Mhd Irvan

Orcid: 0009-0003-6229-5561

According to our database1, Mhd Irvan authored at least 30 papers between 2013 and 2026.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2026
Log-Based Authentication via Cybernetic Avatars: Data Type Categorization Focused on Authenticated Game Character Information.
Proceedings of the 12th International Conference on Information Systems Security and Privacy, 2026

Authentication Technique in the Emerging Cybernetic Avatar Era.
Proceedings of the 18th International Conference on COMmunication Systems and NETworks, 2026

Enhancing User Authentication with Wearable Data: Evaluating Sampling Strategies and Classifiers Using Apple Watch Sensor Logs.
Proceedings of the 18th International Conference on COMmunication Systems and NETworks, 2026

Log-Based Authentication as a Promising Method for Detecting Cooperative Impersonation from Temporal and Spatial Perspectives.
Proceedings of the 18th International Conference on COMmunication Systems and NETworks, 2026

2025
A Constant Authentication System Utilizing Smartphone-Derived Behavioral Data Across Multiple Services.
Proceedings of the 18th IEEE/ACM International Conference on Utility and Cloud Computing, 2025

Sequence Length Aggregation and Behavioral Biometrics: A Case Study in Professional Player Authentication via Tree-Based Classification.
Proceedings of the Advances in Information and Computer Security, 2025

Fair Play and Identity: In-Game Behavioral Biometrics for Player Identification in Competitive Online Games.
Proceedings of the IEEE Conference on Games, 2025

Player Authentication in Fighting Games using Controller Operation Dynamics.
Proceedings of the Thirteenth International Symposium on Computing and Networking, CANDAR 2025, 2025

Investigating Robot Behavioral Biometrics Through Interaction Logs for Distinguishing Operators.
Proceedings of the IEEE International Conference on Big Data, 2025

2024
ARZSEP: Angle-Based Routing Optimization in ZSEP Protocol for Heterogeneous WSNs.
Wirel. Pers. Commun., November, 2024

Anomaly Detection in eSport Games Through Periodical In-Game Movement Analysis with Deep Recurrent Neural Network.
Proceedings of the 16th International Joint Conference on Computational Intelligence, 2024

Sub-Batch Update Mechanism for Component-Wise Natural Gradient Descent.
Proceedings of the 8th International Conference on Advances in Artificial Intelligence, 2024

2023
Privacy preserving medical knowledge discovery by multiple "patient characteristics" formatted data.
Int. J. Netw. Comput., 2023

Disclosure of Multiple "Patient Characteristics" Format Statistics leaks Quasi-identifier Linkage.
Proceedings of the 9th ACM International Workshop on Security and Privacy Analytics, 2023

Impact of Anonymity Indicator "PFDOC Entropy l-Diversity" on Medical Data Utility.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023

Brain Intervention Therapy Dilemma: Functional Recovery versus Identity.
Proceedings of the Brain Informatics - 16th International Conference, 2023

XAI for Medicine by ChatGPT Code interpreter.
Proceedings of the 5th International Conference on Big-data Service and Intelligent Computation, 2023

2022
Component-Wise Natural Gradient Descent - An Efficient Neural Network Optimization.
Proceedings of the Tenth International Symposium on Computing and Networking, 2022

Medical knowledge discovery by randomly sampled "patient characteristics" formatted data.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022

Anonymity test attacks and vulnerability indicators for the "Patient characteristics" disclosure in medical articles.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

Component-Wise Natural Gradient Descent on Deep Neural Networks.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022

2021
Learning from Smartphone Location Data as Anomaly Detection for Behavioral Authentication through Deep Neuroevolution.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

2020
Score Fusion Method by Neural Network Using GPS and Wi-Fi Log Data.
Proceedings of the International Symposium on Information Theory and Its Applications, 2020

Predicting Smartphone Users' Future Locations through Deep Reinforcement Learning.
Proceedings of the Eighth International Symposium on Computing and Networking Workshops, 2020

Self-enhancing GPS-Based Authentication Using Corresponding Address.
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020

A Score Fusion Method by Neural Network in Multi-Factor Authentication.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

User authentication based on smartphone application usage patterns through learning classifier systems.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Effective Classification for Multi-modal Behavioral Authentication on Large-Scale Data.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

2014
An Item Influence-Centric Algorithm for Recommender Systems.
Proceedings of the Distributed Computing and Artificial Intelligence, 2014

2013
A TV Program Recommender Framework.
Proceedings of the 17th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2013


  Loading...