Author of the publication

A behavioral authentication method for mobile gesture against resilient user posture.

, , , , and . ICSAI, page 324-331. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A kind of mouse behavior authentication method on dynamic soft keyboard., , , and . SMC, page 211-216. IEEE, (2016)A Sufficient and Necessary Condition to Decide Compatibility for Simple Circuit Inter-organization Workflow Nets., , and . APSCC, volume 10065 of Lecture Notes in Computer Science, page 408-422. (2016)The Design of Epidemic Prevention Robot Based on Deep Learning., , , , , and . ICISCAE, page 48-51. IEEE, (2022)A continuous identity verification method based on free-text keystroke dynamics., , , and . SMC, page 206-210. IEEE, (2016)Computation of Secure Consistency for Real Systems., , , and . SpaCCS, volume 10066 of Lecture Notes in Computer Science, page 84-97. (2016)A Novel Estimate Fitness Method by Measuring A large number of Sub-event Logs Conformance., , and . IEEE Big Data, page 431-436. IEEE, (2022)Model construction and authentication algorithm of virtual keystroke dynamics for smart phone users., , , and . SMC, page 171-175. IEEE, (2016)The Cultivation of Students' Multiple Practical Ability Under the Multimodal Blended Teaching Mode.. Int. J. Emerg. Technol. Learn., 17 (12): 106-120 (June 2022)A Method for Security Evaluation in Cloud Computing Based on Petri Behavioral Profiles., , and . BIC-TA, volume 212 of Advances in Intelligent Systems and Computing, page 587-593. Springer, (2013)Mobile behavior trusted certification based on multivariate behavior sequences., and . Neurocomputing, (2021)