Author of the publication

DeepAuth: A Framework for Continuous User Re-authentication in Mobile Apps.

, , , , , and . CIKM, page 2027-2035. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Edge-prioritized channel- and traffic-aware uplink Carrier Aggregation in LTE-advanced systems., , , , and . WOWMOM, page 1-9. IEEE Computer Society, (2012)Meeting real-time requirements for a low bitrate multimedia encoding framework., , , and . EIT, page 258-262. IEEE, (2008)Architecture for Blocking Detection in Wireless Video Source Authentication., , , and . VLSI Design, page 294-299. IEEE Computer Society, (2014)A Reconfigurable Architecture for Secure Multimedia Delivery., and . VLSI Design, page 258-263. IEEE Computer Society, (2010)Live Video Forensics: Source Identification in Lossy Wireless Networks., , , and . IEEE Trans. Information Forensics and Security, 10 (1): 28-39 (2015)CLIP: Continuous Location Integrity and Provenance for Mobile Phones., , , , , and . MASS, page 172-180. IEEE Computer Society, (2015)Polymorphic wavelet architectures using reconfigurable hardware., and . FPL, page 471-474. IEEE, (2008)QoE prediction model for mobile video telephony., , , and . Multimedia Tools Appl., 75 (13): 7957-7980 (2016)Hardware Architecture for Video Authentication Using Sensor Pattern Noise., , , and . IEEE Trans. Circuits Syst. Video Techn., 24 (1): 157-167 (2014)Embedded Multimedia Security Systems - Algorithms and Architectures., and . Springer, (2012)