Javad Sohankar

According to our database1, Javad Sohankar authored at least 11 papers between 2015 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Machine Learning Based Predictive Models in Mobile Platforms Using CPU-GPU.
Proceedings of the 7th International Conference on Internet of Things: Systems, 2020

2017
Systematic analysis of liveness detection methods in biometrie security systems.
Proceedings of the 2017 IEEE SmartWorld, 2017

A novel spoofing attack against electroencephalogram-based security systems.
Proceedings of the 2017 IEEE SmartWorld, 2017

Enabling real-time internet-of-people "4D" mobile applications.
Proceedings of the 2017 IEEE SmartWorld, 2017

Performance and Security Strength Trade-Off in Machine Learning Based Biometric Authentication Systems.
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017

Geometrical Analysis of Machine Learning Security in Biometric Authentication Systems.
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017

Permanency analysis on human electroencephalogram signals for pervasive Brain-Computer Interface systems.
Proceedings of the 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2017

2016
SafeDrive: An autonomous driver safety application in aware cities.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

Toward Parametric Security Analysis of Machine Learning Based Cyber Forensic Biometric Systems.
Proceedings of the 15th IEEE International Conference on Machine Learning and Applications, 2016

Optimization of Brain Mobile Interface Applications Using IoT.
Proceedings of the 23rd IEEE International Conference on High Performance Computing, 2016

2015
E-BIAS: A Pervasive EEG-Based Identification and Authentication System.
Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2015


  Loading...