Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Human-Machine Interactive Behavior Analysis With Wrist-Worn Devices for Password Inference., , , and . IEEE Trans. Neural Networks Learn. Syst., 29 (12): 6292-6302 (2018)SEAR: Secure and Efficient Aggregation for Byzantine-Robust Federated Learning., , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (5): 3329-3342 (2022)Pattern-Growth Based Mining Mouse-Interaction Behavior for an Active User Authentication System., , , and . IEEE Trans. Dependable Secur. Comput., 17 (2): 335-349 (2020)SoundID: Securing Mobile Two-Factor Authentication via Acoustic Signals., , , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (2): 1687-1701 (March 2023)Shielding Collaborative Learning: Mitigating Poisoning Attacks Through Client-Side Detection., , , , , , and . IEEE Trans. Dependable Secur. Comput., 18 (5): 2029-2041 (2021)Waving Gesture Analysis for User Authentication in the Mobile Environment., , , , and . IEEE Netw., 34 (2): 57-63 (2020)A real-time explainable traffic collision inference framework based on probabilistic graph theory., , , , and . Knowl. Based Syst., (2021)Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems., , , , and . IEEE Trans. Inf. Forensics Secur., (2021)Performance evaluation of anomaly-detection algorithms for mouse dynamics., , , and . Comput. Secur., (2014)Practical Interference Exploitation Precoding without Symbol-by-Symbol Optimization: A Block-Level Approach., , , , and . CoRR, (2022)