Author of the publication

DeepAuth: A Framework for Continuous User Re-authentication in Mobile Apps.

, , , , , and . CIKM, page 2027-2035. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context., , , , , and . USENIX Security Symposium, page 435-462. USENIX Association, (2010)Botnet Judo: Fighting Spam with Itself., , , , , , , and . NDSS, The Internet Society, (2010)No Please, After You: Detecting Fraud in Affiliate Marketing Networks., and . WEIS, (2015)A General Framework For Task-Oriented Network Inference., , and . CoRR, (2017)Spamalytics: an empirical analysis of spam marketing conversion., , , , , , and . Commun. ACM, 52 (9): 99-107 (2009)O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web., , , , and . USENIX Security Symposium, page 1475-1492. USENIX Association, (2018)On the Spam Campaign Trail., , , , , , and . LEET, USENIX Association, (2008)Analysis of eCrime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer., , and . WEIS, (2012)Leveraging Semantic Transformation to Investigate Password Habits and Their Causes., , , and . CHI, page 570. ACM, (2018)Fifteen minutes of unwanted fame: detecting and characterizing doxing., , , and . IMC, page 432-444. ACM, (2017)