Login / Signup
Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support.
Guangyuan Hu
Zecheng He
Ruby B. Lee
Published in:
CoRR (2021)
Keyphrases
</>
end users
data privacy
privacy preserving
privacy preservation
data sharing
anomaly detection
privacy preserving data mining
data sets
databases
data management
cloud computing
data access
distributed data