Continuous Authentication of Smartphones Based on Application Usage

Add code
Jul 18, 2018
Figure 1 for Continuous Authentication of Smartphones Based on Application Usage
Figure 2 for Continuous Authentication of Smartphones Based on Application Usage
Figure 3 for Continuous Authentication of Smartphones Based on Application Usage
Figure 4 for Continuous Authentication of Smartphones Based on Application Usage

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: