Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Production adjusting method based on the predicted distribution of production and inventory using a dynamic Bayesian network., , , , and . Artif. Life Robotics, 14 (2): 138-143 (2009)Tidal flat reflectance model accommodating tidal conditions using Geostationary Ocean Color Imager (GOCI): Preliminary results., , , and . IGARSS, page 7629-7631. IEEE, (2012)Evolution of Spamming Attacks on Facebook., , and . WISA, volume 10763 of Lecture Notes in Computer Science, page 101-111. Springer, (2017)A parameterized model to select discriminating features on keystroke dynamics authentication on smartphones., , , , , , and . Pervasive Mob. Comput., (2019)An Incremental Majority Voting Approach for Intrusion Detection System Based on Machine Learning., and . IEEE Access, (2024)A Verifier-Based Password-Authenticated Key Exchange Using Tamper-Proof Hardware., , , and . Comput. J., 64 (8): 1293-1302 (2021)A New Privacy-Enhanced Matchmaking Protocol., and . NDSS, The Internet Society, (2008)Parallel and Concurrent Security of the HB and HB+ Protocols., , and . J. Cryptol., 23 (3): 402-421 (2010)Trusted and Privacy-Preserving Billing System for Smart Grids., , and . BigComp, page 160-166. IEEE, (2025)Understanding Keystroke Dynamics for Smartphone Users Authentication and Keystroke Dynamics on Smartphones Built-In Motion Sensors., , , , , and . Secur. Commun. Networks, (2018)