Author of the publication

IDeAuth: A novel behavioral biometric-based implicit deauthentication scheme for smartphones.

, , , and . Pattern Recognit. Lett., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Profiling minisat based on user defined execution time - GPROF., , and . CoRR, (2019)Comparative Analysis of Clustering-Based Approaches for 3-D Single Tree Detection Using Airborne Fullwave Lidar Data., , and . Remote Sensing, 2 (4): 968-989 (2010)Discrete Transform Based Image Fusion: A Review., , , and . Int. J. Multim. Data Eng. Manag., 8 (2): 43-49 (2017)IDeAuth: A novel behavioral biometric-based implicit deauthentication scheme for smartphones., , , and . Pattern Recognit. Lett., (2022)A framework for systematic evaluation of multicast congestion control protocols., , and . IEEE J. Sel. Areas Commun., 22 (10): 2048-2061 (2004)PAPR Reduction of NOMA Using Vandermonde Matrix-Particle Transmission Sequence., , , and . Comput. Syst. Sci. Eng., 43 (1): 193-201 (2022)Modeling the interactions between MAC and higher layer: A systematic approach to generate high-level scenarios from MAC-layer scenarios., , and . ACM Trans. Model. Comput. Simul., 21 (1): 7:1-7:27 (2010)A comparative analysis of different pixel and object-based classification algorithms using multi-source high spatial resolution satellite data for LULC mapping., , , , and . Earth Sci. Informatics, 14 (4): 2231-2247 (2021)A comprehensive fault macromodel for opamps., , and . ICCAD, page 344-348. IEEE Computer Society / ACM, (1994)Memristor-Specific Failures: New Verification Methods and Emerging Test Problems., and . VTS, page 1-7. IEEE, (2022)