Author of the publication

Mobile Authentication through Touch-Behavior Features.

, , , , and . CCBR, volume 8232 of Lecture Notes in Computer Science, page 386-393. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Anomalous Ratings in Collaborative Filtering Recommender Systems., and . Int. J. Digit. Crime Forensics, 8 (2): 16-26 (2016)Real-time volume control for interactive network traffic replay., , , and . Comput. Networks, 57 (7): 1611-1629 (2013)Poster: can it be more practical?: improving mouse dynamics biometric performance., , and . ACM Conference on Computer and Communications Security, page 853-856. ACM, (2011)Mobile Authentication through Touch-Behavior Features., , , , and . CCBR, volume 8232 of Lecture Notes in Computer Science, page 386-393. Springer, (2013)Comparing classification algorithm for mouse dynamics based user identification., , , , and . BTAS, page 61-66. IEEE, (2012)Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs., , , , and . ICC, page 1990-1994. IEEE, (2013)QGEval: A Benchmark for Question Generation Evaluation., , , , and . CoRR, (2024)Touch Authentication for Sharing Context Using Within-Group Similarity Structure., , , and . IEEE Internet Things J., 11 (17): 28281-28296 (September 2024)VisionTasker: Mobile Task Automation Using Vision Based UI Understanding and LLM Task Planning., , , , and . UIST, page 49:1-49:17. ACM, (2024)Normal and Easy: Account Sharing Practices in the Workplace., , , , and . Proc. ACM Hum. Comput. Interact., 3 (CSCW): 83:1-83:25 (2019)