Follow
Zibo Wang
Title
Cited by
Cited by
Year
Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms
A Serwadda, VV Phoha, Z Wang
2013 IEEE sixth international conference on biometrics: theory, applications …, 2013
1682013
Toward robotic robbery on the touch screen
A Serwadda, VV Phoha, Z Wang, R Kumar, D Shukla
ACM Transactions on Information and System Security (TISSEC) 18 (4), 1-25, 2016
382016
Transforming animals in a cyber-behavioral biometric menagerie with frog-boiling attacks
Z Wang, A Serwadda, KS Balagani, VV Phoha
2012 IEEE Fifth International Conference on Biometrics: Theory, Applications …, 2012
372012
Scan-based evaluation of continuous keystroke authentication systems
A Serwadda, Z Wang, P Koch, S Govindarajan, R Pokala, A Goodkind, ...
IT Professional 15 (4), 20-23, 2013
222013
编码器四倍频电路的单片机高速算法设计
王子博
组合机床与自动化加工技术, 73-74, 2007
112007
Poisoning Attacks on Learning-Based Keystroke Authentication and a Residue Feature Based Defense
Z Wang
2020
高精度超声波位移测量方法的研究
王道顺, 李宇宙, 王子博
仪表技术与传感器, 116-119, 2017
2017
SECURITY: DARPA
A Serwadda, Z Wang, P Koch, S Govindarajan, R Pokala, A Goodkind, ...
The system can't perform the operation now. Try again later.
Articles 1–8