Author of the publication

Secure User Verification and Continuous Authentication via Earphone IMU.

, , , , and . IEEE Trans. Mob. Comput., 22 (11): 6755-6769 (November 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

eGovernment Project Evaluation: An Integrated Framework., , , and . EGOV, volume 5184 of Lecture Notes in Computer Science, page 85-97. Springer, (2008)E-Customs Control Procedures Redesign Methodology: Model-Based Application., , and . ECIS, page 93-105. University of St. Gallen, (2007)多跳无线网络干扰攻击建模与性能分析 (Modeling of Jamming Attack and Performance Analysis in Multi-hop Wireless Network)., , , and . 计算机科学, 46 (11A): 414-416 (2019)Efficient group key management for secure big data in predictable large-scale networks., , , , and . Concurr. Comput. Pract. Exp., 28 (4): 1174-1192 (2016)An analysis of digital identity management systems - a two-mapping view., , , and . BRAINS, page 92-96. IEEE, (2020)A Refined Analysis of Zcash Anonymity., , , and . IEEE Access, (2020)Multiple Delay Estimation Using Genetic Algorithm-Based MCMC in Non-Orthogonal Random Access., , , , and . IEEE Wirel. Commun. Lett., 9 (3): 398-401 (2020)Lightweight and Privacy-Preserving Charging Reservation Authentication Protocol for 5G-V2G., , , , and . IEEE Trans. Veh. Technol., 72 (6): 7871-7883 (June 2023)Secure User Verification and Continuous Authentication via Earphone IMU., , , , and . IEEE Trans. Mob. Comput., 22 (11): 6755-6769 (November 2023)Using GARCH-GRNN Model to Forecast Financial Time Series., , and . ISCIS, volume 3733 of Lecture Notes in Computer Science, page 565-574. Springer, (2005)