Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pairwise Alignment of Protein Interaction Networks., , , , , and . J. Comput. Biol., 13 (2): 182-199 (2006)Movee: Video Liveness Verification for Mobile Devices Using Built-In Motion Sensors., , and . IEEE Trans. Mob. Comput., 15 (5): 1197-1210 (2016)SensCrypt: A Secure Protocol for Managing Low Power Fitness Trackers., , and . ICNP, page 191-196. IEEE Computer Society, (2014)Natural Language Watermarking and Tamperproofing., , , , , , and . Information Hiding, volume 2578 of Lecture Notes in Computer Science, page 196-212. Springer, (2002)Secure Management of Low Power Fitness Trackers., , and . IEEE Trans. Mob. Comput., 15 (2): 447-459 (2016)Enabling Multiple QR Codes in Close Proximity., , , and . CoRR, (2015)Liveness verifications for citizen journalism videos., , , and . WISEC, page 17:1-17:10. ACM, (2015)Inferring functional information from domain co-evolution., , , , and . Bioinform., 22 (1): 40-49 (2006)Information hiding through errors: a confusing approach., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 65050V. SPIE, (2007)Camera Based Two Factor Authentication Through Mobile and Wearable Devices., , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 1 (3): 35:1-35:37 (2017)