Author of the publication

Learning from Smartphone Location Data as Anomaly Detection for Behavioral Authentication through Deep Neuroevolution.

, , , , and . ICISSP, page 723-728. SCITEPRESS, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A compact three-bit reconfigurable resonator consisting of lumped elements., , and . RWS, page 169-171. IEEE, (2014)Evaluating the Performance Acceleration of Generalized Linear Solver using Normal Equation on Three Architectures for Tall Skinny Datasets., , , and . CSCI, page 134-139. IEEE, (2022)A Behavior Authentication Method Using Wi-Fi BSSIDs around Smartphone Carried by a User., and . CANDAR, page 463-469. IEEE Computer Society, (2015)Development of robot semi-autonomous control method for teleoperation support in nuclear power plants., and . SICE, page 284-289. IEEE, (2023)Predictive control using mirror plant and application to LNG regasification plants., , , , , and . ASCC, page 349-353. IEEE, (2017)Lifestyle authentication and MITHRA project., , , and . COMSNETS, page 464-467. IEEE, (2018)Redefine and Organize, 4th Authentication Factor, Behavior., , and . CANDAR Workshops, page 412-415. IEEE, (2019)Forgery Resistance of User Authentication Methods Using Location, Wi-Fi and Their Correlation., and . ICISSP, page 709-716. SCITEPRESS, (2024)Effects of Data Sampling Interval on Accuracy of Authentication Using Wi-Fi Information Captured by Smartphone., and . CANDAR (Workshops), page 326-331. IEEE, (2021)Score Fusion Method by Neural Network Using GPS and Wi-Fi Log Data., , , and . ISITA, page 470-474. IEEE, (2020)