From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Enhanced free-text keystroke continuous authentication based on dynamics of wrist motion., , , , и . WIFS, стр. 1-6. IEEE, (2017)Size-based scheduling: a recipe for DDOS?, , и . CCS, стр. 729-731. ACM, (2010)On Controlling Genuine Reject Rate in Multi-stage Biometric Verification., , и . CVPR Workshops, стр. 194-199. IEEE Computer Society, (2013)On the Complexity of Aggregating Information for Authentication and Profiling., и . DPM/SETOP, том 7122 из Lecture Notes in Computer Science, стр. 58-71. Springer, (2011)Competition between SOM Clusters to Model User Authentication System in Computer Networks., и . COMSWARE, IEEE, (2007)Image recovery and segmentation using competitive learning in a layered network., и . IEEE Trans. Neural Networks, 7 (4): 843-856 (1996)Gaitpoint: A Gait Recognition Network Based on Point Cloud Analysis., , , , и . ICIP, стр. 1916-1920. IEEE, (2022)Investigating hidden Markov models capabilities in anomaly detection., и . ACM Southeast Regional Conference (1), стр. 98-103. ACM, (2005)"This is Fake! Shared it by Mistake": Assessing the Intent of Fake News Spreaders., , , , и . WWW, стр. 3685-3694. ACM, (2022)Adversarial Activity Detection Using Keystroke Acoustics., и . ESORICS (1), том 12972 из Lecture Notes in Computer Science, стр. 626-648. Springer, (2021)