|
[1] S.-C. Wu, S.-Y. Wei, C.-S. Chang, A. L. Swindlehurst, and J.-K. Chiu, "A Scalable Open-Set ECG Identification System Based on Compressed CNNs," IEEE Transactions on Neural Networks and Learning Systems, 2021. [2] WHO. "Coronavirus Disease (COVID-19) Pandemic." https://www.who.int/emergencies/diseases/novel-coronavirus-2019 (accessed August 10, 2023). [3] A. A. Al-Qudah, M. Al-Okaily, G. Alqudah, and A. Ghazlat, "Mobile payment adoption in the time of the COVID-19 pandemic," Electronic Commerce Research, pp. 1-25, 2022. [4] R. Wash, E. Rader, R. Berman, and Z. Wellmer, "Understanding password choices: How frequently entered passwords are re-used across websites," in Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016, pp. 175-188. [5] B. Ives, K. R. Walsh, and H. Schneider, "The domino effect of password reuse," Communications of the ACM, vol. 47, no. 4, pp. 75-78, 2004. [6] G. Lovisotto, S. Eberz, and I. Martinovic, "Biometric backdoors: A poisoning attack against unsupervised template updating," in 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 2020: IEEE, pp. 184-197. [7] Z. Akhtar, A. Ahmed, C. E. Erdem, and G. L. Foresti, "Biometric template update under facial aging," in 2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM), 2014: IEEE, pp. 9-15. [8] K. Hajari and K. Bhoyar, "A review of issues and challenges in designing Iris recognition Systems for noisy imaging environment," in 2015 International Conference on Pervasive Computing (ICPC), 2015: IEEE, pp. 1-6. [9] K. W. Bowyer, S. E. Baker, A. Hentz, K. Hollingsworth, T. Peters, and P. J. Flynn, "Factors that degrade the match distribution in iris biometrics," Identity in the information Society, vol. 2, pp. 327-343, 2009. [10] H. Kang, B. Lee, H. Kim, D. Shin, and J. Kim, "A study on performance evaluation of fingerprint sensors," in Audio-and Video-Based Biometric Person Authentication: 4th International Conference, AVBPA 2003 Guildford, UK, June 9–11, 2003 Proceedings 4, 2003: Springer, pp. 574-583. [11] I. Odinaka, P.-H. Lai, A. D. Kaplan, J. A. O'Sullivan, E. J. Sirevaag, and J. W. Rohrbaugh, "ECG biometric recognition: A comparative analysis," IEEE Transactions on Information Forensics and Security, vol. 7, no. 6, pp. 1812-1824, 2012. [12] A. Tsymbal, "The problem of concept drift: definitions and related work," Computer Science Department, Trinity College Dublin, vol. 106, no. 2, p. 58, 2004. [13] J. Harvey, J. Campbell, and A. Adler, "Characterization of biometric template aging in a multiyear, multivendor longitudinal fingerprint matching study," IEEE Transactions on Instrumentation and Measurement, vol. 68, no. 4, pp. 1071-1079, 2018. [14] S. P. Fenker and K. W. Bowyer, "Analysis of template aging in iris biometrics," in 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, 2012: IEEE, pp. 45-51. [15] F. Agrafioti, F. M. Bui, and D. Hatzinakos, "Secure telemedicine: Biometrics for remote and continuous patient verification," Journal of Computer Networks and Communications, vol. 2012, 2012. [16] R. D. Labati, V. Piuri, R. Sassi, F. Scotti, and G. Sforza, "Adaptive ECG biometric recognition: a study on re-enrollment methods for QRS signals," in 2014 IEEE symposium on computational intelligence in biometrics and identity management (CIBIM), 2014: IEEE, pp. 30-37. [17] Apple. "About Touch ID Advanced Security Technology." https://support.apple.com/en-us/HT204587 (accessed October 10, 2023). [18] Apple. "Face ID Security." https://images.apple.com/business/docsFaceID (accessed October 31, 2022). [19] D. Wen, H. Han, and A. K. Jain, "Face spoof detection with image distortion analysis," IEEE Transactions on Information Forensics and Security, vol. 10, no. 4, pp. 746-761, 2015. [20] A. Rattani, W. J. Scheirer, and A. Ross, "Open set fingerprint spoof detection across novel fabrication materials," IEEE Transactions on Information Forensics and Security, vol. 10, no. 11, pp. 2447-2460, 2015. [21] Y.-X. Guo, "Security Analysis of A Deep Learning-Based ECG Biometric Recognition System under Template Reconstruction Attacks," National Digital Library of Theses and Dissertations in Taiwan, 2021. [Online]. Available: https://hdl.handle.net/11296/v5265a [22] G. Mai, K. Cao, P. C. Yuen, and A. K. Jain, "On the reconstruction of face images from deep face templates," IEEE transactions on pattern analysis and machine intelligence, vol. 41, no. 5, pp. 1188-1202, 2018. [23] K. Cao and A. K. Jain, "Learning fingerprint reconstruction: From minutiae to image," IEEE Transactions on information forensics and security, vol. 10, no. 1, pp. 104-117, 2014. [24] I. J. Goodfellow, J. Shlens, and C. Szegedy, "Explaining and harnessing adversarial examples," arXiv preprint arXiv:1412.6572, 2014. [25] T. Gu, B. Dolan-Gavitt, and S. Garg, "Badnets: Identifying vulnerabilities in the machine learning model supply chain," arXiv preprint arXiv:1708.06733, 2017. [26] E. Bursztein. "Attacks against machine learning - an overview." https://elie.net/blog/ai/attacks-against-machine-learning-an-overview/ (accessed September 12, 2023). [27] O. Schwartz, "In 2016, Microsoft’s racist chatbot revealed the dangers of online conversation," IEEE Spectrum, vol. 11, 2019. [28] B. Biggio, B. Nelson, and P. Laskov, "Poisoning attacks against support vector machines," arXiv preprint arXiv:1206.6389, 2012. [29] B. Biggio, L. Didaci, G. Fumera, and F. Roli, "Poisoning attacks to compromise face templates," in 2013 International Conference on Biometrics (ICB), 2013, pp. 1-7. [30] M. Xue, C. He, J. Wang, and W. Liu, "LOPA: a linear offset based poisoning attack method against adaptive fingerprint authentication system," Computers & Security, vol. 99, p. 102046, 2020. [31] S. Wang, S. Nepal, C. Rudolph, M. Grobler, S. Chen, and T. Chen, "Backdoor attacks against transfer learning with pre-trained deep learning models," IEEE Transactions on Services Computing, vol. 15, no. 3, pp. 1526-1539, 2020. [32] T. Belkhouja, A. Mohamed, A. K. Al-Ali, X. Du, and M. Guizani, "Salt generation for hashing schemes based on ECG readings for emergency access to implantable medical devices," in 2018 International Symposium on Networks, Computers and Communications (ISNCC), 2018: IEEE, pp. 1-6. [33] A. Raza, S. Li, K.-P. Tran, and L. Koehl, "Detection of poisoning attacks with anomaly detection in federated learning for healthcare applications: A machine learning approach," arXiv preprint arXiv:2207.08486, 2022. [34] A. Krizhevsky, I. Sutskever, and G. E. Hinton, "Imagenet classification with deep convolutional neural networks," Communications of the ACM, vol. 60, no. 6, pp. 84-90, 2017. [35] P. E. McSharry, G. D. Clifford, L. Tarassenko, and L. A. Smith, "A dynamical model for generating synthetic electrocardiogram signals," IEEE transactions on biomedical engineering, vol. 50, no. 3, pp. 289-294, 2003. [36] B. W. Silverman, Density estimation for statistics and data analysis. Routledge, 2018. [37] B. Biggio, G. Fumera, F. Roli, and L. Didaci, "Poisoning Adaptive Biometric Systems," in Structural, Syntactic, and Statistical Pattern Recognition, Berlin, Heidelberg, G. Gimel'farb et al., Eds., 2012: Springer Berlin Heidelberg, pp. 417-425. [38] P. H. Pisani et al., "Adaptive biometric systems: Review and perspectives," ACM Computing Surveys (CSUR), vol. 52, no. 5, pp. 1-38, 2019. [39] A. Rattani, B. Freni, G. L. Marcialis, and F. Roli, "Template update methods in adaptive biometric systems: A critical review," in International Conference on Biometrics, 2009: Springer, pp. 847-856. [40] B. Biggio, P. Russu, L. Didaci, and F. Roli, "Adversarial biometric recognition: A review on biometric system security from the adversarial machine-learning perspective," IEEE Signal Processing Magazine, vol. 32, no. 5, pp. 31-41, 2015. [41] I. Romero, "PCA-based noise reduction in ambulatory ECGs," in 2010 Computing in Cardiology, 2010: IEEE, pp. 677-680. [42] N. Papernot, P. McDaniel, and I. Goodfellow, "Transferability in machine learning: from phenomena to black-box attacks using adversarial samples," arXiv preprint arXiv:1605.07277, 2016. [43] N. Papernot, P. McDaniel, I. Goodfellow, S. Jha, Z. B. Celik, and A. Swami, "Practical black-box attacks against machine learning," in Proceedings of the 2017 ACM on Asia conference on computer and communications security, 2017, pp. 506-519. [44] R. Bousseljot, D. Kreiseler, and A. Schnabel, "Nutzung der EKG-Signaldatenbank CARDIODAT der PTB über das Internet," 1995. [45] C. Levkov, G. Mihov, R. Ivanov, I. Daskalov, I. Christov, and I. Dotsinsky, "Removal of power-line interference from the ECG: a review of the subtraction procedure," Biomedical engineering online, vol. 4, pp. 1-18, 2005. [46] J. Pan and W. J. Tompkins, "A real-time QRS detection algorithm," IEEE transactions on biomedical engineering, no. 3, pp. 230-236, 1985. [47] S.-C. Wu, P.-L. Hung, and A. L. Swindlehurst, "ECG Biometric Recognition: Unlinkability, Irreversibility, and Security," IEEE Internet of Things Journal, vol. 8, no. 1, pp. 487-500, 2021, doi: 10.1109/jiot.2020.3004362. [48] I. J. Goodfellow, M. Mirza, D. Xiao, A. Courville, and Y. Bengio, "An empirical investigation of catastrophic forgetting in gradient-based neural networks," arXiv preprint arXiv:1312.6211, 2013.
|