HMOG: New behavioral biometric features for continuous authentication of smartphone users Z Sitová, J Šeděnka, Q Yang, G Peng, G Zhou, P Gasti, KS Balagani IEEE Transactions on Information Forensics and Security 11 (5), 877-892, 2015 | 461 | 2015 |
Continuous authentication with touch behavioral biometrics and voice on wearable glasses G Peng, G Zhou, DT Nguyen, X Qi, Q Yang, S Wang IEEE transactions on human-machine systems 47 (3), 404-416, 2016 | 107 | 2016 |
On inferring browsing activity on smartphones via USB power analysis side-channel Q Yang, P Gasti, G Zhou, A Farajidavar, KS Balagani IEEE Transactions on Information Forensics and Security 12 (5), 1056-1066, 2016 | 85 | 2016 |
A multimodal data set for evaluating continuous authentication performance in smartphones Q Yang, G Peng, DT Nguyen, X Qi, G Zhou, Z Sitová, P Gasti, KS Balagani Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems …, 2014 | 54 | 2014 |
Secure, fast, and energy-efficient outsourced authentication for smartphones P Gasti, J Šeděnka, Q Yang, G Zhou, KS Balagani IEEE Transactions on Information Forensics and Security 11 (11), 2556-2571, 2016 | 49 | 2016 |
USB side-channel attack on Tor Q Yang, P Gasti, K Balagani, Y Li, G Zhou Computer Networks 141, 57-66, 2018 | 17 | 2018 |
LBVC: towards low-bandwidth video chat on smartphones X Qi, Q Yang, DT Nguyen, G Zhou, G Peng Proceedings of the 6th ACM Multimedia Systems Conference, 1-12, 2015 | 14 | 2015 |
MEG: memory and energy efficient garbled circuit evaluation on smartphones Q Yang, G Peng, P Gasti, KS Balagani, Y Li, G Zhou IEEE Transactions on Information Forensics and Security 14 (4), 913-922, 2018 | 11 | 2018 |
A context-aware framework for reducing bandwidth usage of mobile video chats X Qi, Q Yang, DT Nguyen, G Peng, G Zhou, B Dai, D Zhang, Y Li IEEE Transactions on Multimedia 18 (8), 1640-1649, 2016 | 11 | 2016 |
Context-aware frame rate adaption for video chat on smartphones X Qi, Q Yang, DT Nguyen, G Zhou Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing …, 2013 | 10 | 2013 |
Hierarchical clustering analysis from genomic dataset W Yin, Q Yang, S Yao IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 759-762, 2005 | 2 | 2005 |