Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhanced free-text keystroke continuous authentication based on dynamics of wrist motion., , , , and . WIFS, page 1-6. IEEE, (2017)Size-based scheduling: a recipe for DDOS?, , and . CCS, page 729-731. ACM, (2010)On Controlling Genuine Reject Rate in Multi-stage Biometric Verification., , and . CVPR Workshops, page 194-199. IEEE Computer Society, (2013)On the Complexity of Aggregating Information for Authentication and Profiling., and . DPM/SETOP, volume 7122 of Lecture Notes in Computer Science, page 58-71. Springer, (2011)Competition between SOM Clusters to Model User Authentication System in Computer Networks., and . COMSWARE, IEEE, (2007)Image recovery and segmentation using competitive learning in a layered network., and . IEEE Trans. Neural Networks, 7 (4): 843-856 (1996)Gaitpoint: A Gait Recognition Network Based on Point Cloud Analysis., , , , and . ICIP, page 1916-1920. IEEE, (2022)Investigating hidden Markov models capabilities in anomaly detection., and . ACM Southeast Regional Conference (1), page 98-103. ACM, (2005)"This is Fake! Shared it by Mistake": Assessing the Intent of Fake News Spreaders., , , , and . WWW, page 3685-3694. ACM, (2022)Adversarial Activity Detection Using Keystroke Acoustics., and . ESORICS (1), volume 12972 of Lecture Notes in Computer Science, page 626-648. Springer, (2021)