Huh, Jun Ho
2710  results:
Search for persons X
?
1

SkullID: Through-Skull Sound Conduction based Authenticatio..:

, In: Proceedings of the CHI Conference on Human Factors in Computing Systems,
Shin, Hyejin ; Huh, Jun Ho ; Kwon, Bum Jun... - p. 1-19 , 2024
 
?
3

On the Long-Term Effects of Continuous Keystroke Authentica..:

Huh, Jun Ho ; Kwag, Sungsu ; Kim, Iljoo...
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies.  7 (2023)  2 - p. 1-32 , 2023
 
?
4

GestureMeter: Design and Evaluation of a Gesture Password S..:

, In: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems,
Cheon, Eunyong ; Huh, Jun Ho ; Oakley, Ian - p. 1-19 , 2023
 
?
5

WristAcoustic: Through-Wrist Acoustic Response Based Authen..:

Huh, Jun Ho ; Shin, Hyejin ; Kim, HongMin...
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies.  6 (2022)  4 - p. 1-34 , 2022
 
?
6

On Smartphone Users' Difficulty with Understanding Implicit..:

, In: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems,
 
?
7

Is Implicit Authentication on Smartphones Really Popular? O..:

, In: 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services,
 
?
8

Gesture Authentication for Smartphones: Evaluation of Gestu..:

, In: 2020 IEEE Symposium on Security and Privacy (SP),
Cheon, Eunyong ; Shin, Yonghwan ; Huh, Jun Ho.. - p. 249-267 , 2020
 
?
9

Design of a Framework to Detect Device Spoofing Attacks Usi..:

Yu, Jaegwan ; Kim, Eunsoo ; Kim, Hyoungshick.
IEEE Consumer Electronics Magazine.  9 (2020)  2 - p. 34-40 , 2020
 
?
10

On the Security and Usability Implications of Providing Mul..:

Cho, Geumhwan ; Huh, Jun Ho ; Kim, Soolin...
ACM Transactions on Privacy and Security.  23 (2020)  4 - p. 1-32 , 2020
 
?
11

On the Security and Usability Implications of Providing Mul..:

Cho, Geumhwan ; Huh, Jun Ho ; Kim, Soolin...
ACM Transactions on Privacy and Security (TOPS).  23 (2020)  4 - p. 1-32 , 2020
 
?
12

Voice Presentation Attack Detection through Text-Converted ..:

, In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems,
Kwak, Il-Youp ; Huh, Jun Ho ; Han, Seung Taek.. - p. 1-12 , 2019
 
?
13

The Personal Identification Chord : A Four ButtonAuthent..:

, In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security,
Oakley, Ian ; Huh, Jun Ho ; Cho, Junsung... - p. 75-87 , 2018
 
?
14

Adaptive thermal property control technique for holistic th..:

Lee, Kyoung Min ; Im, Yunhyeok ; Huh, Jun Ho.
IEICE Electronics Express.  15 (2018)  10 - p. 20180187-20180187 , 2018
 
?
15

I'm Listening to your Location! Inferring User Location wit..:

, In: Proceedings of the 2018 World Wide Web Conference,
Jeon, Youngbae ; Kim, Minchul ; Kim, Hyunsoo... - p. 339-348 , 2018
 
1-15