Author of the publication

Secure User Authentication Leveraging Keystroke Dynamics via Wi-Fi Sensing.

, , , , , , , and . IEEE Trans. Ind. Informatics, 18 (4): 2784-2795 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Mechanism for Big Data Collection in Large Scale Internet of Vehicle., , , , , , and . IEEE Internet of Things Journal, 4 (2): 601-610 (2017)RMER: Reliable and Energy-Efficient Data Collection for Large-Scale Wireless Sensor Networks., , and . IEEE Internet of Things Journal, 3 (4): 511-519 (2016)QoS oriented task scheduling based on generic algorithm in cloud computing., , , and . Comput. Syst. Sci. Eng., (2015)A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks., , , , and . Sensors, 15 (12): 31843-31858 (2015)Introduction to Special Issue on Multimedia Big Data: Networking., , , and . TOMM, 12 (5s): 70:1-70:3 (2016)Cooperative Inter-Domain Cache Sharing for Information-Centric Networking via a Bargaining Game Approach., , , and . IEEE Trans. Network Science and Engineering, 6 (4): 698-710 (2019)Hierarchical Posture Representation for Robust Action Recognition., , , and . IEEE Trans. Comput. Social Systems, 6 (5): 1115-1125 (2019)Ontology-based data semantic management and application in IoT- and cloud-enabled smart homes., , and . Future Gener. Comput. Syst., (2017)ICDAR'20: Intelligent Cross-Data Analysis and Retrieval., , , , and . ICMR, page 580-581. ACM, (2020)Rule caching in SDN-enabled mobile access networks., , , and . IEEE Netw., 29 (4): 40-45 (2015)