Author of the publication

A Guided Approach to Behavioral Authentication.

, , , and . ACM Conference on Computer and Communications Security, page 2237-2239. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Guided Approach to Behavioral Authentication., , , and . ACM Conference on Computer and Communications Security, page 2237-2239. ACM, (2018)Poster: Effective Layers in Coverage Metrics for Deep Neural Networks., , , , and . ACM Conference on Computer and Communications Security, page 2681-2683. ACM, (2019)Draw It As Shown: Behavioral Pattern Lock for Mobile User Authentication., , , and . IEEE Access, (2019)Membership Inference Attacks With Token-Level Deduplication on Korean Language Models., , , , and . IEEE Access, (2023)On Membership Inference Attacks to Generative Language Models Across Language Domains., , , , and . WISA, volume 13720 of Lecture Notes in Computer Science, page 143-155. Springer, (2022)Towards Constructing Consistent Pattern Strength Meters with User's Visual Perception., , , and . ICISC, volume 13849 of Lecture Notes in Computer Science, page 81-99. Springer, (2022)Robust Training for Deepfake Detection Models Against Disruption-Induced Data Poisoning., , , and . WISA, volume 14402 of Lecture Notes in Computer Science, page 175-187. Springer, (2023)Poster: Adversarial Defense with Deep Learning Coverage on MagNet's Purification., , , , , and . CCS, page 3439-3441. ACM, (2022)