Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication M Frank, R Biedert, E Ma, I Martinovic, D Song IEEE transactions on information forensics and security 8 (1), 136-148, 2012 | 1085 | 2012 |
Sybilbelief: A semi-supervised learning approach for structure-based sybil detection NZ Gong, M Frank, P Mittal IEEE Transactions on Information Forensics and Security 9 (6), 976-987, 2014 | 234 | 2014 |
SybilBelief: A Semi-supervised Learning Approach for Structure-based Sybil Detection N Zhenqiang Gong, M Frank, P Mittal arXiv e-prints, arXiv: 1312.5035, 2013 | 234* | 2013 |
On the feasibility of side-channel attacks with brain-computer interfaces I Martinovic, D Davies, M Frank, D Perito, T Ros, D Song 21st {USENIX} Security Symposium ({USENIX} Security 12), 143-158, 2012 | 233 | 2012 |
Who do you sync you are? smartphone fingerprinting via application behaviour T Stöber, M Frank, J Schmitt, I Martinovic Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013 | 177 | 2013 |
Mining permission request patterns from android and facebook applications M Frank, B Dong, AP Felt, D Song 2012 IEEE 12th International Conference on Data Mining, 870-875, 2012 | 145 | 2012 |
Theoretical and experimental error analysis of continuous-wave time-of-flight range cameras M Frank, M Plaue, H Rapp, U Köthe, B Jähne, FA Hamprecht Optical Engineering 48 (1), 013602, 2009 | 145 | 2009 |
A probabilistic approach to hybrid role mining M Frank, AP Streich, D Basin, JM Buhmann Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 138 | 2009 |
On the definition of role mining M Frank, JM Buhmann, D Basin Proceedings of the 15th ACM symposium on Access control models and …, 2010 | 104 | 2010 |
Multi-assignment clustering for boolean data AP Streich, M Frank, D Basin, JM Buhmann Proceedings of the 26th annual international conference on machine learning …, 2009 | 101 | 2009 |
Multi-assignment clustering for boolean data M Frank, AP Streich, D Basin, JM Buhmann The Journal of Machine Learning Research 13, 459-489, 2012 | 91 | 2012 |
A class of probabilistic models for role engineering M Frank, D Basin, JM Buhmann Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 83 | 2008 |
A theoretical and experimental investigation of the systematic errors and statistical uncertainties of time-of-flight-cameras H Rapp, M Frank, FA Hamprecht, B Jahne International Journal of Intelligent Systems Technologies and Applications 5 …, 2008 | 63 | 2008 |
Role mining with probabilistic models M Frank, JM Buhman, D Basin ACM Transactions on Information and System Security (TISSEC) 15 (4), 1-28, 2013 | 58 | 2013 |
Denoising of continuous-wave time-of-flight depth images using confidence measures M Frank, M Plaue, FA Hamprecht Optical Engineering 48 (7), 077003, 2009 | 56 | 2009 |
Forgery-resistant touch-based authentication on mobile devices NZ Gong, M Payer, R Moazzezi, M Frank Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 50 | 2016 |
Safe: Secure authentication with face and eyes A Boehm, D Chen, M Frank, L Huang, C Kuo, T Lolic, I Martinovic, D Song 2013 International Conference on Privacy and Security in Mobile Systems …, 2013 | 47 | 2013 |
Using EEG-based BCI devices to subliminally probe for private information M Frank, T Hwu, S Jain, RT Knight, I Martinovic, P Mittal, D Perito, ... Proceedings of the 2017 on Workshop on Privacy in the Electronic Society …, 2017 | 43 | 2017 |
What you submit is who you are: A multimodal approach for deanonymizing scientific publications M Payer, L Huang, NZ Gong, K Borgolte, M Frank IEEE Transactions on Information Forensics and Security 10 (1), 200-212, 2014 | 37 | 2014 |
Short paper: Smartphones: Not smart enough? IT Fischer, C Kuo, L Huang, M Frank Proceedings of the second ACM workshop on Security and privacy in …, 2012 | 37 | 2012 |