Author of the publication

Treadmill Assisted Gait Spoofing (TAGS): An Emerging Threat to wearable Sensor-based Gait Authentication.

, , and . CoRR, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes., , and . CVPR Workshops, page 31-38. IEEE Computer Society, (2011)Continuous authentication using one-class classifiers and their fusion., , and . ISBA, page 1-8. IEEE, (2018)A simple and efficient video image clustering algorithm for person specific query and image retrieval., , , and . ICIMCS, page 85-89. ACM, (2009)Topology-dependent performance of attack graph reconstruction in PPM-based IP traceback., , and . CCNC, page 363-370. IEEE, (2014)Modeling privacy settings of an online social network from a game-theoretical perspective., , , and . CollaborateCom, page 213-220. ICST / IEEE, (2013)Graph-Based Identification and Authentication: A Stochastic Kronecker Approach., , and . IEEE Trans. Knowl. Data Eng., 34 (7): 3282-3294 (2022)The DMCA Needs Fixing.. Commun. ACM, 44 (12): 33-34 (2001)Defining A New Type of Global Information Architecture for Contextual Information Processing., , and . IKE, page 214-219. CSREA Press, (2009)Treadmill attack on gait-based authentication systems., , and . BTAS, page 1-7. IEEE, (2015)New impostor score based rejection methods for continuous keystroke verification with weak templates., , and . BTAS, page 251-258. IEEE, (2012)