Computing & Information Technology

Secure Zero-Effort Two-Factor Authentication for Mobile Devices

Effective Triplication for Flexible and Real-Time Soft Error Resilience

Triplet Network with Attention for Speaker Diarization

Authenticating a User on a Mobile Device

Detecting Fake News on Social Media by Message Diffusion Pathways

CrossFire: Cross Media Joint Friend and Item Recommendations

Sequential Event Prediction with Noise-Contrastive Estimation for Marked Temporal Point Process

Method for Verifying Social Media Data Received from Third-Party Providers

Privacy-Preserving Social Media Data Outsourcing

Hybrid Automata Mining from Input/Output Traces of Cyber-Physical Systems