Mario Frank

According to our database1, Mario Frank authored at least 28 papers between 2008 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


Online presence:



A Theorem Prover for Scientific and Educational Purposes.
Proceedings of the Proceedings 6th International Workshop on Theorem proving components for Educational software, 2017

Using EEG-Based BCI Devices to Subliminally Probe for Private Information.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

Forgery-Resistant Touch-based Authentication on Mobile Devices.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

What You Submit Is Who You Are: A Multimodal Approach for Deanonymizing Scientific Publications.
IEEE Trans. Inf. Forensics Secur., 2015

Towards Forgery-Resistant Touch-based Biometric Authentication on Mobile Devices.
CoRR, 2015

SybilBelief: A Semi-Supervised Learning Approach for Structure-Based Sybil Detection.
IEEE Trans. Inf. Forensics Secur., 2014

Role Mining with Probabilistic Models.
ACM Trans. Inf. Syst. Secur., 2013

Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication.
IEEE Trans. Inf. Forensics Secur., 2013

Image-based supervision of a periodically working machine.
Pattern Anal. Appl., 2013

Subliminal Probing for Private Information via EEG-Based BCI Devices.
CoRR, 2013

Who do you sync you are?: smartphone fingerprinting via application behaviour.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

SAFE: Secure authentication with Face and Eyes.
Proceedings of the 2013 International Conference on Privacy and Security in Mobile Systems, 2013

Modeling and detecting anomalous topic access.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Multi-Assignment Clustering for Boolean Data.
J. Mach. Learn. Res., 2012

Information Theoretic Model Selection for Pattern Analysis.
Proceedings of the Unsupervised and Transfer Learning, 2012

Mining Permission Request Patterns from Android and Facebook Applications (extended author version)
CoRR, 2012

On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Predicting Congressional Votes Based on Campaign Finance Data.
Proceedings of the 11th International Conference on Machine Learning and Applications, 2012

Mining Permission Request Patterns from Android and Facebook Applications.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Short paper: smartphones: not smart enough?
Proceedings of the SPSM'12, 2012

Selecting the rank of SVD by Maximum Approximation Capacity
CoRR, 2011

The Minimum Transfer Cost Principle for Model-Order Selection.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2011

Selecting the rank of truncated SVD by maximum approximation capacity.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

On the definition of role mining.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Developments in ROOT I/O and trees
CoRR, 2009

A probabilistic approach to hybrid role mining.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

A theoretical and experimental investigation of the systematic errors and statistical uncertainties of Time-Of-Flight-cameras.
Int. J. Intell. Syst. Technol. Appl., 2008

A class of probabilistic models for role engineering.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008