Follow
Mario Frank
Title
Cited by
Cited by
Year
Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication
M Frank, R Biedert, E Ma, I Martinovic, D Song
IEEE transactions on information forensics and security 8 (1), 136-148, 2012
10272012
Sybilbelief: A semi-supervised learning approach for structure-based sybil detection
NZ Gong, M Frank, P Mittal
IEEE Transactions on Information Forensics and Security 9 (6), 976-987, 2014
2162014
SybilBelief: A Semi-supervised Learning Approach for Structure-based Sybil Detection
N Zhenqiang Gong, M Frank, P Mittal
arXiv e-prints, arXiv: 1312.5035, 2013
216*2013
On the feasibility of side-channel attacks with brain-computer interfaces
I Martinovic, D Davies, M Frank, D Perito, T Ros, D Song
21st {USENIX} Security Symposium ({USENIX} Security 12), 143-158, 2012
2132012
Who do you sync you are? smartphone fingerprinting via application behaviour
T Stöber, M Frank, J Schmitt, I Martinovic
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
1692013
Mining permission request patterns from android and facebook applications
M Frank, B Dong, AP Felt, D Song
2012 IEEE 12th International Conference on Data Mining, 870-875, 2012
1412012
Theoretical and experimental error analysis of continuous-wave time-of-flight range cameras
M Frank, M Plaue, H Rapp, U Köthe, B Jähne, FA Hamprecht
Optical Engineering 48 (1), 013602, 2009
1412009
A probabilistic approach to hybrid role mining
M Frank, AP Streich, D Basin, JM Buhmann
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1362009
On the definition of role mining
M Frank, JM Buhmann, D Basin
Proceedings of the 15th ACM symposium on Access control models and …, 2010
1022010
Multi-assignment clustering for boolean data
AP Streich, M Frank, D Basin, JM Buhmann
Proceedings of the 26th annual international conference on machine learning …, 2009
992009
Multi-assignment clustering for boolean data
M Frank, AP Streich, D Basin, JM Buhmann
The Journal of Machine Learning Research 13, 459-489, 2012
852012
A class of probabilistic models for role engineering
M Frank, D Basin, JM Buhmann
Proceedings of the 15th ACM conference on Computer and communications …, 2008
802008
A theoretical and experimental investigation of the systematic errors and statistical uncertainties of time-of-flight-cameras
H Rapp, M Frank, FA Hamprecht, B Jahne
International Journal of Intelligent Systems Technologies and Applications 5 …, 2008
602008
Role mining with probabilistic models
M Frank, JM Buhman, D Basin
ACM Transactions on Information and System Security (TISSEC) 15 (4), 1-28, 2013
572013
Denoising of continuous-wave time-of-flight depth images using confidence measures
M Frank, M Plaue, FA Hamprecht
Optical Engineering 48 (7), 077003, 2009
532009
Forgery-resistant touch-based authentication on mobile devices
NZ Gong, M Payer, R Moazzezi, M Frank
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
462016
Safe: Secure authentication with face and eyes
A Boehm, D Chen, M Frank, L Huang, C Kuo, T Lolic, I Martinovic, D Song
2013 International Conference on Privacy and Security in Mobile Systems …, 2013
402013
What you submit is who you are: A multimodal approach for deanonymizing scientific publications
M Payer, L Huang, NZ Gong, K Borgolte, M Frank
IEEE Transactions on Information Forensics and Security 10 (1), 200-212, 2014
362014
Short paper: Smartphones: Not smart enough?
IT Fischer, C Kuo, L Huang, M Frank
Proceedings of the second ACM workshop on Security and privacy in …, 2012
352012
Using EEG-based BCI devices to subliminally probe for private information
M Frank, T Hwu, S Jain, RT Knight, I Martinovic, P Mittal, D Perito, ...
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society …, 2017
342017
The system can't perform the operation now. Try again later.
Articles 1–20