Author of the publication

Learning from Smartphone Location Data as Anomaly Detection for Behavioral Authentication through Deep Neuroevolution.

, , , , and . ICISSP, page 723-728. SCITEPRESS, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Complex Aerodynamic Footprint of Desert Locusts Revealed by Large-volume Tomographic Particle Image Velocimetry, , , , , , and . Journal of the Royal Society Interface, (2015)Plasma simulator METIS for tokamak confinement and heating studies., , , , , , and . Parallel Comput., 18 (7): 743-765 (1992)Learning from Smartphone Location Data as Anomaly Detection for Behavioral Authentication through Deep Neuroevolution., , , , and . ICISSP, page 723-728. SCITEPRESS, (2021)Enhancing Boundary Attack in Adversarial Image Using Square Random Constraint., , , and . IWSPA@CODASPY, page 13-23. ACM, (2022)Predicting Smartphone Users' Future Locations through Deep Reinforcement Learning., , , , and . CANDAR (Workshops), page 120-124. IEEE, (2020)Enhancing A New Classification for IDN Homograph Attack Detection., , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 507-514. IEEE, (2020)User authentication based on smartphone application usage patterns through learning classifier systems., , and . IEEE BigData, page 4462-4466. IEEE, (2020)A User-Microprogrammable, Local Host Computer With Low-Level Parallelism, , , , and . ISCA, page 151-157. ACM, (1983)Redefine and Organize, 4th Authentication Factor, Behavior., , and . CANDAR Workshops, page 412-415. IEEE, (2019)Enhancement of parallelism for tearing-based circuit simulation., , , and . ASP-DAC, page 493-498. IEEE, (1997)