Publications by authors named "Nasour Bagheri"

Article Synopsis
  • Identity verification is increasingly important for online services and security, with biometric methods like ECG signals standing out for their accuracy and resistance to falsification.
  • The study introduces a new identity verification framework using ECG signals, which involves cleaning the data of noise and transforming it into images for deep learning analysis using techniques like the Wigner-Ville distribution and CNNs (GoogleNet architecture).
  • The proposed model achieved high accuracy rates of 99.3% and 99.004% on benchmark datasets, demonstrating its effectiveness compared to other biometric methods.
View Article and Find Full Text PDF

In today's competitive landscape, manufacturing companies must embrace digital transformation. This study asserts that integrating Internet of Things (IoT) technologies for the deployment of real-time location systems (RTLS) is crucial for better monitoring of critical assets. Despite the challenge of selecting the right technology for specific needs from a wide range of indoor RTLS options, this study provides a solution to assist manufacturing companies in exploring and implementing IoT technologies for their RTLS needs.

View Article and Find Full Text PDF

Physical Unclonable Functions (PUFs) are widely used in cryptographic authentication and key-agreement protocols due to their unique physical properties. This article presents a comprehensive cryptanalysis of two recently developed authentication protocols, namely PLAKE and EV-PUF, both relying on PUFs. Our analysis reveals significant vulnerabilities in these protocols, including susceptibility to impersonation and key leakage attacks, which pose serious threats to the security of the underlying systems.

View Article and Find Full Text PDF

Visual inputs are far from ideal in everyday situations such as in the fog where the contrasts of input stimuli are low. However, human perception remains relatively robust to contrast variations. To provide insights about the underlying mechanisms of contrast invariance, we addressed two questions.

View Article and Find Full Text PDF

In the last decade, biosignals have attracted the attention of many researchers when designing novel biometrics systems. Many of these works use cardiac signals and their representation as electrocardiograms (ECGs). Nowadays, these solutions are even more realistic since we can acquire reliable ECG records by using wearable devices.

View Article and Find Full Text PDF

Humans can categorize an object in different semantic levels. For example, a dog can be categorized as an animal (superordinate), a terrestrial animal (basic), or a dog (subordinate). Recent studies have shown that the duration of stimulus presentation can affect the mechanism of categorization in the brain.

View Article and Find Full Text PDF

Nowadays the sharing of trade in counterfeit and pirated goods is constantly growing and fake products are found in a large number of industries - particularly pharmaceuticals, food, and medical equipment - that can pose serious health and safety risks. With the intention of avoiding any loss of client confidence and any disclosure of sensitive information, Internet of Things (IoT) solutions are increasingly used to fulfill this need for a reliable and secure infrastructure in medical & pharmaceutical industry. When looking at the technologies used to identify products and packaging, balancing security and hardware limitations is often a difficult task and using cost-effective techniques such as bit-oriented lightweight functions is a challenge.

View Article and Find Full Text PDF

With the exponential increase of Internet of things (IoT) connected devices, important security risks are raised as any device could be used as an attack channel. This preoccupation is particularly important with devices featuring limited processing power and memory capabilities for security purposes. In line with this idea, Xu et al.

View Article and Find Full Text PDF

One key ability of human brain is invariant object recognition, which refers to rapid and accurate recognition of objects in the presence of variations such as size, rotation and position. Despite decades of research into the topic, it remains unknown how the brain constructs invariant representations of objects. Providing brain-plausible object representations and reaching human-level accuracy in recognition, hierarchical models of human vision have suggested that, human brain implements similar feed-forward operations to obtain invariant representations.

View Article and Find Full Text PDF

Humans perform object recognition effortlessly and accurately. However, it is unknown how the visual system copes with variations in objects' appearance and the environmental conditions. Previous studies have suggested that affine variations such as size and position are compensated for in the feed-forward sweep of visual information processing while feedback signals are needed for precise recognition when encountering non-affine variations such as pose and lighting.

View Article and Find Full Text PDF

To categorize the perceived objects, brain utilizes a broad set of its resources and encoding strategies. Yet, it remains elusive how the category information is encoded in the brain. While many classical studies have sought the category information in the across-trial-averaged activity of neurons/neural populations, several recent studies have observed category information also in the within-trial correlated variability of activities between neural populations (i.

View Article and Find Full Text PDF

Radio Frequency Identification (RFID) systems are widely used in access control, transportation, real-time inventory and asset management, automated payment systems, etc. Nevertheless, the use of this technology is almost unexplored in healthcare environments, where potential applications include patient monitoring, asset traceability and drug administration systems, to mention just a few. RFID technology can offer more intelligent systems and applications, but privacy and security issues have to be addressed before its adoption.

View Article and Find Full Text PDF

Objective: In this paper we investigate the security level of a comprehensive RFID solution to enhance inpatient medication safety, named IS-RFID, which has been recently proposed by Peris-Lopez et al.

Method: We analyses the security of the protocol against the known attacks in the context. The main target of this paper is to determine whether the new protocol provides the confidentiality property, which is expected to be provided by such a protocol.

View Article and Find Full Text PDF

Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses.

View Article and Find Full Text PDF