From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Email as a Master Key: Analyzing Account Recovery in the Wild., , и . INFOCOM, стр. 1646-1654. IEEE, (2018)The Impact of Deep Learning on Organizational Agility., , и . ICIS, Association for Information Systems, (2019)Profit-aware Admission Control for Overload Protection in E-commerce Web Sites., и . IWQoS, стр. 188-193. IEEE, (2007)Tracking Skype VoIP Calls Over The Internet., , , , и . INFOCOM, стр. 96-100. IEEE, (2010)Analysis of Targeted Mouse Movements for Gender Classification., , и . EAI Endorsed Trans. Security Safety, 4 (11): e3 (2017)A Behavioral Biometrics Based Approach to Online Gender Classification., , и . SecureComm, том 198 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 475-495. Springer, (2016)Wiretap-proof: what they hear is not what you speak, and what you speak they do not hear., , и . CODASPY, стр. 345-356. ACM, (2014)Exploiting Eye Tracking for Smartphone Authentication., , , и . ACNS, том 9092 из Lecture Notes in Computer Science, стр. 457-477. Springer, (2015)Responsive Web Design for Chinese Head and Facial Database., , , , и . HCI (11), том 10911 из Lecture Notes in Computer Science, стр. 216-231. Springer, (2018)Detecting VoIP Floods Using the Hellinger Distance., , , и . IEEE Trans. Parallel Distributed Syst., 19 (6): 794-805 (2008)