Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A dynamic decision fusion middleware for trustworthy context-aware IoT applications., , and . M4IoT@Middleware, page 1-6. ACM, (2017)A Systematic Comparison of Age and Gender Prediction on IMU Sensor-Based Gait Traces., , , , and . Sensors, 19 (13): 2945 (2019)Gait Authentication based on Spiking Neural Networks., , , and . BIOSIG, volume P-315 of LNI, page 51-60. Gesellschaft für Informatik e.V., (2021)Beware the Doppelgänger: Attacks against Adaptive Thresholds in Facial Recognition Systems., , , , and . ARES, page 18:1-18:11. ACM, (2023)A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints., , , , , , , and . NDSS, The Internet Society, (2020)Fishy Faces: Crafting Adversarial Images to Poison Face Authentication., , , , and . WOOT @ USENIX Security Symposium, USENIX Association, (2018)Privacy-Preserving Behavioral Authentication on Smartphones., , , and . HumanSys@SenSys, page 1-6. ACM, (2017)PIVOT: Private and Effective Contact Tracing., , , , , and . IEEE Internet Things J., 9 (22): 22466-22489 (2022)Adversarial Robustness is Not Enough: Practical Limitations for Securing Facial Authentication., , , and . IWSPA@CODASPY, page 2-12. ACM, (2022)A Survey on Applying Machine Learning Techniques for Behavioral Awareness., , , , , and . State of the Art in AI Applied to Ambient Intelligence, volume 298 of Frontiers in Artificial Intelligence and Applications, IOS Press, (2017)