Author of the publication

deWristified: handwriting inference using wrist-based motion sensors revisited.

, , and . WiSec, page 49-59. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for Inferring Combination Lock Codes using Smartwatches., , , and . CoRR, (2017)On extracting consistent graphs in wireless sensor networks., , , and . Int. J. Sens. Networks, 2 (3/4): 149-162 (2007)Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks., , and . CoRR, (2020)Representation and analysis of coordinated attacks., and . FMSE, page 43-51. ACM, (2003)Exploiting Out-of-band Motion Sensor Data to De-anonymize Virtual Reality Users., , , , and . CoRR, (2023)Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection Mechanisms., , , and . AsiaCCS, page 795-806. ACM, (2016)On Algorand Transaction Fees: Challenges and Mechanism Design., , , , and . ICC, page 5403-5408. IEEE, (2022)Detecting and Punishing Selfish Behavior During Gossiping in Algorand Blockchain., , and . VCC, page 49-55. IEEE, (2023)Towards a Practical Pedestrian Distraction Detection Framework using Wearables., , , , , and . PerCom Workshops, page 239-245. IEEE Computer Society, (2018)Social Puzzles: Context-Based Access Control in Online Social Networks., , and . DSN, page 299-310. IEEE Computer Society, (2014)