Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms A Serwadda, VV Phoha, Z Wang 2013 IEEE sixth international conference on biometrics: theory, applications …, 2013 | 173 | 2013 |
Toward robotic robbery on the touch screen A Serwadda, VV Phoha, Z Wang, R Kumar, D Shukla ACM Transactions on Information and System Security (TISSEC) 18 (4), 1-25, 2016 | 39 | 2016 |
Transforming animals in a cyber-behavioral biometric menagerie with frog-boiling attacks Z Wang, A Serwadda, KS Balagani, VV Phoha 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications …, 2012 | 35 | 2012 |
Scan-based evaluation of continuous keystroke authentication systems A Serwadda, Z Wang, P Koch, S Govindarajan, R Pokala, A Goodkind, ... IT Professional 15 (4), 20-23, 2013 | 22 | 2013 |
编码器四倍频电路的单片机高速算法设计 王子博 组合机床与自动化加工技术, 73-74, 2007 | 11 | 2007 |
Poisoning Attacks on Learning-Based Keystroke Authentication and a Residue Feature Based Defense Z Wang | | 2020 |
高精度超声波位移测量方法的研究 王道顺, 李宇宙, 王子博 仪表技术与传感器, 116-119, 2017 | | 2017 |
SECURITY: DARPA A Serwadda, Z Wang, P Koch, S Govindarajan, R Pokala, A Goodkind, ... | | |