Author of the publication

A Siamese Neural Network for Scalable Behavioral Biometrics Authentication.

, , , , , and . ACNS Workshops, volume 13285 of Lecture Notes in Computer Science, page 515-535. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Siamese Neural Network for Scalable Behavioral Biometrics Authentication., , , , , and . ACNS Workshops, volume 13285 of Lecture Notes in Computer Science, page 515-535. Springer, (2022)Scalable and Secure HTML5 Canvas-Based User Authentication., , , , , and . ACNS Workshops, volume 13285 of Lecture Notes in Computer Science, page 554-574. Springer, (2022)Centy: Scalable Server-Side Web Integrity Verification System Based on Fuzzy Hashes., , , , , and . DIMVA, volume 12756 of Lecture Notes in Computer Science, page 371-390. Springer, (2021)Dynamic face authentication systems: Deep learning verification for camera close-Up and head rotation paradigms., , , , , and . Comput. Secur., (2022)Machine Learning Techniques for Identity Document Verification in Uncontrolled Environments: A Case Study., , , , , and . MCPR, volume 12088 of Lecture Notes in Computer Science, page 271-281. Springer, (2020)Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques., , , , , , and . Int. J. Inf. Sec., 22 (6): 1665-1685 (December 2023)Risk-based Authentication Based on Network Latency Profiling., , , , , and . AISec@CCS, page 105-115. ACM, (2020)SCRAP: Synthetically Composed Replay Attacks vs. Adversarial Machine Learning Attacks against Mouse-based Biometric Authentication., , , , , and . AISec@CCS, page 37-47. ACM, (2020)A Tale of Two Trees: One Writes, and Other Reads. Optimized Oblivious Accesses to Large-Scale Blockchains., , , , , and . CoRR, (2019)A Tale of Two Trees: One Writes, and Other Reads., , , , , and . Proc. Priv. Enhancing Technol., 2020 (2): 519-536 (2020)