From post

A Siamese Neural Network for Scalable Behavioral Biometrics Authentication.

, , , , , и . ACNS Workshops, том 13285 из Lecture Notes in Computer Science, стр. 515-535. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Server Time Reservation for Periodic Real-Time Applications., , , , и . UCC, стр. 34. ACM, (2023)Machine Learning Techniques for Identity Document Verification in Uncontrolled Environments: A Case Study., , , , , и . MCPR, том 12088 из Lecture Notes in Computer Science, стр. 271-281. Springer, (2020)A Siamese Neural Network for Scalable Behavioral Biometrics Authentication., , , , , и . ACNS Workshops, том 13285 из Lecture Notes in Computer Science, стр. 515-535. Springer, (2022)Centy: Scalable Server-Side Web Integrity Verification System Based on Fuzzy Hashes., , , , , и . DIMVA, том 12756 из Lecture Notes in Computer Science, стр. 371-390. Springer, (2021)Scalable and Secure HTML5 Canvas-Based User Authentication., , , , , и . ACNS Workshops, том 13285 из Lecture Notes in Computer Science, стр. 554-574. Springer, (2022)Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques., , , , , , и . Int. J. Inf. Sec., 22 (6): 1665-1685 (декабря 2023)Risk-based Authentication Based on Network Latency Profiling., , , , , и . AISec@CCS, стр. 105-115. ACM, (2020)SCRAP: Synthetically Composed Replay Attacks vs. Adversarial Machine Learning Attacks against Mouse-based Biometric Authentication., , , , , и . AISec@CCS, стр. 37-47. ACM, (2020)