Login / Signup

Leakage or Identification: Behavior-irrelevant User Identification Leveraging Leakage Current on Laptops.

Dian DingLanqing YangYi-Chao ChenGuangtao Xue
Published in: Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. (2021)
Keyphrases
  • user interface
  • image processing
  • cost effective
  • computer technology