Journal articles on the topic 'In-app user activity detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'In-app user activity detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Pathmaperuma, Madushi H., Yogachandran Rahulamathavan, Safak Dogan, and Ahmet Kondoz. "CNN for User Activity Detection Using Encrypted In-App Mobile Data." Future Internet 14, no. 2 (February 21, 2022): 67. http://dx.doi.org/10.3390/fi14020067.
Full textPathmaperuma, Madushi H., Yogachandran Rahulamathavan, Safak Dogan, and Ahmet M. Kondoz. "Deep Learning for Encrypted Traffic Classification and Unknown Data Detection." Sensors 22, no. 19 (October 9, 2022): 7643. http://dx.doi.org/10.3390/s22197643.
Full textZhu, Hao, and Georgios B. Giannakis. "Exploiting Sparse User Activity in Multiuser Detection." IEEE Transactions on Communications 59, no. 2 (February 2011): 454–65. http://dx.doi.org/10.1109/tcomm.2011.121410.090570.
Full textMitra, U., and H. V. Poor. "Activity detection in a multi-user environment." Wireless Personal Communications 3, no. 1-2 (1996): 149–74. http://dx.doi.org/10.1007/bf00333928.
Full textKim, Youngho, Tae Oh, and Jeongnyeo Kim. "Analyzing User Awareness of Privacy Data Leak in Mobile Applications." Mobile Information Systems 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/369489.
Full textParwez, Md Salik, Danda B. Rawat, and Moses Garuba. "Big Data Analytics for User-Activity Analysis and User-Anomaly Detection in Mobile Wireless Network." IEEE Transactions on Industrial Informatics 13, no. 4 (August 2017): 2058–65. http://dx.doi.org/10.1109/tii.2017.2650206.
Full textBashir, Sulaimon Adebayo, Andrei Petrovski, and Daniel Doolan. "A framework for unsupervised change detection in activity recognition." International Journal of Pervasive Computing and Communications 13, no. 2 (June 5, 2017): 157–75. http://dx.doi.org/10.1108/ijpcc-03-2017-0027.
Full textLee, Jemin, and Hyungshin Kim. "QDroid: Mobile Application Quality Analyzer for App Market Curators." Mobile Information Systems 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/1740129.
Full textZain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.
Full textKarthikeyan, Dakshinamoorthy, Arun Sivakumar, and Chamundeswari Arumugam. "Android X-Ray - A system for Malware Detection in Android apps using Dynamic Analysis." WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS 19 (November 7, 2022): 264–71. http://dx.doi.org/10.37394/23209.2022.19.27.
Full textHe, Qi, Zhi Chen, Tony Q. S. Quek, Jinho Choi, and Shaoqian Li. "Compressive Channel Estimation and User Activity Detection in Distributed-Input Distributed-Output Systems." IEEE Communications Letters 22, no. 9 (September 2018): 1850–53. http://dx.doi.org/10.1109/lcomm.2018.2858241.
Full textZhang, Jun, Yongping Pan, and Jie Xu. "Compressive Sensing for Joint User Activity and Data Detection in Grant-Free NOMA." IEEE Wireless Communications Letters 8, no. 3 (June 2019): 857–60. http://dx.doi.org/10.1109/lwc.2019.2897552.
Full textUtkovski, Zoran, Osvaldo Simeone, Tamara Dimitrova, and Petar Popovski. "Random Access in C-RAN for User Activity Detection With Limited-Capacity Fronthaul." IEEE Signal Processing Letters 24, no. 1 (January 2017): 17–21. http://dx.doi.org/10.1109/lsp.2016.2633962.
Full textLi, Jing, Yabo Dong, Shengkai Fang, Haowen Zhang, and Duanqing Xu. "User Context Detection for Relay Attack Resistance in Passive Keyless Entry and Start System." Sensors 20, no. 16 (August 9, 2020): 4446. http://dx.doi.org/10.3390/s20164446.
Full textZilli, D., O. Parson, G. V. Merrett, and A. Rogers. "A Hidden Markov Model-Based Acoustic Cicada Detector for Crowdsourced Smartphone Biodiversity Monitoring." Journal of Artificial Intelligence Research 51 (December 30, 2014): 805–27. http://dx.doi.org/10.1613/jair.4434.
Full textHan, Gang Tao, Ying Qiang Ding, Xiao Min Mu, and Jian Kang Zhang. "A Modified Energy Detection Algorithm Based on Primary User Activity for Cognitive Radio Networks." Applied Mechanics and Materials 548-549 (April 2014): 1351–54. http://dx.doi.org/10.4028/www.scientific.net/amm.548-549.1351.
Full textKim, Park, Kim, Cho, and Kang. "Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms." Applied Sciences 9, no. 19 (September 25, 2019): 4018. http://dx.doi.org/10.3390/app9194018.
Full textHuang, Nai-Hsuan, and Tzi-Dar Chiueh. "Sequence Design and User Activity Detection for Uplink Grant-Free NOMA in mMTC Networks." IEEE Open Journal of the Communications Society 2 (2021): 384–95. http://dx.doi.org/10.1109/ojcoms.2021.3056994.
Full textPark, Soojin, Sungyong Park, and Kyeongwook Ma. "An Automatic User Activity Analysis Method for Discovering Latent Requirements: Usability Issue Detection on Mobile Applications." Sensors 18, no. 9 (September 5, 2018): 2963. http://dx.doi.org/10.3390/s18092963.
Full textKim, Myeongchan, Sehyo Yune, Seyun Chang, Yuseob Jung, Soon Ok Sa, and Hyun Wook Han. "The Fever Coach Mobile App for Participatory Influenza Surveillance in Children: Usability Study." JMIR mHealth and uHealth 7, no. 10 (October 17, 2019): e14276. http://dx.doi.org/10.2196/14276.
Full textTsien, Yu Lei, and Rong Li Gai. "User Activity Based Application-Layer DoS/DDoS Attack Defense Algorithm." Applied Mechanics and Materials 742 (March 2015): 693–97. http://dx.doi.org/10.4028/www.scientific.net/amm.742.693.
Full textPriyatno, Arif Mudi. "SPAMMER DETECTION BASED ON ACCOUNT, TWEET, AND COMMUNITY ACTIVITY ON TWITTER." Jurnal Ilmu Komputer dan Informasi 13, no. 2 (July 1, 2020): 97–107. http://dx.doi.org/10.21609/jiki.v13i2.871.
Full textTruong-Allié, Camille, Alexis Paljic, Alexis Roux, and Martin Herbeth. "User Behavior Adaptive AR Guidance for Wayfinding and Tasks Completion." Multimodal Technologies and Interaction 5, no. 11 (October 20, 2021): 65. http://dx.doi.org/10.3390/mti5110065.
Full textBhoge, Rutuja K., Snehal A. Nagare, Swapanali P. Mahajan, and Prajakta S. Kor. "Depression Detection by Analyzing Social Media Post of User." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 2720–24. http://dx.doi.org/10.22214/ijraset.2022.41874.
Full textMishra, Varun, Florian Künzler, Jan-Niklas Kramer, Elgar Fleisch, Tobias Kowatsch, and David Kotz. "Detecting Receptivity for mHealth Interventions in the Natural Environment." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 5, no. 2 (June 23, 2021): 1–24. http://dx.doi.org/10.1145/3463492.
Full textRivera, Bryan, Consuelo Cano, Israel Luis, and Dante A. Elias. "A 3D-Printed Knee Wearable Goniometer with a Mobile-App Interface for Measuring Range of Motion and Monitoring Activities." Sensors 22, no. 3 (January 20, 2022): 763. http://dx.doi.org/10.3390/s22030763.
Full textGnanasekar, A. "Detecting Spam Bots on Social Network." Revista Gestão Inovação e Tecnologias 11, no. 2 (June 5, 2021): 850–60. http://dx.doi.org/10.47059/revistageintec.v11i2.1719.
Full textEsmaeili Kelishomi, Aghil, A. H. S. Garmabaki, Mahdi Bahaghighat, and Jianmin Dong. "Mobile User Indoor-Outdoor Detection Through Physical Daily Activities." Sensors 19, no. 3 (January 26, 2019): 511. http://dx.doi.org/10.3390/s19030511.
Full textSteed, Robert J., Amaya Fuenzalida, Rémy Bossu, István Bondár, Andres Heinloo, Aurelien Dupont, Joachim Saul, and Angelo Strollo. "Crowdsourcing triggers rapid, reliable earthquake locations." Science Advances 5, no. 4 (April 2019): eaau9824. http://dx.doi.org/10.1126/sciadv.aau9824.
Full textNikonowicz, Jakub, Aamir Mahmood, and Mikael Gidlund. "A Blind Signal Samples Detection Algorithm for Accurate Primary User Traffic Estimation." Sensors 20, no. 15 (July 25, 2020): 4136. http://dx.doi.org/10.3390/s20154136.
Full textS, Shalini. "Behavioral Based Credit Card Fraud Detection." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (July 31, 2021): 3556–61. http://dx.doi.org/10.22214/ijraset.2021.37134.
Full textChiossi, Francesco, Robin Welsch, Steeven Villa, Lewis Chuang, and Sven Mayer. "Virtual Reality Adaptation Using Electrodermal Activity to Support the User Experience." Big Data and Cognitive Computing 6, no. 2 (May 13, 2022): 55. http://dx.doi.org/10.3390/bdcc6020055.
Full textSack, Jordan, Todd Reid, Eric Schlossberg, and Nikroo Hashemi. "A Smartphone App for Patients With End-Stage Liver Disease Can Detect Behavioral Changes That Predict Liver-Related Events." Iproceedings 5, no. 1 (October 2, 2019): e15229. http://dx.doi.org/10.2196/15229.
Full textNatadimadja, Muhammad Rayhan, Maman Abdurohman, and Hilal Hudan Nuha. "A Survey on Phishing Website Detection Using Hadoop." Jurnal Informatika Universitas Pamulang 5, no. 3 (September 30, 2020): 237. http://dx.doi.org/10.32493/informatika.v5i3.6672.
Full textTrisno, Syahrul Nugraha, Achmad Ubaidillah, and Kunto Aji Wibisono. "SMART TROLLY DESIGN BASED ON MARKER DETECTION." MULTITEK INDONESIA 15, no. 1 (October 4, 2021): 43–53. http://dx.doi.org/10.24269/mtkind.v15i1.2429.
Full textYakovyna, Vitalii, and Bohdan Uhrynovskyi. "User-perceived Response Metrics in Android OS for Software Aging Detection." Vìsnik Nacìonalʹnogo unìversitetu "Lʹvìvsʹka polìtehnìka". Serìâ Ìnformacìjnì sistemi ta merežì 9 (June 10, 2021): 32–43. http://dx.doi.org/10.23939/sisn2021.09.032.
Full textChen, Shuo, Haojie Li, Lanjie Zhang, Mingyu Zhou, and Xuehua Li. "Block Sparse Bayesian Learning Based Joint User Activity Detection and Channel Estimation in Grant-Free MIMO-NOMA." Drones 7, no. 1 (December 31, 2022): 27. http://dx.doi.org/10.3390/drones7010027.
Full textKamble, Kunal, Pranit Jadhav, Atharva Shanware, and Pallavi Chitte. "Smart Surveillance System for Anomaly Recognition." ITM Web of Conferences 44 (2022): 02003. http://dx.doi.org/10.1051/itmconf/20224402003.
Full textEt.al, D. Priyadarshini. "A Novel Technique for IDS in Distributed Data Environment Using Merkel Based Security Mechanism for Secure User Allocation." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 11, 2021): 4284–97. http://dx.doi.org/10.17762/turcomat.v12i3.1720.
Full textAkhriana, Asmah, and Andi Irmayana. "WEB APP PENDETEKSI JENIS SERANGAN JARINGAN KOMPUTER DENGAN MEMANFAATKAN SNORT DAN LOG HONEYPOT." CCIT Journal 12, no. 1 (February 6, 2019): 85–96. http://dx.doi.org/10.33050/ccit.v12i1.604.
Full textBouali, Chaima, Olivier Habert, and Abderrahim Tahiri. "In Situ Abnormal Behaviours Detection." Modelling, Measurement and Control C 81, no. 1-4 (December 31, 2020): 1–6. http://dx.doi.org/10.18280/mmc_c.811-401.
Full textShelke, Sagar, and Baris Aksanli. "Static and Dynamic Activity Detection with Ambient Sensors in Smart Spaces." Sensors 19, no. 4 (February 16, 2019): 804. http://dx.doi.org/10.3390/s19040804.
Full textAhmed, Arshed, Muhammad Sajjad Khan, Noor Gul, Irfan Uddin, Su Min Kim, and Junsu Kim. "A Comparative Analysis of Different Outlier Detection Techniques in Cognitive Radio Networks with Malicious Users." Wireless Communications and Mobile Computing 2020 (December 9, 2020): 1–18. http://dx.doi.org/10.1155/2020/8832191.
Full textDvoynikova, Anastasiya, Ildar Kagirov, and Alexey Karpov. "Analytical review of methods for automatic detection of user engagement in virtual communication." Information and Control Systems, no. 5 (October 28, 2022): 12–22. http://dx.doi.org/10.31799/1684-8853-2022-5-12-22.
Full textAndo, Bruno, Salvatore Baglio, Salvatore Castorina, Ruben Crispino, and Vincenzo Marletta. "An Assistive Technology Solution for User Activity Monitoring Exploiting Passive RFID." Sensors 20, no. 17 (September 1, 2020): 4954. http://dx.doi.org/10.3390/s20174954.
Full textZheng, Panpan, Shuhan Yuan, and Xintao Wu. "SAFE: A Neural Survival Analysis Model for Fraud Early Detection." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 1278–85. http://dx.doi.org/10.1609/aaai.v33i01.33011278.
Full textSara, Meghshanth. "Stress Detection Smartwatch." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (July 31, 2022): 3796–802. http://dx.doi.org/10.22214/ijraset.2022.45865.
Full textZhang, Zhaoji, Ying Li, Chongwen Huang, Qinghua Guo, Lei Liu, Chau Yuen, and Yong Liang Guan. "User Activity Detection and Channel Estimation for Grant-Free Random Access in LEO Satellite-Enabled Internet of Things." IEEE Internet of Things Journal 7, no. 9 (September 2020): 8811–25. http://dx.doi.org/10.1109/jiot.2020.2997336.
Full textDamkliang, Kasikrit, Jarutas Andritsch, Krittamate Khamkom, and Nanida Thongthep. "A System for Sleepwalking Accident Prevention Utilizing the Remote Sensor of Wearable Device." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 13, no. 2 (March 14, 2020): 160–69. http://dx.doi.org/10.37936/ecti-cit.2019132.184442.
Full textYang, Taehun, Sang-Hoon Lee, and Soochang Park. "AI-Aided Individual Emergency Detection System in Edge-Internet of Things Environments." Electronics 10, no. 19 (September 28, 2021): 2374. http://dx.doi.org/10.3390/electronics10192374.
Full text