From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Framework for Inferring Combination Lock Codes using Smartwatches., , , и . CoRR, (2017)Exploiting Out-of-band Motion Sensor Data to De-anonymize Virtual Reality Users., , , , и . CoRR, (2023)On extracting consistent graphs in wireless sensor networks., , , и . Int. J. Sens. Networks, 2 (3/4): 149-162 (2007)Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks., , и . CoRR, (2020)Representation and analysis of coordinated attacks., и . FMSE, стр. 43-51. ACM, (2003)Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection Mechanisms., , , и . AsiaCCS, стр. 795-806. ACM, (2016)Detecting and Punishing Selfish Behavior During Gossiping in Algorand Blockchain., , и . VCC, стр. 49-55. IEEE, (2023)On Algorand Transaction Fees: Challenges and Mechanism Design., , , , и . ICC, стр. 5403-5408. IEEE, (2022)Towards a Practical Pedestrian Distraction Detection Framework using Wearables., , , , , и . PerCom Workshops, стр. 239-245. IEEE Computer Society, (2018)Social Puzzles: Context-Based Access Control in Online Social Networks., , и . DSN, стр. 299-310. IEEE Computer Society, (2014)