Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

WordMarkov: A New Password Probability Model of Semantics., , , , and . ICASSP, page 3034-3038. IEEE, (2022)Incrementally Updateable Honey Password Vaults., , , , and . USENIX Security Symposium, page 857-874. USENIX Association, (2021)Application of Deep Learning Method to Estimate Bottomhole Pressure Dynamics of Oil Wells., , , and . ISIE, page 1-6. IEEE, (2023)ANN based Interwell Connectivity Analysis in Cyber-Physical Petroleum Systems., , , , , and . INDIN, page 199-205. IEEE, (2019)Manufacturing Ontology Development Based on Industry 4.0 Demonstration Production Line., , , , , and . TSA, page 42-47. IEEE, (2016)Prior Knowledge Informed Neural Network for Subsurface Flow Prediction., , and . ISIE, page 1-6. IEEE, (2024)Improved Probabilistic Context-Free Grammars for Passwords Using Word Extraction., , , and . ICASSP, page 2690-2694. IEEE, (2021)Practical Threshold Multi-Factor Authentication., , , and . IEEE Trans. Inf. Forensics Secur., (2021)The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes., , , and . AsiaCCS, page 475-486. ACM, (2016)Passtrans: An Improved Password Reuse Model Based on Transformer., , , , and . ICASSP, page 3044-3048. IEEE, (2022)