Author of the publication

SafePay: Protecting against credit card forgery with existing magnetic card readers.

, , and . CNS, page 164-172. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps., , , , , , and . USENIX Security Symposium, page 1669-1685. USENIX Association, (2018)Decision Support Assistant Management in Intelligent Logistics System.. ICMSS, page 254-258. ACM, (2017)Accelerating Dataset Distillation via Model Augmentation., , , , , , , , and . CVPR, page 11950-11959. IEEE, (2023)Multi-scale Strategy Based 3D Dual-Encoder Brain Tumor Segmentation Network with Attention Mechanism., , , and . BIBM, page 952-957. IEEE, (2020)Pose Insensitive 3D Retrieval by Poisson Shape Histogram., , , and . International Conference on Computational Science (2), volume 4488 of Lecture Notes in Computer Science, page 25-32. Springer, (2007)Are All Spurious Features in Natural Language Alike? An Analysis through a Causal Lens., , and . EMNLP, page 9804-9817. Association for Computational Linguistics, (2022)Efficient Barcode Localization Method for Low-Quality Images., , , and . ICGSP, page 1-7. ACM, (2019)Temporal-Spatial Graph Attention Networks for DCE-MRI Breast Tumor Segmentation., and . BMVC, page 347. BMVA Press, (2021)3D Patch-Based Sparse Learning for Style Feature Extraction., , and . IEEE Access, (2019)Understanding In-App Ads and Detecting Hidden Attacks through the Mobile App-Web Interface., , , , , , and . IEEE Trans. Mob. Comput., 17 (11): 2675-2688 (2018)