Author of the publication

Handedness Recognition through Keystroke-Typing Behavior in Computer Forensics Analysis.

, , , and . Trustcom/BigDataSE/ISPA, page 1054-1060. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting community structure for undirected big graphs based on random walks., , , , and . WWW (Companion Volume), page 1151-1156. ACM, (2014)A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security., , and . ISNN (2), volume 3174 of Lecture Notes in Computer Science, page 657-662. Springer, (2004)A Fast Sketch Method for Mining User Similarities Over Fully Dynamic Graph Streams., , , and . ICDE, page 1682-1685. IEEE, (2019)Adversarial Example Detection by Classification for Deep Speech Recognition., , , and . ICASSP, page 3102-3106. IEEE, (2020)A Dynamic Cascading Failure Model Integrating Relay Protection in Power Grid., , , , , , and . CASE, page 1331-1336. IEEE, (2020)Adaptive Human-Machine Interactive Behavior Analysis With Wrist-Worn Devices for Password Inference., , , and . IEEE Trans. Neural Networks Learn. Syst., 29 (12): 6292-6302 (2018)Pattern-Growth Based Mining Mouse-Interaction Behavior for an Active User Authentication System., , , and . IEEE Trans. Dependable Secur. Comput., 17 (2): 335-349 (2020)LogLog Filter: Filtering Cold Items within a Large Range over High Speed Data Streams., , , , , and . ICDE, page 804-815. IEEE, (2021)EV charging load scheduling with high wind power penetration: A robust shortest path approach., , and . ACC, page 2765-2770. IEEE, (2015)Efficient topology optimization for a wired networked system by adding wireless communication., , , and . ACC, page 448-453. IEEE, (2012)