Author of the publication

Sequential Keystroke Behavioral Biometrics for Mobile User Identification via Multi-view Deep Learning.

, , , , , and . CoRR, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep Learning towards Mobile Applications., , , , , and . ICDCS, page 1385-1393. IEEE Computer Society, (2018)Adversarial Attack and Defense on Graph Data: A Survey., , , and . CoRR, (2018)Private Model Compression via Knowledge Distillation., , , , , and . AAAI, page 1190-1197. AAAI Press, (2019)Unsupervised Meta-path Reduction on Heterogeneous Information Networks., , , and . CoRR, (2018)Source Inference Attacks in Federated Learning., , , , and . ICDM, page 1102-1107. IEEE, (2021)An adaptive vector parallel supported transcendental function unit for stream processor., , , and . FSKD, page 1140-1144. IEEE, (2012)Significant Permission Identification for Machine-Learning-Based Android Malware Detection., , , , , and . IEEE Trans. Industrial Informatics, 14 (7): 3216-3225 (2018)DroidClassifier: Efficient Adaptive Mining of Application-Layer Header for Classifying Android Malware., , , , and . SecureComm, volume 198 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 597-616. Springer, (2016)Joint Embedding of Meta-Path and Meta-Graph for Heterogeneous Information Networks., , , , , , and . ICBK, page 131-138. IEEE Computer Society, (2018)Self-Activation Influence Maximization., , , and . CoRR, (2019)