Author of the publication

Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques.

, , , , , , and . Int. J. Inf. Sec., 22 (6): 1665-1685 (December 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Centy: Scalable Server-Side Web Integrity Verification System Based on Fuzzy Hashes., , , , , and . DIMVA, volume 12756 of Lecture Notes in Computer Science, page 371-390. Springer, (2021)Scalable and Secure HTML5 Canvas-Based User Authentication., , , , , and . ACNS Workshops, volume 13285 of Lecture Notes in Computer Science, page 554-574. Springer, (2022)Developing Spatial Visualization Skills with Virtual Reality and Hand Tracking., and . HCI (44), volume 1498 of Communications in Computer and Information Science, page 390-398. Springer, (2021)A Siamese Neural Network for Scalable Behavioral Biometrics Authentication., , , , , and . ACNS Workshops, volume 13285 of Lecture Notes in Computer Science, page 515-535. Springer, (2022)Multimodal Power Outage Prediction for Rapid Disaster Response and Resource Allocation., , , and . CoRR, (2024)Risk-based Authentication Based on Network Latency Profiling., , , , , and . AISec@CCS, page 105-115. ACM, (2020)SCRAP: Synthetically Composed Replay Attacks vs. Adversarial Machine Learning Attacks against Mouse-based Biometric Authentication., , , , , and . AISec@CCS, page 37-47. ACM, (2020)Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques., , , , , , and . Int. J. Inf. Sec., 22 (6): 1665-1685 (December 2023)Machine Learning Techniques for Identity Document Verification in Uncontrolled Environments: A Case Study., , , , , and . MCPR, volume 12088 of Lecture Notes in Computer Science, page 271-281. Springer, (2020)Integral and local affine invariant parameter and application to shape recognition., , and . ICPR (1), page 164-168. IEEE, (1994)