Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Systematic Comparison of Age and Gender Prediction on IMU Sensor-Based Gait Traces., , , , and . Sensors, 19 (13): 2945 (2019)A dynamic decision fusion middleware for trustworthy context-aware IoT applications., , and . M4IoT@Middleware, page 1-6. ACM, (2017)A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints., , , , , , , and . NDSS, The Internet Society, (2020)Fishy Faces: Crafting Adversarial Images to Poison Face Authentication., , , , and . WOOT @ USENIX Security Symposium, USENIX Association, (2018)Beware the Doppelgänger: Attacks against Adaptive Thresholds in Facial Recognition Systems., , , , and . ARES, page 18:1-18:11. ACM, (2023)Gait Authentication based on Spiking Neural Networks., , , and . BIOSIG, volume P-315 of LNI, page 51-60. Gesellschaft für Informatik e.V., (2021)PIVOT: Private and Effective Contact Tracing., , , , , and . IEEE Internet Things J., 9 (22): 22466-22489 (2022)Privacy-Preserving Behavioral Authentication on Smartphones., , , and . HumanSys@SenSys, page 1-6. ACM, (2017)A Survey on Applying Machine Learning Techniques for Behavioral Awareness., , , , , and . State of the Art in AI Applied to Ambient Intelligence, volume 298 of Frontiers in Artificial Intelligence and Applications, IOS Press, (2017)Adversarial Robustness is Not Enough: Practical Limitations for Securing Facial Authentication., , , and . IWSPA@CODASPY, page 2-12. ACM, (2022)