Year |
Citation |
Score |
2019 |
Yang Q, Peng G, Gasti P, Balagani KS, Li Y, Zhou G. MEG: Memory and Energy Efficient Garbled Circuit Evaluation on Smartphones Ieee Transactions On Information Forensics and Security. 14: 913-922. DOI: 10.1109/Tifs.2018.2868221 |
0.6 |
|
2018 |
Yang Q, Gasti P, Balagani KS, Li Y, Zhou G. USB side-channel attack on Tor Computer Networks. 141: 57-66. DOI: 10.1016/J.Comnet.2018.05.018 |
0.505 |
|
2017 |
Yang Q, Gasti P, Zhou G, Farajidavar A, Balagani KS. On Inferring Browsing Activity on Smartphones via USB Power Analysis Side-Channel Ieee Transactions On Information Forensics and Security. 12: 1056-1066. DOI: 10.1109/Tifs.2016.2639446 |
0.475 |
|
2017 |
Peng G, Zhou G, Nguyen DT, Qi X, Yang Q, Wang S. Continuous Authentication With Touch Behavioral Biometrics and Voice on Wearable Glasses Ieee Transactions On Human-Machine Systems. 47: 404-416. DOI: 10.1109/Thms.2016.2623562 |
0.6 |
|
2016 |
Qi X, Yang Q, Nguyen DT, Peng G, Zhou G, Dai B, Zhang D, Li Y. A Context-Aware Framework for Reducing Bandwidth Usage of Mobile Video Chats Ieee Transactions On Multimedia. 18: 1640-1649. DOI: 10.1109/Tmm.2016.2572001 |
0.684 |
|
2016 |
Gasti P, Šeděnka J, Yang Q, Zhou G, Balagani KS. Secure, Fast, and Energy-Efficient Outsourced Authentication for Smartphones Ieee Transactions On Information Forensics and Security. 11: 2556-2571. DOI: 10.1109/Tifs.2016.2585093 |
0.497 |
|
2016 |
Sitova Z, Sedenka J, Yang Q, Peng G, Zhou G, Gasti P, Balagani KS. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users Ieee Transactions On Information Forensics and Security. 11: 877-892. DOI: 10.1109/Tifs.2015.2506542 |
0.643 |
|
Show low-probability matches. |