Author of the publication

Shared dataset on natural human-computer interaction to support continuous authentication research.

, , , and . IJCB, page 525-530. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Clustering of multistage cyber attacks using significant services., and . FUSION, page 1-7. IEEE, (2010)Machine Learning at the Network Edge: A Survey., , , , , and . ACM Comput. Surv., 54 (8): 170:1-170:37 (2022)Toward unsupervised classification of non-uniform cyber attack tracks., , , and . FUSION, page 1919-1925. IEEE, (2009)Shared dataset on natural human-computer interaction to support continuous authentication research., , , and . IJCB, page 525-530. IEEE, (2017)Communication protocols for underwater data collection using a robotic sensor network., , , , , , , , and . GLOBECOM Workshops, page 1308-1313. IEEE, (2011)British Parliamentary Libraries: History, International Comparisons, and Some Lessons for Tomorrow's Legislature Libraries.. Libr. Trends, 58 (4): 472-485 (2010)Local Label Descriptor for Example Based Semantic Image Labeling., , , , , and . ECCV (7), volume 7578 of Lecture Notes in Computer Science, page 361-375. Springer, (2012)Glitch: designing imperfection, , , and . Mark Batty Publisher, New York, (2009)Machine Learning at the Network Edge: A Survey., , , , , and . CoRR, (2019)Underwater Data Collection Using Robotic Sensor Networks., , , , , , , , and . IEEE J. Sel. Areas Commun., 30 (5): 899-911 (2012)