Author of the publication

User authentication and identification from user interface interactions on touch-enabled devices.

, and . WISEC, page 1-11. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Open-Source Biomedical Image Analysis Models: A Meta-Analysis and Continuous Survey., , , and . Frontiers Bioinform., (2022)Finding Substitutable Binary Code By Synthesizing Adapters., , and . IEEE Trans. Software Eng., 47 (8): 1626-1643 (2021)RIS-Aided SWIPT Green Communications Under Imperfect CSI., , , , and . GLOBECOM, page 2882-2887. IEEE, (2023)Automatically Repairing Binary Programs Using Adapter Synthesis.. ASE, page 1238-1241. IEEE, (2019)Performance evaluation of circuit level approaches for radiation hardened primitive gates., and . ICACCI, page 1811-1815. IEEE, (2016)Testing and Implementation Process in Automation of a University., , and . ICACNI, volume 243 of Advances in Intelligent Systems and Computing, page 1145-1152. Springer, (2013)ASCCS: Architecture for Secure Communication Using Cloud Services., and . SocProS (2), volume 437 of Advances in Intelligent Systems and Computing, page 19-25. Springer, (2015)Automated Analyses of IOT Event Monitoring Systems., , , , , , , , and . CAV (1), volume 13964 of Lecture Notes in Computer Science, page 27-39. Springer, (2023)Java Ranger at SV-COMP 2020 (Competition Contribution)., , , , and . TACAS (2), volume 12079 of Lecture Notes in Computer Science, page 393-397. Springer, (2020)Counterexample-Guided Inductive Repair of Reactive Contracts., , , , and . FormaliSE@ICSE, page 46-57. ACM, (2022)