Author of the publication

An Implicit Authentication Solution based on User's Keystroke Behavior of Smartphone Usage.

, , , , and . ICCE-TW, page 1-2. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An adaptive stock index trading decision support system., , , and . Expert Syst. Appl., (2016)Scaling Address Parsing Sequence Models through Active Learning., , , , and . SIGSPATIAL/GIS, page 424-427. ACM, (2019)Predicting user routines with masked dilated convolutions., , , , , and . RecSys, page 481-485. ACM, (2019)Routines - A System for Inference, Analysis and Prediction of Users Daily Location Visits: Industrial Paper., , , , , and . SIGSPATIAL/GIS, page 440-443. ACM, (2019)Executable system architecting using systems modeling language in conjunction with colored Petri nets in a model-driven systems development process., and . Syst. Eng., 14 (4): 383-409 (2011)GPT Applications in Relevance Model Training in Map Search., , , , , and . SIGSPATIAL/GIS, page 68:1-68:4. ACM, (2023)OPM & color petri nets based executable system of systems architecting: A building block in FILA-SoS., , and . SysCon, page 554-561. IEEE, (2015)Graphical image classification combining an evolutionary algorithm and binary particle swarm optimization., , , , and . DRR, volume 8297 of SPIE Proceedings, page 829703. SPIE, (2012)DTW-KNN Implementation for Touch-based Authentication System., and . BigCom, page 318-322. IEEE, (2019)An Implicit Authentication Solution based on User's Keystroke Behavior of Smartphone Usage., , , , and . ICCE-TW, page 1-2. IEEE, (2019)