Author of the publication

Lifestyle Authentication Using a Correlation Between Activity and GPS/Wi-Fi Data.

, , and . AINA (2), volume 226 of Lecture Notes in Networks and Systems, page 522-535. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preliminary study about advantageous trajectory anonymization methods based on population., and . COMSNETS, page 492-495. IEEE, (2018)Redefine and Organize, 4th Authentication Factor, Behavior., , and . Int. J. Netw. Comput., 10 (2): 189-199 (2020)Forgery Resistance of User Authentication Methods Using Location, Wi-Fi and Their Correlation., and . ICISSP, page 709-716. SCITEPRESS, (2024)Effects of Data Sampling Interval on Accuracy of Authentication Using Wi-Fi Information Captured by Smartphone., and . CANDAR (Workshops), page 326-331. IEEE, (2021)GPS-Based Behavioral Authentication Utilizing Distance Coherence., and . DPM/CBT@ESORICS, volume 12484 of Lecture Notes in Computer Science, page 195-215. Springer, (2020)Score Fusion Method by Neural Network Using GPS and Wi-Fi Log Data., , , and . ISITA, page 470-474. IEEE, (2020)One hour term authentication for Wi-Fi information captured by smartphone sensors., and . ISITA, page 330-334. IEEE, (2016)Privacy preserving medical knowledge discovery by multiple "patient characteristics" formatted data., , and . Int. J. Netw. Comput., 13 (2): 195-215 (2023)Template Protected Authentication based on Location History and b-Bit MinHash., , , , , and . ARES, page 98:1-98:8. ACM, (2021)Learning from Smartphone Location Data as Anomaly Detection for Behavioral Authentication through Deep Neuroevolution., , , , and . ICISSP, page 723-728. SCITEPRESS, (2021)