Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From Language to Family and Back: Native Language and Language Family Identification from English Text., , and . HLT-NAACL, page 32-39. The Association for Computational Linguistics, (2013)Use Fewer Instances of the Letter "i": Toward Writing Style Anonymization., , , , and . Privacy Enhancing Technologies, volume 7384 of Lecture Notes in Computer Science, page 299-318. Springer, (2012)Doppelgänger Finder: Taking Stylometry to the Underground., , , , and . IEEE Symposium on Security and Privacy, page 212-226. IEEE Computer Society, (2014)Breaking the Closed-World Assumption in Stylometric Authorship Attribution., , , and . IFIP Int. Conf. Digital Forensics, volume 433 of IFIP Advances in Information and Communication Technology, page 185-205. Springer, (2014)Towards Active Linguistic Authentication., , , , , and . IFIP Int. Conf. Digital Forensics, volume 410 of IFIP Advances in Information and Communication Technology, page 385-398. Springer, (2013)Keyboard-Behavior-Based Authentication., , , , , and . IT Prof., 15 (4): 8-11 (2013)Active Linguistic Authentication Using Real-Time Stylometric Evaluation for Multi-Modal Decision Fusion., , , , and . IFIP Int. Conf. Digital Forensics, volume 433 of IFIP Advances in Information and Communication Technology, page 165-183. Springer, (2014)Decision Fusion for Multimodal Active Authentication., , , , , , and . IT Prof., 15 (4): 29-33 (2013)Multi-modal decision fusion for continuous authentication., , , , , , and . Comput. Electr. Eng., (2015)