Author of the publication

Touchscreens Can Reveal User Identity: Capacitive Plethysmogram-Based Biometrics.

, , , , , , , and . IEEE Trans. Mob. Comput., 23 (1): 895-908 (January 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Touchscreens Can Reveal User Identity: Capacitive Plethysmogram-Based Biometrics., , , , , , , and . IEEE Trans. Mob. Comput., 23 (1): 895-908 (January 2024)VoltJockey: A New Dynamic Voltage Scaling-Based Fault Injection Attack on Intel SGX., , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 40 (6): 1130-1143 (2021)DynaComm: Accelerating Distributed CNN Training Between Edges and Clouds Through Dynamic Communication Scheduling., , , , , , and . IEEE J. Sel. Areas Commun., 40 (2): 611-625 (2022)Photoplethysmogram-based Cognitive Load Assessment Using Multi-Feature Fusion Model., , , , , , , and . ACM Trans. Appl. Percept., 16 (4): 19:1-19:17 (2019)PMUSpill: The Counters in Performance Monitor Unit that Leak SGX-Protected Secrets., , , , , , , , and . CoRR, (2022)VoltJockey: Breaching TrustZone by Software-Controlled Voltage Manipulation over Multi-core Frequencies., , , and . CCS, page 195-209. ACM, (2019)Optimal Schedule of Mobile Edge Computing Under Imperfect CSI., , , , , and . ICA3PP (2), volume 11335 of Lecture Notes in Computer Science, page 32-45. Springer, (2018)FPGA IP protection by binding Finite State Machine to Physical Unclonable Function., , , , , , , and . FPL, page 1-4. IEEE, (2013)What Makes a Great Mobile App? A Quantitative Study Using a New Mobile Crawler., , , , , and . SOSE, page 222-227. IEEE Computer Society, (2018)Uncovering and Exploiting AMD Speculative Memory Access Predictors for Fun and Profit., , , , , , , and . HPCA, page 31-45. IEEE, (2024)