Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Enforcement in Data Analysis Workflows, , , and . Proceedings of the Workshop on Privacy Enforcement and Accountability with Semantics (PEAS2007) at ISWC/ASWC2007, Busan, South Korea, (November 2007)Incremental Mining of Frequent Patterns without Candidate Generation or Support Constraint., and . IDEAS, page 111-116. IEEE Computer Society, (2003)HIAuth: A Hierarchical Implicit Authentication System for IoT Wearables Using Multiple Biometrics., , and . IEEE Access, (2021)Proteus: A reconfigurable computational network for computer vision., , , , , , , , , and 8 other author(s). Mach. Vis. Appl., 8 (2): 85-100 (1995)Implicit IoT authentication using on-phone ANN models and breathing data., , and . Internet Things, (December 2023)Opportunistic Implicit User Authentication for Health-Tracking IoT Wearables., , , and . CoRR, (2021)Context-Dependent Implicit Authentication for Wearable Device User., and . CoRR, (2020)A Design of Artificial Intelligence Education., , , , , and . TALE, page 1-8. IEEE, (2023)Using CMAF to deliver high resolution immersive video with ultra-low end to end latency for live streaming., , , , and . MHV, page 1-6. ACM, (2022)Proteus: a reconfigurable computational network for computer vision., , , , , , , , , and 8 other author(s). ICPR (4), page 43-54. IEEE, (1992)