Author of the publication

CloudID: Trustworthy cloud-based and cross-enterprise biometric identification.

, , and . Expert Syst. Appl., 42 (21): 7905-7916 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On-board Deep-learning-based Unmanned Aerial Vehicle Fault Cause Detection and Identification., , and . ICRA, page 5255-5261. IEEE, (2020)DeepContext: Mobile Context Modeling and Prediction via HMMs and Deep Learning., , and . IEEE Trans. Mob. Comput., 22 (12): 6874-6888 (December 2023)TroGuard: context-aware protection against web-based socially engineered trojans., , , and . ACSAC, page 66-75. ACM, (2014)CPAC: securing critical infrastructure with cyber-physical access control., , , , and . ACSAC, page 139-152. ACM, (2016)CloudID: Trustworthy cloud-based and cross-enterprise biometric identification., , and . Expert Syst. Appl., 42 (21): 7905-7916 (2015)Resource-Aware DNN Partitioning for Privacy-Sensitive Edge-Cloud Systems., , , , and . ICONIP (5), volume 14451 of Lecture Notes in Computer Science, page 188-201. Springer, (2023)TMQ: Threat model quantification in Smart Grid critical infrastructures., and . SmartGridComm, page 584-589. IEEE, (2014)RRE: A game-theoretic intrusion Response and Recovery Engine., , , and . DSN, page 439-448. IEEE Computer Society, (2009)Secure Point-of-Care Medical Diagnostics via Trusted Sensing and Cyto-Coded Passwords., , , , and . DSN, page 583-594. IEEE Computer Society, (2016)Cyber-Physical Dataset for MiTM attacks in Power Systems., , , , , , and . (May 2022)