Rainhard Findling
- Aalto University
- Maarintie 8
- 00076 Espoo
- Finland
Rainhard’s focus areas are the machine learning and data analysis parts of using mobile devices/mobile device sensor data to solve problems in mobile environments. Those range from e.g. mobile security and (biometric) authentication over recognition of mobile activities, behavior, or other types of patterns such as location fingerprinting to supporting users in different tasks - and to a number of further interesting topics.
Rainhard was a postdoctoral researcher in the Ambient Intelligence Group 2017-2019, at Aalto University, Finland, in the Department of Communications and Networking, at the School of Electrical Engineering. Before that he has been with the Institute of Networks and Security at the JKU Johannes Kepler University Linz, Austria, from which he received his Dr. techn. degree in Computer Science in 2017, and with the Department of Mobile Computing at the University of Applied Sciences Upper Austria, Campus Hagenberg, from which he received his BSc and MSc degrees in Engineering in 2011 and 2013.
Below is an incomplete list of my publications. Consider also taking a look at the possibly more up-to-date lists at Google Scholar, ResearchGate, and dblp.org.
Publications

To the site owner:
Action required! Mendeley is changing its API. In order to keep using Mendeley with BibBase past April 14th, you need to:
- renew the authorization for BibBase on Mendeley, and
- update the BibBase URL in your page the same way you did when you initially set up this page.
link bibtex
@inproceedings{backstrom2021intuitive, title={Intuitive Privacy from Acoustic Reach: A Case for Networked Voice User-Interfaces}, author={B{\"a}ckstr{\"o}m, Tom and Das, Sneha and Zarazaga, Pablo P{\'e}rez and Fischer, Johannes and Findling, Rainhard Dieter and Sigg, Stephan and Nguyen, Le Ngu}, booktitle={Proc. 2021 ISCA Symposium on Security and Privacy in Speech Communication}, pages={57--61}, year={2021}, group={ambience} }
link bibtex abstract
@article{Le_2021_TMC, author={Le Ngu Nguyen and Stephan Sigg and Jari Lietzen and Rainhard Dieter Findling and Kalle Ruttik}, journal={IEEE Transactions on Mobile Computing}, title={Camouflage learning. Feature value obscuring ambient intelligence for constrained devices}, year={2021}, abstract={Ambient intelligence demands collaboration schemes for distributed constrained devices which are not only highly energy efficient in distributed sensing, processing and communication, but which also respect data privacy. Traditional algorithms for distributed processing suffer in Ambient intelligence domains either from limited data privacy, or from their excessive processing demands for constrained distributed devices. In this paper, we present Camouflage learning, a distributed machine learning scheme that obscures the trained model via probabilistic collaboration using physical-layer computation offloading and demonstrate the feasibility of the approach on backscatter communication prototypes and in comparison with Federated learning. We show that Camouflage learning is more energy efficient than traditional schemes and that it requires less communication overhead while reducing the computation load through physical-layer computation offloading. The scheme is synchronization-agnostic and thus appropriate for sharply constrained, synchronization-incapable devices. We demonstrate model training and inference on four distinct datasets and investigate the performance of the scheme with respect to communication range, impact of challenging communication environments, power consumption, and the backscatter hardware prototype. }, issue_date = {July 2021}, publisher = {IEEE}, volume = { }, number = { }, pages = {1-17}, group = {ambience}, project = {abacus} }
link bibtex
@inproceedings{hytonen2020BCG, title={Analysing Ballistocardiography for Pervasive Healthcare}, author={Roni Hytönen and Alison Tshala and Jan Schreier and Melissa Holopainen and Aada Forsman and Minna Oksanen and Rainhard Findling and Le Ngu Nguyen and Nico Jähne-Raden and Stephan Sigg}, booktitle={16th International Conference on Mobility, Sensing and Networking (MSN 2020) }, year={2020}, group = {ambience} }
@InProceedings{Findling_19_HidemyGaze, author = {Rainhard Dieter Findling and Tahmid Quddus and Stephan Sigg}, booktitle = {17th International Conference on Advances in Mobile Computing and Multimedia}, title = {Hide my Gaze with {EOG}! {T}owards Closed-Eye Gaze Gesture Passwords that Resist Observation-Attacks with Electrooculography in Smart Glasses}, year = {2019}, abstract = {Smart glasses allow for gaze gesture passwords as a hands-free form of mobile authentication. However, pupil movements for password input are easily observed by attackers, who thereby can derive the password. In this paper we investigate closed-eye gaze gesture passwords with EOG sensors in smart glasses. We propose an approach to detect and recognize closed-eye gaze gestures, together with a 7 and 9 character gaze gesture alphabet. Our evaluation indicates good gaze gesture detection rates. However, recognition is challenging specifically for vertical eye movements with 71.2\%-86.5\% accuracy and better results for opened than closed eyes. We further find that closed-eye gaze gesture passwords are difficult to attack from observations with 0% success rate in our evaluation, while attacks on open eye passwords succeed with 61\%. This indicates that closed-eye gaze gesture passwords protect the authentication secret significantly better than their open eye counterparts.}, url_Paper = {http://ambientintelligence.aalto.fi/paper/findling_closed_eye_eog.pdf}, project = {hidemygaze}, group = {ambience} }
@InProceedings{Fristroem_19_FreeFormGaze, author = {Eira Fristr\"om and Elias Lius and Niki Ulmanen and Paavo Hietala and Pauliina K\"arkk\"ainen and Tommi M\"akinen and Stephan Sigg and Rainhard Dieter Findling}, booktitle = {17th International Conference on Advances in Mobile Computing and Multimedia}, title = {Free-Form Gaze Passwords from Cameras Embedded in Smart Glasses}, year = {2019}, abstract = {Contemporary personal mobile devices support a variety of authentication approaches, featuring different levels of security and usability. With cameras embedded in smart glasses, seamless, hands-free mobile authentication based on gaze is possible. Gaze authentication relies on knowledge as a secret, and gaze passwords are composed from a series of gaze points or gaze gestures. This paper investigates the concept of free-form mobile gaze passwords. Instead of relying on gaze gestures or points, free-form gaze gestures exploit the trajectory of the gaze over time. We collect and investigate a set of 29 different free-form gaze passwords from 19 subjects. In addition, the practical security of the approach is investigated in a study with 6 attackers observing eye movements during password input to subsequently perform spoofing. Our investigation indicates that most free-form gaze passwords can be expressed as a set of common geometrical shapes. Further, our free-form gaze authentication yields a true positive rate of 81\% and a false positive rate with other gaze passwords of 12\%, while targeted observation and spoofing is successful in 17.5\% of all cases. Our usability study reveals that further work on the usability of gaze input is required as subjects reported that they felt uncomfortable creating and performing free-form passwords.}, url_Paper = {http://ambientintelligence.aalto.fi/paper/momm19_freeformgaze.pdf}, project = {hidemygaze}, group = {ambience} }
@InProceedings{Ebner_19_TennisStrokeClassification, author = {Christopher J. Ebner and Rainhard Dieter Findling}, booktitle = {17th International Conference on Advances in Mobile Computing and Multimedia}, title = {Tennis Stroke Classification: Comparing Wrist and Racket as IMU Sensor Position}, year = {2019}, abstract = {Automatic tennis stroke recognition can help tennis players improve their training experience. Previous work has used sensors positions on both wrist and tennis racket, of which different physiological aspects bring different sensing capabilities. However, no comparison of the performance of both positions has been done yet. In this paper we comparatively assess wrist and racket sensor positions for tennis stroke detection and classification. We investigate detection and classification rates with 8 well-known stroke types and visualize their differences in 3D acceleration and angular velocity. Our stroke detection utilizes a peak detection with thresholding and windowing on the derivative of sensed acceleration, while for our stroke recognition we evaluate different feature sets and classification models. Despite the different physiological aspects of wrist and racket as sensor position, for a controlled environment results indicate similar performance in both stroke detection (98.5\%-99.5\%) and user-dependent and independent classification (89\%-99\%).}, url_Paper = {http://ambientintelligence.aalto.fi/paper/Tennis_Stroke_Recognition.pdf}, group = {ambience}}
@InProceedings{Hintze_19_CORMORANTImplementingRisk, author = {Daniel Hintze and Matthias F\"uller and Sebastian Scholz and Rainhard Dieter Findling and Muhammad Muaaz and Philipp Kapfer and Wilhelm N\"ussler and Ren\'e Mayrhofer}, booktitle = {17th International Conference on Advances in Mobile Computing and Multimedia}, title = {CORMORANT: On Implementing Risk-Aware Multi-Modal Biometric Cross-Device Authentication For Android}, year = {2019}, abstract = {This paper presents the design and open source implementation of CORMORANT , an Android authentication framework able to increase usability and security of mobile authentication. It uses transparent behavioral and physiological biometrics like gait, face, voice, and keystrokes dynamics to continuously evaluate the user’s identity without explicit interaction. Using signals like location, time of day, and nearby devices to assess the risk of unauthorized access, the required level of confidence in the user’s identity is dynamically adjusted. Authentication results are shared securely, end-to-end encrypted using the Signal messaging protocol, with trusted devices to facilitate cross-device authentication for co-located devices, detected using Bluetooth low energy beacons. CORMORANT is able to reduce the authentication overhead by up to 97\% compared to conventional knowledge-based authentication whilst increasing security at the same time. We share our perspective on some of the successes and shortcomings we encountered implementing and evaluating CORMORANT to hope to inform others working on similar projects.}, url_Paper = {http://ambientintelligence.aalto.fi/paper/Hintze_19_CORMORANTImplementingRisk_cameraReady.pdf}, group = {ambience}}
@InProceedings{Pirklbauer_19_PredictingCategoryFire, author = {Kevin Pirklbauer and Rainhard Dieter Findling}, booktitle = {Emerging Research Projects and Show Cases Symposium ({SHOW} 2019)}, title = {Predicting the Category of Fire Department Operations}, year = {2019}, abstract = {Voluntary fire departments have limited human and material resources. Machine learning aided prediction of fire department operation details can benefit their resource planning and distribution. While there is previous work on predicting certain aspects of operations within a given operation category, operation categories themselves have not been predicted yet. In this paper we propose an approach to fire department operation category prediction based on location, time, and weather information, and compare the performance of multiple machine learning models with cross validation. To evaluate our approach, we use two years of fire department data from Upper Austria, featuring 16.827 individual operations, and predict its major three operation categories. Preliminary results indicate a prediction accuracy of 61\%. While this performance is already noticeably better than uninformed prediction (34% accuracy), we intend to further reduce the prediction error utilizingmore sophisticated features and models.}, url_Paper = {http://ambientintelligence.aalto.fi/paper/momm2019_fire_department_operation_prediction.pdf}, group = {ambience} }
link bibtex abstract
@inproceedings{Backstrom_2019_MyData, author = {Tom Backstrom and Sneha Das and Pablo Perez Zarazaga and Stephan Sigg and Rainhard Findling and Michael Laakasuo}, title = {With whom are you talking? Privacy in Speech Interfaces}, booktitle = {Proceedings of the 4th annual conference of the MyData Global network ({MyData} 2019)}, year = {2019}, address = {Helsinki, Finland}, month = sep, abstract = {Speech is about interaction. It is more than just passing messages – the listener nods and finishes the sentence for you. Interaction is so essentially a part of normal speech, that non-interactive speech has its own name: it is a monologue. It's not normal. Normal speech is about interaction. Privacy is a very natural part of such spoken interactions. We intuitively lower our voices to a whisper when we want to tell a secret. We thus change the way we speak depending on the level of privacy. In a public speech, we would not reveal intimate secrets. We thus change the content of our speech depending on the level of privacy. Furthermore, in a cafeteria, we would match our speaking volume to the background noise. We therefore change our speech in an interaction with the surroundings. Overall, we change both the manner of speaking and its content, in an interaction with our environment. Our research team is interested in the question of how such notions of privacy should be taken into account in the design of speech interfaces, such as Alexa/Amazon, Siri/Apple, Google and Mycroft. We believe that in the design of good user-interfaces, you should strive for technology which is intuitive to use. If your speech assistant handles privacy in a similar way as a natural person does, then most likely it would feel natural to the user. A key concept for us is modelling the users’ experience of privacy. Technology should understand our feelings towards privacy, how we experience it and act accordingly. From the myData-perspective, this means that all (speech) data is about interactions, between two or more parties. Ownership of such data is then also shared among the participating parties. There is no singular owner of data, but access and management of data must always happen in mutual agreement. In fact, the same applies to many other media as well. It is obvious that chatting on WhatsApp is a shared experience. Interesting (=good) photographs are those which entail a story; "This is when we went to the beach with Sophie." The myData concept should be adapted to take into account such frequently appearing real-life data. In our view, data becomes more interesting when it is about an interaction. In other words, since interaction is so central to our understanding of the world, it should then also be reflected in our data representations. To include the most significant data, we should turn our attention from myData to focus on ourData. Here, the importance of data is then dependent on, and even defined by, with whom are you talking?}, group = {ambience}}
doi link bibtex abstract
@article{Savazzi_2019_transformative, author={Stefano Savazzi and Stephan Sigg and Federico Vicentini and Sanaz Kianoush and Rainhard Findling}, journal={IEEE Computer, SI on on Transformative Computing and Communication}, title={On the use of stray wireless signals for sensing: a look beyond 5G for the next generation industry}, year={2019}, number = {7}, pages = {25-36}, volume = {52}, doi = {10.1109/MC.2019.2913626}, abstract = {Transformative techniques to capture and process wireless stray radiation originated from different radio sources are gaining increasing attention. They can be applied to human sensing, behavior recognition, localization and mapping. The omnipresent radio-frequency (RF) stray radiation of wireless devices (WiFi, Cellular or any Personal/Body Area Network) encodes a 3D view of all objects traversed by its propagation. A trained machine learning model is then applied to features extracted in real-time from radio signals to isolate body-induced footprints or environmental alterations. The technology can augment and transform existing radio-devices into ubiquitously distributed sensors that simultaneously act as wireless transmitters and receivers (e.g. fast time-multiplexed). Thereby, 5G-empowered tiny device networks transform into a dense web of RF-imaging links that extract a view of an environment, for instance, to monitor manufacturing processes in next generation industrial set-ups (Industry 4.0, I4.0). This article highlights emerging transformative computing tools for radio sensing, promotes key technology enablers in 5G communication and reports deployment experiences.}, project = {radiosense}, group = {ambience}}
doi link bibtex abstract
@article{Hintze_2019_Ubicomp, author = {Daniel Hintze and Matthias F\"uller and Sebastian Scholz and Rainhard Findling and Muhammad Muaaz and Philipp Kapfer and Eckhard Kochand Ren\'{e} Mayrhofer}, journal = {Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT)}, title = {CORMORANT: Ubiquitous Risk-Aware Multi-Modal Biometric Authentication Across Mobile Devices}, year = {2019}, month = sep, abstract = {People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners’ digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We present the concept of CORMORANT , an approach to significantly reduce the manual burden of mobile user verification through risk-aware, multi-modal biometric, cross-device authentication. Transparent behavioral and physiological biometrics like gait, voice, face, and keystroke dynamics are used to continuously evaluate the user’s identity without explicit interaction. The required level of confidence in the user’s identity is dynamically adjusted based on the risk of unauthorized access derived from signals like location, time of day and nearby devices. Authentication results are shared securely with trusted devices to facilitate cross-device authentication for co-located devices. Conducting a large-scale agent-based simulation of 4 000 users based on more than 720 000 days of real-world device usage traces and 6.7 million simulated robberies and thefts sourced from police reports, we found the proposed approach is able to reduce the frequency of password entries required on smartphones by 97.82% whilst simultaneously reducing the risk of unauthorized access in the event of a crime by 97.72%, compared to conventional knowledge-based authentication. }, doi={10.1145/2800835.2800906}, group = {ambience}}
@InProceedings{Rainhard_2019_iwann, author={Rainhard Dieter Findling and Le Ngu Nguyen and Stephan Sigg}, title={Closed-Eye Gaze Gestures: Detection and Recognition of Closed-Eye Movements with Cameras in Smart Glasses}, booktitle={International Work-Conference on Artificial Neural Networks}, year={2019}, doi = {10.1007/978-3-030-20521-8_27}, abstract ={Gaze gestures bear potential for user input with mobile devices, especially smart glasses, due to being always available and hands-free. So far, gaze gesture recognition approaches have utilized open-eye movements only and disregarded closed-eye movements. This paper is a first investigation of the feasibility of detecting and recognizing closed-eye gaze gestures from close-up optical sources, e.g. eye-facing cameras embedded in smart glasses. We propose four different closed-eye gaze gesture protocols, which extend the alphabet of existing open-eye gaze gesture approaches. We further propose a methodology for detecting and extracting the corresponding closed-eye movements with full optical flow, time series processing, and machine learning. In the evaluation of the four protocols we find closed-eye gaze gestures to be detected 82.8%-91.6% of the time, and extracted gestures to be recognized correctly with an accuracy of 92.9%-99.2%.}, url_Paper = {http://ambientintelligence.aalto.fi/findling/pdfs/publications/Findling_19_ClosedEyeGaze.pdf}, project = {hidemygaze}, group = {ambience}}
@InProceedings{Ferran_2019_iwann, author={Kacper Skawinski and Ferran Montraveta Roca and Rainhard Dieter Findling and Stephan Sigg}, title={Workout Type Recognition and Repetition Counting with CNNs from 3D Acceleration Sensed on the Chest}, booktitle={International Work-Conference on Artificial Neural Networks}, year={2019}, doi = {10.1007/978-3-030-20521-8_29}, volume = {11506}, series = {LNCS}, pages = {347--359}, month = jun, abstract = {Sports and workout activities have become important parts of modern life. Nowadays, many people track characteristics about their sport activities with their mobile devices, which feature inertial measurement unit (IMU) sensors. In this paper we present a methodology to detect and recognize workout, as well as to count repetitions done in a recognized type of workout, from a single 3D accelerometer worn at the chest. We consider four different types of workout (pushups, situps, squats and jumping jacks). Our technical approach to workout type recognition and repetition counting is based on machine learning with a convolutional neural network. Our evaluation utilizes data of 10 subjects, which wear a Movesense sensors on their chest during their workout. We thereby find that workouts are recognized correctly on average 89.9% of the time, and the workout repetition counting yields an average detection accuracy of 97.9% over all types of workout.}, url_Paper = {http://ambientintelligence.aalto.fi/findling/pdfs/publications/Skawinski_19_WorkoutTypeRecognition.pdf}, group = {ambience}}
@article{Haukipuro_2019_IEICE, author={Eeva-Sofia Haukipuro and Ville Kolehmainen and Janne Myllarinen and Sebastian Remander and Janne T. Salo and Tuomas Takko and Le Ngu Nguyen and Stephan Sigg and Rainhard Findling}, journal={IEICE Transactions, Special issue on Sensing, Wireless Networking, Data Collection, Analysis and Processing Technologies for Ambient Intelligence with Internet of Things}, title={Mobile Brainwaves: On the Interchangeability of Simple Authentication Tasks with Low-Cost, Single-Electrode EEG Devices}, year={2019}, url_Paper = {http://ambientintelligence.aalto.fi/findling/pdfs/publications/Haukipuro_19_MobileBrainwavesInterchangeability.pdf}, abstract = {Electroencephalography (EEG) for biometric authentication has received some attention in recent years. In this paper, we explore the effect of three simple EEG related authentication tasks, namely resting, thinking about a picture, and moving a single finger, on mobile, low-cost, single electrode based EEG authentication. We present details of our authentication pipeline, including extracting features from the frequency power spectrum and MFCC, and training a multilayer perceptron classifier for authentication. For our evaluation we record an EEG dataset of 27 test subjects. We use a baseline, task-agnostic, and task-specific evaluation setup to investigate if different tasks can be used in place of each other for authentication. We further evaluate if tasks themselves can be told apart from each other. Evaluation results suggest that tasks differ, hence to some extent are distinguishable, as well as that our authentication approach can work in a task-specific as well as in a task-agnostic manner.}, doi = {10.1587/transcom.2018SEP0016}, group = {ambience} } %%% 2018 %%%
@article{Findling_2018_TMC, author = {Rainhard Findling and Michael H\"olzl and Ren\'e Mayrhofer}, title = {Mobile Match-on-Card Authentication Using Offline-Simplified Models with Gait and Face Biometrics}, journal = {IEEE Transactions on Mobile Computing (TMC)}, year = {2018}, volume = {14}, number = {11}, pages = {2578-2590}, url_Paper = {http://ambientintelligence.aalto.fi/findling/pdfs/publications/Findling_18_MobileMatchon.pdf}, doi = {https://doi.org/10.1109/TMC.2018.2812883}, abstract = {Biometrics have become important for mobile authentication, e.g. to unlock devices before using them. One way to protect biometric information stored on mobile devices from disclosure is using embedded smart cards (SCs) with biometric match-on-card (MOC) approaches. However, computational restrictions of SCs also limit biometric matching procedures. We present a mobile MOC approach that uses offline training to obtain authentication models with a simplistic internal representation in the final trained state, wherefore we adapt features and model representation to enable their usage on SCs. The pre-trained model can be shipped with SCs on mobile devices without requiring retraining to enroll users. We apply our approach to acceleration based mobile gait authentication as well as face authentication and compare authentication accuracy and computation time of 16 and 32 bit Java Card SCs. Using 16 instead of 32 bit SCs has little impact on authentication performance and is faster due to less data transfer and computations on the SC. Results indicate 11.4% and 2.4-5.4% EER for gait respectively face authentication, with transmission and computation durations on SCs in the range of 2s respectively 1s. To the best of our knowledge this work represents the first practical approach towards acceleration based gait MOC authentication.}, group = {ambience}}
@article{hintze2017large, title={A Large-Scale, Long-Term Analysis of Mobile Device Usage Characteristics}, author={Hintze, Daniel and Hintze, Philipp and Findling, Rainhard D and Mayrhofer, Ren{\'e}}, journal={Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies}, volume={1}, number={2}, pages={13}, year={2017}, publisher={ACM}, abstract = {Today, mobile devices like smartphones and tablets have become an indispensable part of people’s lives, posing many new questions e.g., in terms of interaction methods, but also security. In this paper, we conduct a large scale, long term analysis of mobile device usage characteristics like session length, interaction frequency, and daily usage in locked and unlocked state with respect to location context and diurnal pattern. Based on detailed logs from 29,279 mobile phones and tablets representing a total of 5,811 years of usage time, we identify and analyze 52.2 million usage sessions with some participants providing data for more than four years. Our results show that context has a highly significant effect on both frequency and extent of mobile device usage, with mobile phones being used twice as much at home compared to in the office. Interestingly, devices are unlocked for only 46% of the interactions. We found that with an average of 60 interactions per day, smartphones are used almost thrice as often as tablet devices (23), while usage sessions on tablets are three times longer, hence are used almost for an equal amount of time throughout the day. We conclude that usage session characteristics differ considerably between tablets and smartphones. These results inform future approaches to mobile interaction as well as security.}, doi = {10.1145/3090078}, url_Paper = {http://ambientintelligence.aalto.fi/findling/pdfs/publications/Hintze_17_LargeScaleLong.pdf}, group = {ambience}}
link bibtex
@article{kefer2017evaluating, title={Evaluating the Placement of Arm-Worn Devices for Recognizing Variations of Dynamic Hand Gestures.}, author={Kefer, Kathrin and Holzmann, Clemens and Findling, Rainhard Dieter}, journal={J. Mobile Multimedia}, volume={12}, number={3\&4}, pages={225--242}, year={2017}, group = {ambience}}
link bibtex
@inproceedings{fernandez2017mobile, title={Mobile Wrist Vein Authentication Using SIFT Features}, author={Fern{\'a}ndez, Pol and Findling, Rainhard Dieter}, booktitle={EUROCAST}, pages={140}, year={2017}, group = {ambience} } %%% 2016 %%%
link bibtex
@inproceedings{findling2016mobile, title={Mobile gait match-on-card authentication from acceleration data with offline-simplified models}, author={Findling, Rainhard Dieter and H{\"o}lzl, Michael and Mayrhofer, Ren{\'e}}, booktitle={Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media}, pages={250--260}, year={2016}, organization={ACM}, group = {ambience}}
link bibtex
@inproceedings{kefer2016comparing, title={Comparing the placement of two arm-worn devices for recognizing dynamic hand gestures}, author={Kefer, Kathrin and Holzmann, Clemens and Findling, Rainhard Dieter}, booktitle={Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media}, pages={99--104}, year={2016}, organization={ACM} }
link bibtex
@article{findling2016shakeunlock, title={Shakeunlock: Securely transfer authentication states between mobile devices}, author={Findling, Rainhard Dieter and Muaaz, Muhammad and Hintze, Daniel and Mayrhofer, Ren{\'e}}, journal={IEEE Transactions on Mobile Computing}, volume={16}, number={4}, pages={1163--1175}, year={2016}, publisher={IEEE} }
link bibtex
@inproceedings{hintze2015confidence, title={Confidence and risk estimation plugins for multi-modal authentication on mobile devices using cormorant}, author={Hintze, Daniel and Muaaz, Muhammad and Findling, Rainhard D and Scholz, Sebastian and Koch, Eckhard and Mayrhofer, Ren{\'e}}, booktitle={Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia}, pages={384--388}, year={2015}, organization={ACM}, group = {ambience}}
link bibtex
@inproceedings{hintze2015cormorant, title={Cormorant: towards continuous risk-aware multi-modal cross-device authentication}, author={Hintze, Daniel and Findling, Rainhard D and Muaaz, Muhammad and Koch, Eckhard and Mayrhofer, Ren{\'e}}, booktitle={Adjunct Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers}, pages={169--172}, year={2015}, organization={ACM}, group = {ambience}}
link bibtex
@article{findling2015key, title={Key Code Recognition: Case Study of Automatically Deriving the Code of a Physical Key from Mobile Device Camera Images for the EVVA A key profile}, author={Findling, Rainhard Dieter}, year={2015}, group = {ambience}}
link bibtex
@inproceedings{findling2015towards, title={Towards device-to-user authentication: Protecting against phishing hardware by ensuring mobile device authenticity using vibration patterns}, author={Findling, Rainhard Dieter and Mayrhofer, Rene}, booktitle={Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia}, pages={131--135}, year={2015}, organization={ACM}, group = {ambience}}
link bibtex
@inproceedings{mayrhofer2014optimal, title={Optimal derotation of shared acceleration time series by determining relative spatial alignment}, author={Mayrhofer, Rene and Hlavacs, Helmut and Findling, Rainhard Dieter}, booktitle={Proceedings of the 16th International Conference on Information Integration and Web-based Applications \& Services}, pages={71--78}, year={2014}, organization={ACM}, group = {ambience}}
link bibtex
@inproceedings{hintze2014diversity, title={Diversity in locked and unlocked mobile device usage}, author={Hintze, Daniel and Findling, Rainhard D and Muaaz, Muhammad and Scholz, Sebastian and Mayrhofer, Ren{\'e}}, booktitle={Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication}, pages={379--384}, year={2014}, organization={ACM}, group = {ambience} }
link bibtex
@article{mayrhofer2014determining, title={Determining Relative Spatial Alignment based on Shared Acceleration Time Series}, author={Mayrhofer, Rene and Hlavacs, Helmut and Findling, Rainhard Dieter}, year={2014}, group = {ambience}}
link bibtex
@inproceedings{hintze2014mobile, title={Mobile device usage characteristics: The effect of context and form factor on locked and unlocked usage}, author={Hintze, Daniel and Findling, Rainhard D and Scholz, Sebastian and Mayrhofer, Ren{\'e}}, booktitle={Proceedings of the 12th international conference on advances in mobile computing and multimedia}, pages={105--114}, year={2014}, organization={ACM}, group = {ambience}}
link bibtex
@inproceedings{findling2014shakeunlock, title={Shakeunlock: Securely unlock mobile devices by shaking them together}, author={Findling, Rainhard Dieter and Muaaz, Muhammad and Hintze, Daniel and Mayrhofer, Ren{\'e}}, booktitle={Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia}, pages={165--174}, year={2014}, organization={ACM}, group = {ambience} }
link bibtex
@inproceedings{findling2013range, title={Range face segmentation: Face detection and segmentation for authentication in mobile device range images}, author={Findling, Rainhard D and Wenny, Fabian and Holzmann, Clemens and Mayrhofer, Ren{\'e}}, booktitle={Proceedings of International Conference on Advances in Mobile Computing \& Multimedia}, pages={260}, year={2013}, organization={ACM}, group = {ambience}}
link bibtex
@book{findling2013pan, title={Pan shot face unlock: Towards unlocking personal mobile devices using stereo vision and biometric face information from multiple perspectives}, author={Findling, Rainhard Dieter}, year={2013}, publisher={na}}
link bibtex
@article{dieter2013towards, title={Towards pan shot face unlock: Using biometric face information from different perspectives to unlock mobile devices}, author={Dieter Findling, Rainhard and Mayrhofer, Rene}, journal={International Journal of Pervasive Computing and Communications}, volume={9}, number={3}, pages={190--208}, year={2013}, publisher={Emerald Group Publishing Limited}, group = {ambience}}
link bibtex
@inproceedings{findling2013towards, title={Towards secure personal device unlock using stereo camera pan shots}, author={Findling, Rainhard D and Mayrhofer, Rene}, booktitle={International Conference on Computer Aided Systems Theory}, pages={417--425}, year={2013}, organization={Springer}, group = {ambience} }
link bibtex
@inproceedings{findling2012towards, title={Towards face unlock: on the difficulty of reliably detecting faces on mobile phones}, author={Findling, Rainhard D and Mayrhofer, Rene}, booktitle={Proceedings of the 10th International Conference on Advances in Mobile Computing \& Multimedia}, pages={275--280}, year={2012}, organization={ACM}, group = {ambience} } %%% 2011 %%%
Embedding in another Page
Copy & paste any of the following snippets into an existing page to embed this page. For more details see the documention.
JavaScript (easiest)
<script src="https://bibbase.org/show?bib=https://ambientintelligence.aalto.fi/bibtex/LiteraturAll&folding=0&filter=author_short:Findling&jsonp=1"></script>
<?php
$contents = file_get_contents("https://bibbase.org/show?bib=https://ambientintelligence.aalto.fi/bibtex/LiteraturAll&folding=0&filter=author_short:Findling");
print_r($contents);
?>
<iframe src="https://bibbase.org/show?bib=https://ambientintelligence.aalto.fi/bibtex/LiteraturAll&folding=0&filter=author_short:Findling"></iframe>