Articles with "user identification" as a keyword



Photo by averey from unsplash

User Identification System Using 2D Resized Spectrogram Features of ECG

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2902870

Abstract: Studies have been actively conducted on biometrics technology applying electrocardiogram (ECG) signals, which are more robust against forgeries and alterations than fingerprint and face authentication. The ECG lead-I signals measured using ECG acquisition devices consist… read more here.

Keywords: system; spectrogram; identification system; step ... See more keywords
Photo from wikipedia

Let IoT Know You Better: User Identification and Emotion Recognition Through Millimeter-Wave Sensing

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3204779

Abstract: Emotion recognition, particularly contactless recognition via wireless sensing, has shown its promise in diverse applications. However, the previous works only focus on emotions rather than the person, i.e., the premise is already knowing who the… read more here.

Keywords: recognition; user identification; emotion; identification emotion ... See more keywords
Photo from wikipedia

WiWalk: Gait-Based Dual-User Identification Using WiFi Device

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3222204

Abstract: The rapid development of the Internet of Things (IoT) boosts the spread of intelligent spaces. Biometrics-based user identification has gained great popularity recently, among which gait analysis offers a stable, user-friendly, and economical solution. Thanks… read more here.

Keywords: user identification; using wifi; identification; gait based ... See more keywords
Photo from wikipedia

Cross Validation Aided Approximated Message Passing Algorithm for User Identification in mMTC

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2021.3064025

Abstract: Recently, the approximate message passing (AMP) algorithm is advocated for overcoming the active user identification challenge in grant free (GF) massive random access (RA). However, requiring the perfect knowledge of user sparsity is a quite… read more here.

Keywords: amp algorithm; message passing; amp; user identification ... See more keywords
Photo by thanti_riess from unsplash

A Binary-Search-Based Locality-Sensitive Hashing Method for Cross-Site User Identification

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Computational Social Systems"

DOI: 10.1109/tcss.2022.3158664

Abstract: In recent years, we have witnessed increasing attention paid to the problem of cross-site user identification (CSUI) with the bloom of social media. Despite noticeable progress in this field, the problem of enormous computation posed… read more here.

Keywords: user identification; binary search; cross site; site user ... See more keywords
Photo by thinkmagically from unsplash

User Identification Across Multiple Social Networks Based on Naive Bayes Model.

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE transactions on neural networks and learning systems"

DOI: 10.1109/tnnls.2022.3202709

Abstract: Recently, the problem of user identification across multiple social networks (UIAMSNs) has attracted considerable attention since it is a prerequisite for many downstream tasks and applications. Although substantial network feature-based approaches have been proposed to… read more here.

Keywords: user identification; bayes model; identification across; based naive ... See more keywords
Photo from wikipedia

Channel Estimation and User Identification With Deep Learning for Massive Machine-Type Communications

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Vehicular Technology"

DOI: 10.1109/tvt.2021.3111081

Abstract: In this paper, we investigate the detection problem for a massive machine-type communication (mMTC) system that has correlated user activities. Two deep learning assisted algorithms are proposed to exploit the user activity correlation to facilitate… read more here.

Keywords: massive machine; identification; algorithm; user identification ... See more keywords
Photo from wikipedia

Exploiting Two-Level Information Entropy across Social Networks for User Identification

Sign Up to like & get
recommendations!
Published in 2021 at "Wireless Communications and Mobile Computing"

DOI: 10.1155/2021/1082391

Abstract: As the popularity of online social networks has grown, more and more users now hold multiple virtual accounts at the same time. Under these circumstances, identifying multiple social accounts belonging to the same user across… read more here.

Keywords: two level; information; information entropy; social networks ... See more keywords
Photo by priscilladupreez from unsplash

A Multiple Salient Features-Based User Identification across Social Media

Sign Up to like & get
recommendations!
Published in 2022 at "Entropy"

DOI: 10.3390/e24040495

Abstract: Identifying users across social media has practical applications in many research areas, such as user behavior prediction, commercial recommendation systems, and information retrieval. In this paper, we propose a multiple salient features-based user identification across… read more here.

Keywords: across social; social media; multiple salient; user identification ... See more keywords
Photo from wikipedia

Exploiting User Friendship Networks for User Identification across Social Networks

Sign Up to like & get
recommendations!
Published in 2022 at "Symmetry"

DOI: 10.3390/sym14010110

Abstract: Identifying offline entities corresponding to multiple virtual accounts of users across social networks is crucial for the development of related fields, such as user recommendation system, network security, and user behavior pattern analysis. The data… read more here.

Keywords: across social; hop; user identification; social networks ... See more keywords