Author of the publication

GenFace: Improving Cyber Security Using Realistic Synthetic Face Generation.

, , , , , and . CSCML, volume 10332 of Lecture Notes in Computer Science, page 19-33. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quam Bene Non Quantum: Bias in a Family of Quantum Random Number Generators., and . IACR Cryptology ePrint Archive, (2017)Explanation Method for Anomaly Detection on Mixed Numerical and Categorical Spaces., , , and . CoRR, (2022)Steganography using the Extensible Messaging and Presence Protocol (XMPP)., and . CoRR, (2013)Detecting fraudulent activity in a cloud using privacy-friendly data aggregates., , and . CoRR, (2014)Reducing the Forensic Footprint with Android Accessibility Attacks., , , and . STM, volume 12386 of Lecture Notes in Computer Science, page 22-38. Springer, (2020)Using Eyetracker to Find Ways to Mitigate Ransomware., , , and . ICISSP, page 448-456. SCITEPRESS, (2020)Towards Automated Design of Multi-party Rational Exchange Security Protocols., , , and . Web Intelligence/IAT Workshops, page 387-390. IEEE Computer Society, (2007)Nature-Inspired Synthesis of Rational Protocols., , , and . PPSN, volume 5199 of Lecture Notes in Computer Science, page 981-990. Springer, (2008)Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments., , , , and . SEWCN, volume 42 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 25-35. Springer, (2009)Finding Efficient Distinguishers for Cryptographic Mappings, with an Application to the Block Cipher TEA., and . Comput. Intell., 20 (3): 517-525 (2004)