Author of the publication

A New Non-Intrusive Authentication Method Based on the Orientation Sensor for Smartphone Users.

, , , and . SERE, page 245-252. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FN-Net: A lightweight CNN-based architecture for fabric defect detection with adaptive threshold-based class determination., , , , , and . Displays, (2022)Rice Semantic Segmentation Using Unet-VGG16: A Case Study in Yunlin, Taiwan., , , and . ISPACS, page 1-2. IEEE, (2021)Resolving automatic high availability operations and users commands to virtual machines on OpenStack., , , and . ICS, page 159-164. IEEE, (2020)A constant queue partial permutation routing algorithm for cube-connected-cycles multicomputer systems., , , and . ICPADS Workshops, page 35-40. IEEE Computer Society, (2000)A Nested Invocation Suppression Mechanism for Cctive Replicated SOAP Systems., , and . APSEC, page 392-399. IEEE Computer Society, (2004)A New Non-intrusive Authentication Approach for Data Protection Based on Mouse Dynamics., , and . ISBAST, page 9-14. IEEE Computer Society, (2012)Winckp: A Transparent Checkpointing and Rollback Recovery Tool for Windows NT Applications., , , , and . FTCS, page 220-223. IEEE Computer Society, (1999)Analyzing Tradeoffs between Temporary Consistency and Concurrency with Rollbacks and Aborts., and . ICPP (2), page 234-241. CRC Press, (1992)Electronically auditing EDP systems: With the support of emerging information technologies., , and . Int. J. Account. Inf. Syst., 2 (2): 130-147 (2001)An Approach for Authenticating Smartphone Users Based on Histogram Features., , and . QRS, page 125-130. IEEE, (2015)