Mario Frank
Mario Frank
Examiner, European Patent Office
Verified email at berkeley.edu - Homepage
Title
Cited by
Cited by
Year
Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication
M Frank, R Biedert, E Ma, I Martinovic, D Song
Information Forensics and Security, IEEE Transactions on 8 (1), 136-148, 2013
6452013
On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces
I Martinovic, D Davies, M Frank, D Perito, T Ros, D Song
Usenix Security, 2012
1192012
SybilBelief: A Semi-supervised Learning Approach for Structure-based Sybil Detection
NZ Gong, M Frank, P Mittal
Information Forensics and Security, IEEE Transactions on 9 (6), 976-987, 2013
1172013
Theoretical and experimental error analysis of continuous-wave time-of-flight range cameras
M Frank, M Plaue, H Rapp, U Koethe, B Jähne, FA Hamprecht
Optical Engineering 48 (1), 013602, 2009
1082009
Mining permission request patterns from android and facebook applications
M Frank, B Dong, AP Felt, D Song
2012 IEEE 12th International Conference on Data Mining, 870-875, 2012
1072012
A probabilistic approach to hybrid role mining
M Frank, AP Streich, D Basin, JM Buhmann
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1032009
Who do you sync you are? Smartphone Fingerprinting based on Application Behaviour
T Stöber, M Frank, J Schmitt, I Martinovic
6th ACM Conference on Security and Privacy in Wireless and Mobile Networks …, 2013
102*2013
Multi-assignment clustering for Boolean data
AP Streich, M Frank, D Basin, JM Buhmann
Proceedings of the 26th annual international conference on machine learning …, 2009
872009
On the definition of role mining
M Frank, JM Buhmann, D Basin
Proceedings of the 15th ACM symposium on Access control models and …, 2010
842010
Multi-assignment clustering for boolean data
M Frank, AP Streich, D Basin, JM Buhmann
The Journal of Machine Learning Research 13 (1), 459-489, 2012
742012
A class of probabilistic models for role engineering
M Frank, D Basin, JM Buhmann
Proceedings of the 15th ACM conference on Computer and communications …, 2008
672008
Role Mining with Probabilistic Models
M Frank, JM Buhmann, D Basin
ACM Transactions on Information and System Security (TISSEC) 15 (4), 1-28, 2013
462013
A theoretical and experimental investigation of the systematic errors and statistical uncertainties of time-of-flight-cameras
H Rapp, M Frank, FA Hamprecht, B Jahne
International Journal of Intelligent Systems Technologies and Applications 5 …, 2008
462008
Denoising of continuous-wave time-of-flight depth images using confidence measures
M Frank, M Plaue, FA Hamprecht
Optical Engineering 48 (7), 077003, 2009
452009
Short Paper: Smartphones: Not Smart Enough?
I Fischer, C Kuo, L Huang, M Frank
2nd ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM), 27--32, 2012
312012
Safe: Secure authentication with face and eyes
A Boehm, D Chen, M Frank, L Huang, C Kuo, T Lolic, I Martinovic, D Song
2013 International Conference on Privacy and Security in Mobile Systems …, 2013
242013
Forgery-resistant touch-based authentication on mobile devices
NZ Gong, M Payer, R Moazzezi, M Frank
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
232016
What You Submit is Who You Are: A Multi-Modal Approach for Deanonymizing Scientific Publications
MF Mathias Payer, Ling Huang, Neil Zhenqiang Gong, Kevin Borgolte
Information Forensics and Security, IEEE Transactions on, 2014
18*2014
Information theoretic model selection for pattern analysis
JM Buhmann, MH Chehreghani, M Frank, AP Streich
Proceedings of ICML Workshop on Unsupervised and Transfer Learning, 51-64, 2012
172012
The minimum transfer cost principle for model-order selection
M Frank, MH Chehreghani, JM Buhmann
Joint European Conference on Machine Learning and Knowledge Discovery in …, 2011
172011
The system can't perform the operation now. Try again later.
Articles 1–20