Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)

Secure Password Using EEG-based BrainPrint


System: Unlock Smartphone Password Using Brain-
2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM) | 978-1-6654-6819-0/22/$31.00 ©2022 IEEE | DOI: 10.1109/BIBM55620.2022.9995304

Computer Interface Technology


Zuwaina Alkhyeli1, Ayesha Alshehhi2, Mazna Alhemeiri3, Salma Aldhanhani3, Khalil AlBalushi2, Fatima Ali
AlNuaimi4, Abdelkader Nasreddine Belkacem3

Dep. Computer Science and Software Engineering, CIT, UAE University, Al Ain, UAE
1

2
Dep. Information Systems and Security, CIT, UAE University, Al Ain, UAE
3
Dep. Computer & Network Engineering, CIT, United Arab Emirates University, Al Ain, UAE.
4
Autonomous Robotics Research Center, TII, Abu Dhabi, UAE.

Abstract—As security becomes a strong factor in daily and allows users to attain their passwords as a network that
activities, finding secure ways to unlock machines and represents user preferences (BrainPrint) that the user may not
smartphones is a challenge due to hardware limitations and the know. The proposed system can extract unique biometric
high risk of hacking. Considering the level of security and privacy features from an individual’s brain to produce different
in the digital world, attackers tend to be one step ahead. Therefore, networks for use as a security layer based on brain-computer
this technical paper introduces a brain-computer interface (BCI) interface (BCI) technology (see Fig. 1). The BCI allows humans
for increasing subject-based security using unique biometric to communicate and send commands from their brain to external
features as a solution to build complex passwords. The BCI devices, such as computers or drones, for different applications
measures brain changes and extracts relevant bio-features from
(medical or non-medical) by measuring brain signals with
each subject using non-invasive electroencephalogram (EEG)
tests. The proposed system allows users to gain access to their
electrodes [1–9]. These capture neural signals from a user’s
devices using brain waves (bypass) instead of inserting their brain and extract features. These extracted features are then used
password manually (normal path), which saves the user time and to train machine learning (ML) models for different tasks [10–
upgrades the level of privacy as no physical actions are required 16].
during this process. This system is also well suited for individuals The security layer can be entered without any physical
with mobility impairments. We used the P300-based BCI reaction (bypass) as the developed system is sufficiently
controlling paradigm which depends on reading the electrical accurate so that users can enter their passwords without moving
brain activity of the user when observing a particular object. The
apart. This feature applies to all traditional security layers
other feature of the system is that it can extract unique features of
each individual brain to produce a network that uniquely
available in the market. From a privacy perspective, this adds
identifies them, which is used as a security layer. Users need to significant contributing factors in mitigating violations to users’
enter their unique network to access their device with failed privacy during their attempts to access their accounts on public
attempts requiring an EEG test to identify the user. The system ATMs or other intelligent devices based on their physical
plays an active role in facilitating user processes for authentication appearance [17]. At the same time, user access is similar, which
while accessing devices. The system establishes an urgent call
whenever the user’s brain currents command it to. The project
outcomes were assessed by simulating the BCI before real-time
implementation to determine errors and resolve the validity of the
project scope.

Keywords—Brain-computer Interface, BCI, Robot Operating


System, ROS, Electroencephalogram, EEG.

I. INTRODUCTION
The majority of security systems depend greatly on giving
users the option to shape the security layer on their intelligent
machines, which is a repetitive approach as technology
progresses in this field. The proposed solution breaks this loop Fig. 1 Secure password using EEG-based Brainprint system: Concept for
the proposed traditional BCI and biomarker architecture.

978-1-6654-6819-0/22/$31.00 ©2022 IEEE 1982

Authorized licensed use limited to: United Arab Emirates University. Downloaded on January 09,2023 at 05:42:07 UTC from IEEE Xplore. Restrictions apply.
prevents stalkers and cameras from sniffing user inputs. If the identification phase are matched with their brain currents when
user is under threat to draw money or unlock their phone, the considering the same image.
process will fail as this activity creates disorder in brain currents,
which is another security advantage. This can be achieved The common situation we both are willing to address is
through a wearable EEG headset that reads activities in various maintaining reliability while raising security through unique
channels of the brain. To generate a unique network, users watch features in a user’s brain. Our proposed approach depends on
videos of various situations while training the ML system [18]. showing short videos to capture user brain interactions and
generate a network as a protection layer. In comparison, SaS-
We depict changes in the electrical currents of users’ brains BCI project focused on capturing brain interactions while
by installing eight electrodes on top of the head. Collected data showing users a picture. Then, during the access phase, the users
are gathered, cleaned, and preprocessed to ensure they can be must recall the images they saw for identification. Over time,
input into the system. The data are used with two different users’ memorization of an image deteriorates, which forces them
approaches. First is the network creation, which is done by to keep a physical or soft copy on a different device as a
pushing the data through correlation techniques to produce a reference whenever they face such difficulty. Alternative
spectrogram for the network creation. The network exhibits the developers can get users back to the traditional way of
brain-print of each user, which is used as a security layer during authenticating after several attempts.
login. The second usage is around user identification. Statistics
and data are fed to an adaptive deep learning model to predict Another proposed idea is the “Brain-computer Interface-
user authenticity. If a user fails to enter the correct network, an based User Authentication System for Personal Device
EEG test will take place to provide data to the model for Security” [24]. This process unlocks any device using a
authentication. For bypass access (entering a password without password generated by the user’s brain. The user selects the row
moving any part of your body), once the electrodes are from a 3×3 matrix of flashing circles that contains the circle they
positioned, the user observes the key they mean to input. want. The user then selects the circle itself from that row and
Patterns are produced as the P300 method depends extensively will be required to set a number for the chosen item from their
on reading the EEG while the currents pass between brain lobes, brain waves. This is used to train the machine on the formation
which is measured by the proposed system to indicate what is to of user currents while setting a password so that when the
be performed on the user device. headset is placed on the user, the machine can detect whenever
there is a trigger in their brain currents. At the same time, the
There are many different BCI applications, such as word user hears a particular integer based on what they set previously.
processing, adapted web browsers, wheelchair brain control, and
games [9,19]. The BCI applications have improved the quality II. METHODS AND MATERIALS
of life for all categories of people, including those with A. Requirement and Analysis
disabilities, and have served many other industries. Most BCI
systems use non-invasive EEG signals as they provide This section presents the proposed BCI system architecture
acceptable signal quality that utilizes inexpensive and easy-to- with differences between the traditional BCI and the biomarkers
use equipment [20–22]. for BrainPrint (shown in Fig. 1) and what the proposed system
requires to achieve its goal. The functional, non-functional, and
Several projects are at the valuable emergence between the support system requirements are also specified under this
brain and security topics, such as the SaS-BCI (Signal section. To build our system, there is some software must be
Acquisition Strategy-Brain Computer Interface), which is a new downloaded, we must download Unicorn software in PC1 and
strategy to predict image memorability that uses mental imagery download Python, Anaconda, AirDroid in PC2, the AirDroid
as brain-based biometric authentication [23]. Their project must be downloaded also in the smartphone and make sure that
records user brain signals while showing several images that we logged in on the same account in the smartphone and PC2
they are then asked to recall. The user’s brain current reactions with enabling the remote permissions. PC2 must be connected
are captured at the instant of recall to generate an ID that on the same LAN as PC1. Using a specific code to control PC’s2
represents the individual. Whenever the user wants to gain mouse and receiving the command from PC1 and run it on
access to their device, the results observed during the Anaconda. Install the unicorn brain interface on the user’s head
and make sure they are focusing on the function to specific the

Fig. 2 Traditional P300-based BCI for unlock smartphone password. Fig. 3 Implementation steps for BCI-based password unlock.

1983

Authorized licensed use limited to: United Arab Emirates University. Downloaded on January 09,2023 at 05:42:07 UTC from IEEE Xplore. Restrictions apply.
sending command. There are some conditions must be bypass has more benefits than conventional approaches (Table
implemented to get an accurate data first of all, the unicorn must 1).
be fully charged and make sure that the individual who wears
the unicorn is relaxed and comfortable in a quiet environment, The Unicorn recorder software tracks the status of the
not to forget that the smartphone also must be full charged and electrodes to ensure they are sensing the currents properly. This
function appropriately to avoid any issues maybe faced. The illuminates green lights to indicate proper functioning and
hardware needed to build our system is two PCs, smartphone, orange for poor functioning. Then, the Unicorn Speller software
Unicorn Hybrid EEG Electrodes, Unicorn Brain Interface is opened, which contains 12 visual items that refer to the actions
Hybrid Black, Unicorn USB Charging Cable, Unicorn Sticky needed for the first solution to unlock the smartphone password
Electrodes, Unicorn Bluetooth Dongle and Unicorn Brain (0, 1, 2, 3, 4, 5, 6, 7, 8, 9, enter, and delete). The user is asked to
Interface Hybrid Black. We have used software called “Unicorn focus on the flashing items so they can choose the correct
Recorder Hybrid Black”, that has a license for Unicorn Speller password. Calibration is performed before letting the user make
Hybrid Black. Plus, we used AirDroid Application for PC2, a selection to ensure the results are accurate (see Fig. 2).
AirDroid Application for Smartphone, Python 3.8, Anaconda, C. Implementation and Testing:
and MATLAB. The user sits in front of a PC and focuses on flashing items.
TABLE I. Comparison table between brain bypass and normal path. Two PCs are used in the solution. The first collects the signals
and the second performs the action on the smartphone
Type Bypass Normal path (Android). The second PC has the open-source package
Anaconda installed and a distribution of Python and R for
Security Security-based on Security-based on user
user password choice password choice
scientific computing [25]. The laptop runs the Python code and
an AirDroid application that remotely controls the smartphone.
User response time Faster Slower
The second laptop should be connected to the same network
as the first laptop through an Ethernet cable. A ping is sent in the
Brain features Not unique Not unique command prompt to check that the two laptops are connected.
The IP address of the first laptop was for instance 192.168.0.1
and that for the second was 192.168.0.3, which Unicorn Speller
B. Design and Architecture wants to customize. After checking and fixing any issues with
the connection between the laptops, the AirDroid client is
This section discusses the project design and architecture.
opened on the second laptop to control the smartphone, which is
The user attains a secure password by creating a unique network
also opened on the smartphone. Fig. 3 shows the system
from a recorded signal while watching different videos. This is
architecture of the application and the connection between all
particularly useful for people with disabilities as they will be
devices. After signing in, the smartphone is seen to be
able to unlock their devices without moving any part of their
connected, but we must check if it is root or non-root for the
body. These techniques can be used separately as a bypass to
control. If the AirDroid Personal Desktop Client cannot
unlock the password using traditional means. In general, the
recognize the phone when running, the non-root needs to
connect the Android device to a computer through a USB cable.

Fig. 4 Our proposed framework for secure password using EEG-based Brainprint system.

1984

Authorized licensed use limited to: United Arab Emirates University. Downloaded on January 09,2023 at 05:42:07 UTC from IEEE Xplore. Restrictions apply.
Fig. 6 Recording EEG signal during the second solution to unlock a
smartphone password by creating a specific user biomarker.

calibration. The saved calibration set dialog appears once the


items panel is completed or the user has stopped calibration.
This sends the key to the second laptop to unlock the
smartphone. If the calibration is successful, a correct key is
obtained to unlock the password. For example, when the person
selects the icon named Key_8, which is the number eight, the
arrow on the second laptop moves to the position of the number
eight. Anaconda is used to run the Python code, which moves
the pointer to the intended position as an input. An SOS call
option was added so that disabled individuals can easily contact
their family or the police to ask for help or any other condition.
The first part of Fig. 3 illustrates the flowchart of the process
for traditional BCI. The owner sends signals using the EEG to
select the icon. A command is then sent to the PC, and the
smartphone is controlled remotely to unlock the password
through brain signals using the AirDroid application installed on
the PC. As brainwaves in the first part of the project are
associated with more than one person, they are not unique. Thus,
we have been trying to propose a new way for each person to
have individual brain prints. The second part of the project
introduces a biomarker-based password control to solve security
issues by finding particular brain features for each person. For
implementation, different videos were recorded for each person
Fig. 5 EEG decoding flowcharts. a) Traditional BCI-based control for the
and a unique network was developed.
BrainPrint entity relationship flowchart. b) Biomarkers for the BrainPrint We propose two different implementations: one for healthy
flowchart.
people and one for people with disabilities. Healthy users will
The computer may not recognize the Android device via USB enter their unique patterns manually. If the user enters it
cable, so several steps are followed to address this issue: correctly, the phone is unlocked. If not, the user must perform
the EEG test by watching the nine videos three times, and the
1) Enable “USB debugging” from the “developer option” average for each video is calculated and compared with the
2) From the developer options, choose “Revoke USB results saved on the network. After matching, the password is
debugging authorizations” – “OK;” once the USB unlocked for the people with disabilities, and the user enters the
cable is reconnected, tab on an “allow” button from the unique pattern using bypass technology by attaining brain
USB debugging pop-up window signals and doing actions without needing any external help to
enter the password, which is similar to the first type. If the
3) Ensure the system is changed to USB mode; in some pattern is entered incorrectly, an EEG test will be required. Fig.
cases, this problem was not resolved unless the cable 3 presents the process of the project implementations.
was changed
III. TESTING AND RELIMINARY RESULTS
The phone is controlled by a remote client, as shown in Fig.
2, which gives complete control. The P300 Speller is used on the To test the implementation, the user sits in front of a PC and
first laptop, and the icon is selected for the item to appear on the is focused on the displayed video to produce a unique network.

1985

Authorized licensed use limited to: United Arab Emirates University. Downloaded on January 09,2023 at 05:42:07 UTC from IEEE Xplore. Restrictions apply.
Nine different videos are prepared, and each one has a unique IV. CONCLUSION
impact on the user. In the first step, we checked whether the
electrodes are working or not. Then, by ensuring the electrodes In this paper, we have highlighted the major role our project
gave a green color, we asked the user not to perform any plays in making authentication processes an extraordinary
movement while playing videos. While the user was watching, experience by raising the standards of security, and privacy. In
their signals were recorded and saved into a separate file for that, users will experience cutting-edge technology that has not
subsequent processing, as shown in Fig. 4. This process was taken place in the area of security earlier. As this technology
repeated three times to ensure precise readings. Each record strength relies on recognizing complex patterns a user's brain
was collected on the sprite excel file. We had 27 excel sheets generates, we have mentioned how to make the best use of these
with personal information and analyzed the data in MATLAB. measurements to serve in the generation of a new security layer
Two graphs (normal signal and spectrogram) to find the for locking smart devices. The concept has taken two paths. One
provides nonphysical interaction (brainwaves) for gaining
average of the three results from each video are shown in Fig.
access to a smart device (Unlocking password as user command,
4.
bypass). Whereas the other concern is pointing out the unique
The unique network for each user is created by analyzing features of each individual brain wave, by examining their
the signals in MATLAB. There are five networks as each encephalography’s behavior during the observation of nine
frequency band could have different results to make it accurate. videos. We highly believe that this innovative idea will
After the average was found, each electrode was correlated to contribute to making a noble addition to the field of security
produce one unique network for each individual. We chose owing to the joy and flexibility it adds during authentication
video 1 as a reference and correlated it with all sampled procedures. This keeps pace with the aspiration of nations and
frequencies to define the number of samples per second. A total the technology market in the field of security.
of 256 sampling frequencies were found (12,800 (rows=
samples) × 8 (columns= electrodes)). We minimized the video ACKNOWLEDGMENT
from 60 to 50 s for the 27 videos. We also preprocessed the data
AB acknowledges support from the United Arab Emirates University and
by deleting unnecessary columns that do not represent the ASPIRE (AYIA20-002, 21T057).
electrodes readings to achieve a better accuracy. The two
spectrograms and the average signal for the volunteers (video REFERENCES
6) are shown in Fig. 4. The results are different and unique [1] D. M. Taylor, S. I. H. Tillery, and A. B. Schwartz, “Direct cortical control
based on examining the average signal. Fig. 4 also shows the of 3d neuro prosthetic devices,” Science, vol. 296, no. 5574, pp. 1829–
correlation between two volunteers for all the videos they 1832, 2002.
watched in step 4. The data using the MATLAB correlation are [2] F. A. Al-Nuaimi, R. J. Al-Nuaimi, S. S. Al-Dhaheri, S. Ouhbi, and A. N.
Belkacem, “Mind Drone Chasing Using EEG-based Brain Computer
considered based on video 1 as a reference for the database. Interface,” 2020 16th International Conference on Intelligent
After the above step, the K-nearest neighbor approach is used Environments (IE), pp. 74–79, Jul. 2020, doi:
to check the similarity between the two datasets. The algorithm 10.1109/ie49459.2020.9154926.
stores the existing data and categorizes new data based on the [3] H. Wang and A. Bezerianos, “Brain-controlled wheelchair controlled by
similarities. This is typically used to categorize data points sustained and brief motor imagery bcis,” Electronics Letters, vol. 53, no.
17, pp. 1178–1180, 2017.
based on how their neighbors are grouped. Thus, in the first
[4] Q. Gao, L. Dou, A. N. Belkacem, and C. Chen, “Noninvasive
step, all the data are added to one excel sheet from EEG-1 electroencephalogram based control of a robotic arm for writing task
through EEG-8. Then, a row is added to link each data with its using hybrid bci system,” BioMed research international, vol. 2017, 2017.
corresponding video number. Moreover, the data are uploaded [5] L. Shao, L. Zhang, A. N. Belkacem, Y. Zhang, X. Chen, J. Li, and H. Liu,
to the python code. Once the code is executed, the data are “Eeg-controlled wall-crawling cleaning robot using ssvep-based brain-
computer interface,” Journal of Healthcare Engineering, vol. 2020, 2020.
divided into two sections, 75% for training data and 25% for
[6] A. N. Belkacem, S. Nishio, T. Suzuki, H. Ishiguro, and M. Hirata,
the testing data. The produced model predicts which video the “Neuromagnetic decoding of simultaneous bilateral hand movements for
user watched based on their brain data with an accuracy of 31%. multidimensional brain–machine interfaces,” IEEE Transactions on
Most classes were classified as two possible solutions, either Neural Systems and Rehabilitation Engineering, vol. 26, no. 6, pp. 1301–
yes or no. In our case, the data included six different classes that 1310, 2018.
considers a high range of classifications to check if the accuracy [7] J. R.Wolpaw, N. Birbaumer, D. J. McFarland, G. Pfurtscheller, and T. M.
Vaughan, “Brain–computer interfaces for communication and control,”
was acceptable. We divide one by the number of classes, which Clinical neurophysiology, vol. 113, no. 6, pp. 767–791, 2002.
is 1/6, so if the accuracy exceeds 16%, we consider it [8] G. Schalk, P. Brunner, L. A. Gerhardt, H. Bischof, and J. R. Wolpaw,
acceptable. Fig. 5 shows two diagrams to describe the used “Brain–computer interfaces (bcis): detection instead of classification,”
algorithms for both traditional BCI and the Biomarkers for Journal of neuroscience methods, vol. 167, no. 1, pp. 51–62, 2008.
BrainPrint. The user signal is detected while showing them [9] N. Birbaumer, C. Weber, C. Neuper, E. Buch, K. Haapen, and L. Cohen,
videos (see Fig. 6), and the data are analyzed using MATLAB “Physiological regulation of thinking: brain–computer interface (bci)
research,” Progress in brain research, vol. 159, pp. 369–391, 2006.
software. Afterward, the average is applied for the three
[10] A. Agarwal et al., "Protecting Privacy of Users in Brain-Computer
attempts. We then compared the signals for each video, and the Interface Applications," in IEEE Transactions on Neural Systems and
final network results for user 1 and user 2. The proposed Rehabilitation Engineering, vol. 27, no. 8, pp. 1546-1555, Aug. 2019, doi:
framework was designed to avoid several BCI cybersecurity 10.1109/TNSRE.2019.2926965.
risks [26].

1986

Authorized licensed use limited to: United Arab Emirates University. Downloaded on January 09,2023 at 05:42:07 UTC from IEEE Xplore. Restrictions apply.
[11] T. L. Bonaci, J. Herron, and H. J. Chizeck, “How susceptible is the brain London, United Kingdom: IntechOpen, 2019 [Online]. Available:
to the side-channel private information extraction,” Amer. J. Bioethics, https://www.intechopen.com/chapters/66160 doi:
Neurosci., vol. 6, no. 4, pp. 82–83, 2015. 10.5772/intechopen.84621
[12] M. Inzlicht, I. McGregor, J. B. Hirsh, and K. Nash, “Neural markers of [20] S. G. Mason, A. Bashashati, M. Fatourechi, K. F. Navarro, and G. E.
religious conviction,” Psychol. Sci., vol. 20, no. 3, pp. 385–392, Mar. Birch, “A Comprehensive Survey of Brain Interface Technology
2009. Designs,” Annals of Biomedical Engineering, vol. 35, no. 2, pp. 137–169,
[13] M. Poel, C. Mühl, B. Reuderink, and A. Nijholt, “Guessing what’s on Nov. 2006, doi: 10.1007/s10439-006-9170-0.
your mind,” in Proc. Int. Conf. Brain Inform., Aug. 2010, pp. 180–191. [21] L. R. Hochberg and J. P. Donoghue, "Sensors for brain-computer
[14] Z. G. Doborjeh, M. G. Doborjeh, and N. Kasabov, “Attentional bias interfaces," in IEEE Engineering in Medicine and Biology Magazine, vol.
pattern recognition in spiking neural networks from spatio-temporal EEG 25, no. 5, pp. 32-38, Sept.-Oct. 2006, doi:
data,” Cogn. Comput., vol. 10, no. 1, pp. 35–48, Feb. 2018. 10.1109/MEMB.2006.1705745.
[15] X. Qian et al., “Brain-computer-interface-based intervention RE- [22] C. Chen, P. Zhou, A. N. Belkacem, L. Lu, R. Xu, X. Wang, W. Tan, Z.
normalizes brain functional network topology in children with attention Qiao, P. Li, Q. Gao et al., “Quadcopter robot control based on hybrid
deficit/hyperactivity disorder,” Transl. Psychiatry, vol. 8, no. 1, p. 149, brain–computer interface system,” Sensors and Materials, vol. 32, no. 3,
2018. pp. 991–1004, 2020.
[16] D. Wu, V. J. Lawhern, S. Gordon, B. J. Lance, and C.-T. Lin, “Driver [23] F. Yousefi, H. Kolivand, and T. Baker, “SaS-BCI: a new strategy to
drowsiness estimation from EEG signals using online weighted predict image memorability and use mental imagery as a brain-based
adaptation regularization for regression (OwARR),” IEEE Trans. Fuzzy biometric authentication,” Neural Computing and Applications, Aug.
Syst., vol. 25, no. 6, pp. 1522–1535, Dec. 2017. 2020, doi: 10.1007/s00521-020-05247-1.
[17] V. Malathi, B. Balamurugan and S. Eshwar, "Achieving Privacy and [24] T. Hossain, A. rakshit and A. Konar, "Brain-Computer Interface based
Security Using QR Code by Means of Encryption Technique in ATM," User Authentication System for Personal Device Security," 2020
2017 Second International Conference on Recent Trends and Challenges International Conference on Computer, Electrical & Communication
in Computational Models (ICRTCCM), 2017, pp. 281-285, doi: Engineering (ICCECE), 2020, pp. 1-6, doi:
10.1109/ICRTCCM.2017.36. 10.1109/ICCECE48148.2020.9223069.
[18] A. A. Khan, A. A. Laghari, A. A. Shaikh, M. A. Dootio, V. V. Estrela, [25] S. R. White, L. M. Amarante, A. V. Kravitz, and M. Laubach, “The Future
and R. T. Lopes, “A blockchain security module for brain-computer Is Open: Open-Source Tools for Behavioral Neuroscience Research,”
interface (BCI) with Multimedia Life Cycle Framework (MLCF),” eneuro, vol. 6, no. 4, pp. ENEURO.0223-19.2019, Jul. 2019, doi:
Neuroscience Informatics, vol. 2, no. 1, p. 100030, Mar. 2022, doi: 10.1523/eneuro.0223-19.2019.
10.1016/j.neuri.2021.100030. [26] A. N. Belkacem, “Cybersecurity framework for P300-based brain
[19] K. Sumi, K. Yabuki, T. J. Tiam-Lee, A. N. Belkacem, Q. Ferre, S. Hirai, computer interface,” IEEE International Conference on Systems, Man,
and T. Endo, "A Cooperative Game Using the P300 EEG-Based Brain- and Cybernetics (SMC), 1-6
Computer Interface", in Assistive and Rehabilitation Engineering.

1987

Authorized licensed use limited to: United Arab Emirates University. Downloaded on January 09,2023 at 05:42:07 UTC from IEEE Xplore. Restrictions apply.

You might also like