Lizzy Tengana

Orcid: 0000-0003-2275-5298

According to our database1, Lizzy Tengana authored at least 9 papers between 2020 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques.
Int. J. Inf. Sec., December, 2023

Server Time Reservation for Periodic Real-Time Applications.
Proceedings of the IEEE/ACM 16th International Conference on Utility and Cloud Computing, 2023

2022
Dynamic face authentication systems: Deep learning verification for camera close-Up and head rotation paradigms.
Comput. Secur., 2022

A Siamese Neural Network for Scalable Behavioral Biometrics Authentication.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

Scalable and Secure HTML5 Canvas-Based User Authentication.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

2021
Centy: Scalable Server-Side Web Integrity Verification System Based on Fuzzy Hashes.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021

2020
Machine Learning Techniques for Identity Document Verification in Uncontrolled Environments: A Case Study.
Proceedings of the Pattern Recognition - 12th Mexican Conference, 2020

SCRAP: Synthetically Composed Replay Attacks vs. Adversarial Machine Learning Attacks against Mouse-based Biometric Authentication.
Proceedings of the AISec@CCS 2020: Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, 2020

Risk-based Authentication Based on Network Latency Profiling.
Proceedings of the AISec@CCS 2020: Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, 2020


  Loading...