Author of the publication

Capturing accelerometer outputs in healthy volunteers under normal and simulated-pathological conditions using ML classifiers*.

, , , , and . EMBC, page 4604-4607. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

nQUIC: Noise-Based QUIC Packet Protection., , , and . EPIQ@CoNEXT, page 22-28. ACM, (2018)Timing and Lattice Attacks on a Remote ECDSA OpenSSL Server: How Practical Are They Really?. IACR Cryptology ePrint Archive, (2015)An Extreme Function Theory for Novelty Detection., , , , and . IEEE J. Sel. Top. Signal Process., 7 (1): 28-37 (2013)SoK: What don't we know? Understanding Security Vulnerabilities in SNARKs., , , , , and . CoRR, (2024)Sparsity-Assisted Fault Feature Enhancement: Algorithm-Aware Versus Model-Aware., , , , , and . IEEE Trans. Instrum. Meas., 69 (9): 7004-7014 (2020)Nathu IR System at NTCIR-II., , , , , , and . NTCIR, National Institute of Informatics (NII), (2001)Security and Reliability in Concordia., , and . HICSS (7), page 44-53. IEEE Computer Society, (1998)nQUIC: Noise-Based QUIC Packet Protection., , , and . IACR Cryptology ePrint Archive, (2019)The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations., , , , , and . IACR Cryptology ePrint Archive, (2018)Concordia: An Infrastructure for Collaborating Mobile Agents., , , , , and . Mobile Agents, volume 1219 of Lecture Notes in Computer Science, page 86-97. Springer, (1997)