Author of the publication

Texting while Walking Deterrence System by Vibration of Smartphone.

, and . IMCOM, page 69:1-69:5. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adversarial Text-Based CAPTCHA Generation Method Utilizing Spatial Smoothing., , and . GLOBECOM, page 1-6. IEEE, (2021)Modeling the Relationship Between Stress and Appetite to Create a Dish Recommendation System Based on Desired Nutrients., , and . AHFE (1), volume 585 of Advances in Intelligent Systems and Computing, page 379-386. Springer, (2017)Trust-based Verification Attack Prevention Scheme using Tendency of Contents Request on NDN., , , , and . APCC, page 159-164. IEEE, (2019)Gradient-Based Clean Label Backdoor Attack to Graph Neural Networks., , , , , , and . ICISSP, page 510-521. SCITEPRESS, (2024)Rogue Access Point Detection by Using ARP Failure under the MAC Address Duplication., , and . PIMRC, page 1469-1474. IEEE, (2021)A Preprocessing Methodology by Using Additional Steganography on CNN-based Steganalysis., , , and . GLOBECOM, page 1-6. IEEE, (2020)Android Malware Detection Scheme Based on Level of SSL Server Certificate., , and . GLOBECOM, page 1-6. IEEE, (2019)EdgePruner: Poisoned Edge Pruning in Graph Contrastive Learning., , , and . SaTML, page 309-326. IEEE, (2024)A Realtime IoT Malware Classification System Based on Pending Samples., , , and . ICC, page 4373-4378. IEEE, (2023)A Website Fingerprinting Attack based on the Virtual Memory of the Process on Android Devices., , , and . APCC, page 7-12. IEEE, (2021)