Author of the publication

Handedness Recognition through Keystroke-Typing Behavior in Computer Forensics Analysis.

, , , and . Trustcom/BigDataSE/ISPA, page 1054-1060. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems., , , , , , and . USENIX Security Symposium, page 247-264. USENIX Association, (2023)RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices., , , , , , , , and . USENIX Security Symposium, page 2225-2242. USENIX Association, (2022)FDUQA on TREC 2007 QA Track., , , , , and . TREC, volume 500-274 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2007)Delay-Aware Dynamic Resource Allocation in High-Speed Railway Networks., , , , , , and . VTC Spring, page 1-5. IEEE, (2016)On Using Wearable Devices to Steal Your Passwords: A Fuzzy Inference Approach., , , and . CSS, volume 10581 of Lecture Notes in Computer Science, page 494-502. Springer, (2017)Energy-Efficient Non-Orthogonal Transmission under Reliability and Finite Blocklength Constraints., , , , , and . GLOBECOM Workshops, page 1-6. IEEE, (2017)Answering Definition Question: Ranking for Top-k., , , and . ECAI, volume 178 of Frontiers in Artificial Intelligence and Applications, page 839-840. IOS Press, (2008)The design of a benchmark for geo-stream management systems., , and . GIS, page 409-412. ACM, (2011)Downlink NOMA Transmission for Low-Latency Short-Packet Communications., , , , , and . ICC Workshops, page 1-6. IEEE, (2018)Timing and Frequency Synchronization for Cooperative Relay Networks., , , and . VTC Fall, page 1-5. IEEE, (2013)