Zobrazeno 1 - 10
of 45
pro vyhledávání: '"Karimian, Nima"'
This paper presents a novel approach to noninvasive hyperglycemia monitoring utilizing electrocardiograms (ECG) from an extensive database comprising 1119 subjects. Previous research on hyperglycemia or glucose detection using ECG has been constraine
Externí odkaz:
http://arxiv.org/abs/2403.07296
Autor:
Adami, Banafsheh, Karimian, Nima
Contactless fingerprint recognition offers a higher level of user comfort and addresses hygiene concerns more effectively. However, it is also more vulnerable to presentation attacks such as photo paper, paper-printout, and various display attacks, w
Externí odkaz:
http://arxiv.org/abs/2311.04148
With the increasing integration of smartphones into our daily lives, fingerphotos are becoming a potential contactless authentication method. While it offers convenience, it is also more vulnerable to spoofing using various presentation attack instru
Externí odkaz:
http://arxiv.org/abs/2310.15044
Embedded systems or micro controller based modules have become increasingly prevalent in our daily lives. However, the security of embedded devices as well as the authenticity of hardware has become an increasing concern within the growing Internet o
Externí odkaz:
http://arxiv.org/abs/2111.05459
Autor:
Dayananda, Kavya, Karimian, Nima
As the Covid-19 pandemic grips the world, healthcare systems are being reshaped, where the e-health concepts become more likely to be accepted. Wearable devices often carry sensitive information from users which are exposed to security and privacy ri
Externí odkaz:
http://arxiv.org/abs/2012.07916
Nowadays, there is an increasing interest in the development of Autonomous Vehicles (AV). However, there are two types of attack challenges that can affect AVs and are yet to be resolved, i.e., sensor attacks and vehicle access attacks. This paper, t
Externí odkaz:
http://arxiv.org/abs/1902.09094
Autor:
Karimian, Nima, Guo, Zimu, Tehranipoor, Fatemeh, Woodard, Damon, Tehranipoor, Mark, Forte, Domenic
With the emergence of the Internet-of-Things (IoT), there is a growing need for access control and data protection on low-power, pervasive devices. Biometric-based authentication is promising for IoT due to its convenient nature and lower susceptibil
Externí odkaz:
http://arxiv.org/abs/1803.09710
This is the first work augmenting hardware attacks mounted on obfuscated circuits by incorporating deep recurrent neural network (D-RNN). Logic encryption obfuscation has been used for thwarting counterfeiting, overproduction, and reverse engineering
Externí odkaz:
http://arxiv.org/abs/1803.03332
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.