and privacy-preserving scheme for digital twin-based traffic control[C]// Proceedings of IEEE/CIC International Conference on Communications in China (ICCC). Piscataway:IEEE Press, 2022: 144-149.
|
[6] |
GONZALEZ-MANZANO L , FUENTES J M D , RIBAGORDA A . Leveraging user-related Internet of things for continuous authentication:a survey[J]. ACM Computing Surveys, 2020,52(3): 1-38.
|
[7] |
MEKRUKSAVANICH S , JITPATTANAKUL A . Deep learning approaches for continuous authentication based on activity patterns using mobile sensing[J]. Sensors, 2021,21(22): 7519.
|
[8] |
KUMAR A , SAHU S , ROHIT R . Deep learning-based continuous authentication for an IoT-enabled healthcare service[J]. Computers and Electrical Engineering, 2022,99:107817.
|
[9] |
MA N N , ZHANG X Y , ZHENG H T ,et al. ShuffleNetV2:practical guidelines for efficient CNN architecture design[M]. Cham: Springer International Publishing, 2018.
|
[10] |
SANCHEZ P M S , MAINO L F , CELDRAN A H ,et al. AuthCODE:a privacy-preserving and multi-device continuous authentication architecture based on machine and deep learning[J]. Computers & Security, 2021,103:102168.
|
[11] |
JAMES J C , RAJASREE M S . Implicit continuous user authentication for mobile devices based on deep reinforcement learning[J]. Computer Systems Science and Engineering, 2023,44(2): 1357-1372.
|
[12] |
ABUHAMAD M , ABUHMED T , MOHAISEN D ,et al. AUToSen:deep-learning-based implicit continuous authentication using smartphone sensors[J]. IEEE Internet of Things Journal, 2020,7(6): 5008-5020.
|
[13] |
NAJI Z , BOUZIDI D . Deep learning approach for a dynamic swipe gestures based continuous authentication[C]// Proceedings of the 3rd International Conference on Artificial Intelligence and Computer Vision (AICV2023). Piscataway:IEEE Press, 2023: 48-57.
|
[14] |
CHAUHAN J , KWON Y D , HUI P ,et al. ContAuth:continual learning framework for behavioral-based user authentication[C]// Proceedings of the ACM on Interactive,Mobile,Wearable and Ubiquitous Technologies. New York:ACM Press, 2020: 1-23.
|
[15] |
WU C , HE K , CHEN J ,et al. Liveness is not enough:enhancing fingerprint authentication with behavioral biometrics to defeat puppet attacks[C]// Proceedings of the 29th USENIX Conference on Security Symposium. Berkeley:USENIX Association, 2020: 2219-2236.
|
[16] |
LUAN T H , LIU R , GAO L ,et al. The paradigm of digital twin communications[J]. arXiv Preprint,arXiv:2105.07182, 2021.
|
[17] |
HE C , LUAN T H , LU R X ,et al. Security and privacy in vehicular digital twin networks:challenges and solutions[J]. IEEE Wireless Communications, 2023,30(4): 154-160.
|
[18] |
ZHANG X Y , ZHOU X Y , LIN M X ,et al. ShuffleNet:an extremely efficient convolutional neural network for mobile devices[C]// Proceedings of IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway:IEEE Press, 2018: 6848-6856.
|
[19] |
WOLD S , ESBENSEN K , GELADI P . Principal component analysis[J]. Chemometrics and Intelligent Laboratory Systems, 1987,2(1-3): 37-52.
|
[20] |
SHEN C , LI Y X , CHEN Y F ,et al. Performance analysis of multi-motion sensor behavior for active smartphone authentication[J]. IEEE Transactions on Information Forensics and Security, 2018,13(1): 48-62.
|
[21] |
SHEN C , LI Y P , YU T W ,et al. Motion-senor behavior analysis for continuous authentication on smartphones[C]// Proceedings of 12th World Congress on Intelligent Control and Automation (WCICA). Piscataway:IEEE Press, 2016: 2023-2028.
|
[22] |
SENF A , CHEN X W , ZHANG A . Comparison of one-class SVM and two-class SVM for fold recognition[C]// Proceedings of International Conference on Neural Information Processing. Berilin:Springer, 2006: 140-149.
|
[23] |
KOUTSOS A . The 5G-AKA authentication protocol privacy[C]// Proceedings of IEEE European Symposium on Security and Privacy. Piscataway:IEEE Press, 2019: 464-479.
|
[24] |
SZEGEDY C , LIU W , JIA Y Q ,et al. Going deeper with convolutions[C]// Proceedings of Conference on Computer Vision and Pattern Recognition. Piscataway:IEEE Press, 2015: 1-9.
|
[25] |
HUANG G , LIU Z , MAATEN L V D ,et al. Densely connected convolutional networks[C]// Proceedings of IEEE Conference on Computer Vision and Pattern Recognition. Piscataway:IEEE Press, 2017: 2261-2269.
|