Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Electromyogram Based Personal Recognition Using Attention Mechanism for IoT Security

    Jin Su Kim, Sungbum Pan*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1663-1678, 2023, DOI:10.32604/cmc.2023.043998

    Abstract As Internet of Things (IoT) technology develops, integrating network functions into diverse equipment introduces new challenges, particularly in dealing with counterfeit issues. Over the past few decades, research efforts have focused on leveraging electromyogram (EMG) for personal recognition, aiming to address security concerns. However, obtaining consistent EMG signals from the same individual is inherently challenging, resulting in data irregularity issues and consequently decreasing the accuracy of personal recognition. Notably, conventional studies in EMG-based personal recognition have overlooked the issue of data irregularities. This paper proposes an innovative approach to personal recognition that combines a siamese fusion network with an auxiliary… More >

  • Open Access

    ARTICLE

    Multi-Stream CNN-Based Personal Recognition Method Using Surface Electromyogram for 5G Security

    Jin Su Kim1, Min-Gu Kim1, Jae Myung Kim1,2, Sung Bum Pan1,2,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2997-3007, 2022, DOI:10.32604/cmc.2022.026572

    Abstract As fifth generation technology standard (5G) technology develops, the possibility of being exposed to the risk of cyber-attacks that exploits vulnerabilities in the 5G environment is increasing. The existing personal recognition method used for granting permission is a password-based method, which causes security problems. Therefore, personal recognition studies using bio-signals are being conducted as a method to access control to devices. Among bio-signal, surface electromyogram (sEMG) can solve the existing personal recognition problem that was unable to the modification of registered information owing to the characteristic changes in its signal according to the performed operation. Furthermore, as an advantage, sEMG… More >

Displaying 1-10 on page 1 of 2. Per Page