Author of the publication

Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication.

, , , and . IEEE Trans. Information Forensics and Security, 11 (3): 498-513 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Answering Definition Question: Ranking for Top-k., , , and . ECAI, volume 178 of Frontiers in Artificial Intelligence and Applications, page 839-840. IOS Press, (2008)FDUQA on TREC 2007 QA Track., , , , , and . TREC, Special Publication 500-274, National Institute of Standards and Technology (NIST), (2007)Design and implementation of distributed collaborative intrusion detection system model., and . FSKD, page 1224-1228. IEEE, (2010)Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication., , , and . IEEE Trans. Information Forensics and Security, 11 (3): 498-513 (2016)Utility-based resource allocation in high-speed railway wireless networks., , , , and . EURASIP J. Wireless Comm. and Networking, (2014)On Using Wearable Devices to Steal Your Passwords: A Fuzzy Inference Approach., , , and . CSS, volume 10581 of Lecture Notes in Computer Science, page 494-502. Springer, (2017)A Participant-based Approach for Event Summarization Using Twitter Streams., , , and . HLT-NAACL, page 1152-1162. The Association for Computational Linguistics, (2013)On User Interaction Behavior as Evidence for Computer Forensic Analysis., , , and . IWDW, volume 8389 of Lecture Notes in Computer Science, page 221-231. Springer, (2013)Multi-Document Summarization via the Minimum Dominating Set., and . COLING, page 984-992. Tsinghua University Press, (2010)Short-Packet Communications with NOMA for IoT Applications., , , , , and . CoRR, (2017)