From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Nonlinearity-Based Secure Face-to-Face Device Authentication for Mobile Devices., , , , и . IEEE Trans. Mob. Comput., 21 (4): 1155-1171 (2022)Which One to Go: Security and Usability Evaluation of Mid-Air Gestures., , , , , , и . CoRR, (2018)Validating the Contextual Information of Outdoor Images for Photo Misuse Detection., , , , , и . CoRR, (2018)Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication., , , , и . IEEE Trans. Inf. Forensics Secur., (2022)Regional Patterns and Vulnerability Analysis of Chinese Web Passwords., , , и . IEEE Trans. Inf. Forensics Secur., 11 (2): 258-272 (2016)Lightweight secure communication protocols for in-vehicle sensor networks., , , и . CyCAR@CCS, стр. 19-30. ACM, (2013)V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization., , , , , и . USENIX Security Symposium, стр. 5181-5198. USENIX Association, (2023)Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks., , , , , , и . USENIX Security Symposium, стр. 2455-2472. USENIX Association, (2023)DepthFake: Spoofing 3D Face Authentication with a 2D Photo., , , , и . SP, стр. 917-91373. IEEE, (2023)WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens., , , , , , и . SP, стр. 984-1001. IEEE, (2022)