Author of the publication

Reconstructing What You Said: Text Inference Using Smartphone Motion.

, and . IEEE Trans. Mob. Comput., 18 (4): 947-959 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Behind the scenes: a cross-country study into third-party website referencing and the online advertising ecosystem., and . HCIS, (2017)A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches., , , , , , , , and . HCI (24), volume 8533 of Lecture Notes in Computer Science, page 270-281. Springer, (2014)User Identification Using Games., and . HCI (20), volume 9750 of Lecture Notes in Computer Science, page 3-14. Springer, (2016)Reconstructing What You Said: Text Inference Using Smartphone Motion., and . IEEE Trans. Mob. Comput., 18 (4): 947-959 (2019)Understanding Insider Threat: A Framework for Characterising Attacks., , , , , , and . IEEE Symposium on Security and Privacy Workshops, page 214-228. IEEE Computer Society, (2014)The language of biometrics: Analysing public perceptions., and . J. Inf. Secur. Appl., (2019)Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat., , , , and . STAST, page 8-15. IEEE Computer Society, (2014)Efficient Soft Tissue Modelling Using Charged Particle Control Points., and . Eurographics (Short Papers), page 9-12. Eurographics Association, (2008)Visual Analytics of E-mail Sociolinguistics for User Behavioural Analysis., , , and . J. Internet Serv. Inf. Secur., 4 (4): 1-13 (2014)Keystroke Inference Using Smartphone Kinematics., , , and . HCI (22), volume 10292 of Lecture Notes in Computer Science, page 226-238. Springer, (2017)