Skip to content
@UW-CIA

Continuous and Implicit Authentication @ UWATERLOO

The way you handle your devices is your next-gen password.
  • 2 followers
  • Cheriton School of Computer Science - University of Waterloo

Popular repositories Loading

  1. Extensive_Evaluations Extensive_Evaluations Public

    Experiments evaluating 10+ ml models in anomaly detection cases for continuous and implicit authentication using the HMOG data set.

    Jupyter Notebook 1 1

  2. Mobile_Data_Acquisition Mobile_Data_Acquisition Public

    Data collection and real-time streaming application for Android and IOS systems using MIT App Inventor.

    TeX 1

  3. Models_at_edge Models_at_edge Public

    Running VAEs on mobile and IOT devices using TFLite.

    Jupyter Notebook 1

  4. attack_flow_detector attack_flow_detector Public

    Forked from ezzeldinadel/attack_flow_detector

    Python

Repositories

Showing 4 of 4 repositories
  • UW-CIA/attack_flow_detector’s past year of commit activity
    Python 0 MIT 167 0 0 Updated Apr 17, 2025
  • Extensive_Evaluations Public

    Experiments evaluating 10+ ml models in anomaly detection cases for continuous and implicit authentication using the HMOG data set.

    UW-CIA/Extensive_Evaluations’s past year of commit activity
    Jupyter Notebook 1 1 0 0 Updated Jun 16, 2021
  • Mobile_Data_Acquisition Public

    Data collection and real-time streaming application for Android and IOS systems using MIT App Inventor.

    UW-CIA/Mobile_Data_Acquisition’s past year of commit activity
    TeX 1 0 0 0 Updated Jun 16, 2021
  • Models_at_edge Public

    Running VAEs on mobile and IOT devices using TFLite.

    UW-CIA/Models_at_edge’s past year of commit activity
    Jupyter Notebook 1 0 0 0 Updated Jun 16, 2021

Top languages

Loading…

Most used topics

Loading…