Vir V. Phoha
Vir Virander Phoha
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2019
- [j37]Changsheng Wan, Li Wang, Vir V. Phoha:
A Survey on Gait Recognition. ACM Comput. Surv. 51(5): 89:1-89:35 (2019) - 2018
- [j36]Changsheng Wan, Vir Virander Phoha, Daoli Huang:
TR-MCN: light weight task recommendation for mobile crowdsourcing networks. J. Ambient Intelligence and Humanized Computing 9(4): 1027-1038 (2018) - [j35]Changsheng Wan, Vir Virander Phoha, Yuzhe Tang, Aiqun Hu:
Non-interactive Identity-Based Underwater Data Transmission With Anonymity and Zero Knowledge. IEEE Trans. Vehicular Technology 67(2): 1726-1739 (2018) - [c45]Rajesh Kumar, Partha Pratim Kundu, Vir V. Phoha:
Continuous authentication using one-class classifiers and their fusion. ISBA 2018: 1-8 - [c44]Gayathri Manogna Parimi, Partha Pratim Kundu, Vir V. Phoha:
Analysis of head and torso movements for authentication. ISBA 2018: 1-8 - [i6]Md. Enamul Karim, Kiran S. Balagani, Aaron Elliott, David Irakiza, Mike O'Neal, Vir V. Phoha:
Active Authentication of Keyboard Users: Performance Evaluation on 736 Subjects. CoRR abs/1804.08180 (2018) - 2017
- [j34]Changsheng Wan, Vir Virander Phoha, Bei Pei, Changsong Chen:
Securing dynamic microgrid partition in the smart grid. IJDSN 13(5) (2017) - [c43]Rajesh Kumar, Partha Pratim Kundu, Diksha Shukla, Vir V. Phoha:
Continuous user authentication via unlabeled phone movement patterns. IJCB 2017: 177-184 - [c42]Samuel W. Hincks, Sarah Bratt, Sujit Poudel, Vir V. Phoha, Robert J. K. Jacob, Daniel C. Dennett, Leanne M. Hirshfield:
Entropic Brain-computer Interfaces - Using fNIRS and EEG to Measure Attentional States in a Bayesian Framework. PhyCS 2017: 23-34 - [c41]Borui Li, Han Sun, Yang Gao, Vir V. Phoha, Zhanpeng Jin:
Enhanced free-text keystroke continuous authentication based on dynamics of wrist motion. WIFS 2017: 1-6 - [i5]Rajesh Kumar, Partha Pratim Kundu, Diksha Shukla, Vir V. Phoha:
Continuous User Authentication via Unlabeled Phone Movement Patterns. CoRR abs/1708.04399 (2017) - [i4]Rajesh Kumar, Partha Pratim Kundu, Vir V. Phoha:
Continuous Authentication Using One-class Classifiers and their Fusion. CoRR abs/1710.11075 (2017) - 2016
- [b2]Rastko R. Selmic, Vir V. Phoha, Abdul Serwadda:
Wireless Sensor Networks - Security, Coverage, and Localization. Springer 2016, ISBN 978-3-319-46767-2, pp. 1-215 - [j33]Abdul Serwadda, Vir V. Phoha, Zibo Wang, Rajesh Kumar, Diksha Shukla:
Toward Robotic Robbery on the Touch Screen. ACM Trans. Inf. Syst. Secur. 18(4): 14:1-14:25 (2016) - [c40]Rajesh Kumar, Vir V. Phoha, Abdul Serwadda:
Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns. BTAS 2016: 1-8 - [c39]Chunxu Tang, Vir V. Phoha:
An empirical evaluation of activities and classifiers for user identification on smartphones. BTAS 2016: 1-8 - [i3]Rajesh Kumar, Vir V. Phoha, Rahul Raina:
Authenticating users through their arm movement patterns. CoRR abs/1603.02211 (2016) - [i2]Ricky Laishram, Vir Virander Phoha:
Curie: A method for protecting SVM Classifier from Poisoning Attack. CoRR abs/1606.01584 (2016) - 2015
- [j32]Abdul Serwadda, Vir V. Phoha:
When Mice devour the Elephants: A DDoS attack against size-based scheduling schemes in the internet. Computers & Security 53: 31-43 (2015) - [j31]David Guy Brizan, Adam Goodkind, Patrick Koch, Kiran S. Balagani, Vir V. Phoha, Andrew Rosenberg:
Utilizing linguistically enhanced keystroke dynamics to predict typist cognition and demographics. Int. J. Hum.-Comput. Stud. 82: 57-68 (2015) - [c38]Rajesh Kumar, Vir V. Phoha, Anshumali Jain:
Treadmill attack on gait-based authentication systems. BTAS 2015: 1-7 - [c37]Sujit Poudel, Abdul Serwadda, Vir V. Phoha:
On humanoid robots imitating human touch gestures on the smart phone. BTAS 2015: 1-7 - [c36]Abena Primo, Vir V. Phoha:
Music and images as contexts in a context-aware touch-based authentication system. BTAS 2015: 1-7 - [c35]Abdul Serwadda, Vir V. Phoha, Sujit Poudel, Leanne M. Hirshfield, Danushka Bandara, Sarah E. Bratt, Mark R. Costa:
fNIRS: A new modality for brain activity-based biometric authentication. BTAS 2015: 1-7 - 2014
- [j30]Ankunda R. Kiremire, Matthias R. Brust, Vir V. Phoha:
Using network motifs to investigate the influence of network topology on PPM-based IP traceback schemes. Computer Networks 72: 14-32 (2014) - [j29]Jundong Chen, Ankunda R. Kiremire, Matthias R. Brust, Vir V. Phoha:
Modeling online social network users' profile attribute disclosure behavior from a game theoretic perspective. Computer Communications 49: 18-32 (2014) - [j28]Jundong Chen, Ankunda R. Kiremire, Matthias R. Brust, Vir V. Phoha:
A Game Theoretic Approach for Modeling Privacy Settings of an Online Social Network. EAI Endorsed Trans. Collaborative Computing 1(1): e4 (2014) - [j27]David Irakiza, Md. Enamul Karim, Vir V. Phoha:
A Non-Interactive Dual Channel Continuous Traffic Authentication Protocol. IEEE Trans. Information Forensics and Security 9(7): 1133-1140 (2014) - [c34]Ankunda R. Kiremire, Matthias R. Brust, Vir V. Phoha:
Topology-dependent performance of attack graph reconstruction in PPM-based IP traceback. CCNC 2014: 363-370 - [c33]Diksha Shukla, Rajesh Kumar, Abdul Serwadda, Vir V. Phoha:
Beware, Your Hands Reveal Your Secrets! ACM Conference on Computer and Communications Security 2014: 904-917 - [c32]Abena Primo, Vir V. Phoha, Rajesh Kumar, Abdul Serwadda:
Context-Aware Active Authentication Using Smartphone Accelerometer Measurements. CVPR Workshops 2014: 98-105 - [c31]Hilbert Locklear, Sathya Govindarajan, Zdenka Sitova, Adam Goodkind, David Guy Brizan, Andrew Rosenberg, Vir V. Phoha, Paolo Gasti, Kiran S. Balagani:
Continuous authentication with cognition-centric text production and revision features. IJCB 2014: 1-8 - [c30]Jaroslav Sedenka, Kiran S. Balagani, Vir V. Phoha, Paolo Gasti:
Privacy-preserving population-enhanced biometric key generation from free-text keystroke dynamics. IJCB 2014: 1-8 - [i1]Jaroslav Sedenka, Kiran S. Balagani, Vir V. Phoha, Paolo Gasti:
Privacy-Preserving Population-Enhanced Biometric Key Generation from Free-Text Keystroke Dynamics. CoRR abs/1407.4179 (2014) - 2013
- [j26]Abdul Serwadda, Zibo Wang, Patrick Koch, Sathya Govindarajan, Raviteja Pokala, Adam Goodkind, David Guy Brizan, Andrew Rosenberg, Vir V. Phoha, Kiran S. Balagani:
Scan-Based Evaluation of Continuous Keystroke Authentication Systems. IT Professional 15(4): 20-23 (2013) - [j25]Khandaker Abir Rahman, Kiran S. Balagani, Vir V. Phoha:
Snoop-Forge-Replay Attacks on Continuous Verification With Keystrokes. IEEE Trans. Information Forensics and Security 8(3): 528-541 (2013) - [j24]Justin L. Rice, Vir V. Phoha, Philip Robinson:
Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds. IEEE Trans. Information Forensics and Security 8(6): 963-972 (2013) - [j23]Abdul Serwadda, Vir V. Phoha:
Examining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings. ACM Trans. Inf. Syst. Secur. 16(2): 8:1-8:30 (2013) - [c29]Abdul Serwadda, Vir V. Phoha, Zibo Wang:
Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms. BTAS 2013: 1-8 - [c28]Abdul Serwadda, Vir V. Phoha:
When kids' toys breach mobile phone security. ACM Conference on Computer and Communications Security 2013: 599-610 - [c27]Jundong Chen, Matthias R. Brust, Ankunda R. Kiremire, Vir V. Phoha:
Modeling privacy settings of an online social network from a game-theoretical perspective. CollaborateCom 2013: 213-220 - [c26]Md S. Hossain, Kiran S. Balagani, Vir V. Phoha:
On Controlling Genuine Reject Rate in Multi-stage Biometric Verification. CVPR Workshops 2013: 194-199 - [c25]David Irakiza, Md. Enamul Karim, Vir V. Phoha:
A Non-interactive Dual-channel Authentication Protocol for Assuring Pseudo-confidentiality. NDSS 2013 - 2012
- [j22]Nitin Kanaskar, Remzi Seker, Jiang Bian, Vir V. Phoha:
Dynamical System Theory for the Detection of Anomalous Behavior in Computer Programs. IEEE Trans. Systems, Man, and Cybernetics, Part C 42(6): 1579-1589 (2012) - [c24]Md S. Hossain, Kiran S. Balagani, Vir V. Phoha:
New impostor score based rejection methods for continuous keystroke verification with weak templates. BTAS 2012: 251-258 - [c23]Zibo Wang, Abdul Serwadda, Kiran S. Balagani, Vir V. Phoha:
Transforming animals in a cyber-behavioral biometric menagerie with Frog-Boiling attacks. BTAS 2012: 289-296 - [c22]Ankunda R. Kiremire, Matthias R. Brust, Vir V. Phoha:
A prediction based approach to IP traceback. LCN Workshops 2012: 1022-1029 - 2011
- [j21]P. T. Krishna Kumar, P. T. Vinod, Vir V. Phoha, S. Sitharama Iyengar, Puneeth Iyengar:
Design of a smart biomarker for bioremediation: A machine learning approach. Comp. in Bio. and Med. 41(6): 357-360 (2011) - [j20]Kiran S. Balagani, Vir V. Phoha, Asok Ray, Shashi Phoha:
On the discriminability of keystroke feature vectors used in fixed text keystroke authentication. Pattern Recognition Letters 32(7): 1070-1080 (2011) - [c21]Justin L. Rice, Vir V. Phoha, Pat Cappelaere, Dan Mandl:
Web Farm-inspired Computational Cluster in the Cloud. CloudCom 2011: 730-737 - [c20]Khandaker Abir Rahman, Kiran S. Balagani, Vir V. Phoha:
Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes. CVPR Workshops 2011: 31-38 - [c19]Christian A. Duncan, Vir V. Phoha:
On the Complexity of Aggregating Information for Authentication and Profiling. DPM/SETOP 2011: 58-71 - 2010
- [j19]Kiran S. Balagani, Vir V. Phoha:
On the Feature Selection Criterion Based on an Approximation of Multidimensional Mutual Information. IEEE Trans. Pattern Anal. Mach. Intell. 32(7): 1342-1343 (2010) - [j18]Kiran S. Balagani, Vir V. Phoha, S. Sitharama Iyengar, N. Balakrishnan:
On Guo and Nixon's Criterion for Feature Subset Selection: Assumptions, Implications, and Alternative Options. IEEE Trans. Systems, Man, and Cybernetics, Part A 40(3): 651-655 (2010) - [c18]Abdul Serwadda, Vir V. Phoha, Idris A. Rai:
Size-based scheduling: a recipe for DDOS? ACM Conference on Computer and Communications Security 2010: 729-731
2000 – 2009
- 2009
- [j17]P. T. Krishna Kumar, Vir V. Phoha, S. S. Iyengar, Puneeth Iyengar:
Reduction of noise due to systematic uncertainties in 113mIn SPECT imaging using information theory. Comp. in Bio. and Med. 39(5): 482-488 (2009) - [j16]Dimple Juneja, S. Sitharama Iyengar, Vir V. Phoha:
Fuzzy Evaluation of Agent-Based Semantic Match-Making Algorithm for Cyberspace. Int. J. Semantic Computing 3(1): 57-76 (2009) - [c17]Gregory Vert, S. S. Iyengar, Vir V. Phoha:
Security models for contextual based global processing an architecture and overview. CSIIRW 2009: 53 - [c16]Md. Shafaeat Hossain, Khandaker Abir Rahman, Md. Hasanuzzaman, Vir V. Phoha:
A simple and efficient video image clustering algorithm for person specific query and image retrieval. ICIMCS 2009: 85-89 - [c15]Gregory Vert, S. Sitharama Iyengar, Vir V. Phoha:
Defining A New Type of Global Information Architecture for Contextual Information Processing. IKE 2009: 214-219 - [c14]Vasanth Iyer, S. Sitharama Iyengar, Garimella Rama Murthy, Bertrand Hochet, Vir V. Phoha, M. B. Srinivas:
Multi-hop scheduling and local data link aggregation dependant Qos in modeling and simulation of power-aware wireless sensor networks. IWCMC 2009: 844-848 - [e1]Sanjay Ranka, Srinivas Aluru, Rajkumar Buyya, Yeh-Ching Chung, Sumeet Dua, Ananth Grama, Sandeep K. S. Gupta, Rajeev Kumar, Vir V. Phoha:
Contemporary Computing - Second International Conference, IC3 2009, Noida, India, August 17-19, 2009. Proceedings. Communications in Computer and Information Science 40, Springer 2009, ISBN 978-3-642-03546-3 [contents] - 2008
- [j15]P. T. Krishna Kumar, Vir V. Phoha, S. Sitharama Iyengar:
Classification of radio elements using mutual information: A tool for geological mapping. Int. J. Applied Earth Observation and Geoinformation 10(3): 305-311 (2008) - 2007
- [j14]Kiran S. Balagani, Vir V. Phoha:
On the Relationship Between Dependence Tree Classification Error and Bayes Error Rate. IEEE Trans. Pattern Anal. Mach. Intell. 29(10): 1866-1868 (2007) - [j13]Shekhar R. Gaddam, Vir V. Phoha, Kiran S. Balagani:
K-Means+ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning Methods. IEEE Trans. Knowl. Data Eng. 19(3): 345-354 (2007) - [c13]Shrijit S. Joshi, Vir V. Phoha:
Competition between SOM Clusters to Model User Authentication System in Computer Networks. COMSWARE 2007 - [c12]
- [c11]Yenumula B. Reddy, Vir V. Phoha:
Genetic Algorithm Approach for Resource Allocation in Multi-User OFDM Systems. COMSWARE 2007 - [c10]Kiran S. Balagani, Vir V. Phoha, Gopi K. Kuchimanchi:
A Divergence-measure Based Classification Method for Detecting Anomalies in Network Traffic. ICNSC 2007: 374-379 - 2005
- [j12]Yong Sheng, Vir V. Phoha, S. M. Rovnyak:
A parallel decision tree-based method for user authentication based on keystroke patterns. IEEE Trans. Systems, Man, and Cybernetics, Part B 35(4): 826-833 (2005) - [c9]Brenda F. Miles, Vir V. Phoha:
The bipartite clique: a topological paradigm for WWWeb user search customization. ACM Southeast Regional Conference (1) 2005: 90-95 - [c8]Shrijit S. Joshi, Vir V. Phoha:
Investigating hidden Markov models capabilities in anomaly detection. ACM Southeast Regional Conference (1) 2005: 98-103 - [c7]Xin Xu, Weihua Song, Vir V. Phoha:
Early detection and propagation mitigation of worm programs. ACM Southeast Regional Conference (2) 2005: 193-194 - 2004
- [j11]Santosh K. Rangarajan, Vir V. Phoha, Kiran S. Balagani, Rastko R. Selmic, S. Sitharama Iyengar:
Adaptive Neural Network Clustering of Web Users. IEEE Computer 37(4): 34-40 (2004) - [j10]Vir V. Phoha, Amit U. Nadgar, Asok Ray, Shashi Phoha:
Supervisory Control of Software Systems. IEEE Trans. Computers 53(9): 1187-1199 (2004) - [c6]Weihua Song, Vir V. Phoha:
Opinion Filtered Recommendation Trust Model in Peer-to-Peer Networks. AP2PC 2004: 237-244 - [c5]Weihua Song, Vir V. Phoha, Xin Xu:
An Adaptive Recommendation Trust Model in Multiagent System. IAT 2004: 462-465 - [c4]Weihua Song, Vir V. Phoha:
Neural Network-Based Reputation Model in a Distributed System. CEC 2004: 321-324 - 2002
- [b1]Vir V. Phoha:
Internet security dictionary. Springer 2002, ISBN 978-0-387-95261-1, pp. I-XIX, 1-259 - [j9]S. S. Iyengar, Vir V. Phoha, Yuyan Wu, Hla Min:
A New Efficient Edge Extraction Algorithm for Images Using Directional Tracing Techniques. Intelligent Automation & Soft Computing 8(3): 217-234 (2002) - [j8]Vir V. Phoha, S. Sitharama Iyengar, Rajgopal Kannan:
Faster Web Page Allocation with Neural Networks. IEEE Internet Computing 6(6): 18-26 (2002) - [c3]Wen Tian, Ben Choi, Vir V. Phoha:
An Adaptive Web Cache Access Predictor Using Neural Network. IEA/AIE 2002: 450-459 - 2001
- [j7]
- [c2]Yunjuan Xie, Vir V. Phoha:
Web user clustering from access log using belief function. K-CAP 2001: 202-208 - [c1]Vir V. Phoha:
An interactive dynamic model for integrating knowledge management methods and knowledge sharing technology in a traditional classroom. SIGCSE 2001: 144-148
1990 – 1999
- 1999
- [j6]
- 1998
- [j5]Vir V. Phoha:
Review of "Discrete Neural Networks: A Theoretical Foundation by Kai-Yeung Siu, Vwani Roychowdhury and Thomas Kailath", Prentice Hall PTR, 1995, ISBN 0-13-300708-1. SIGART Bulletin 9(2): 29-30 (1998) - 1997
- [j4]
- 1996
- [j3]Vir V. Phoha, William J. B. Oldham:
Image recovery and segmentation using competitive learning in a layered network. IEEE Trans. Neural Networks 7(4): 843-856 (1996) - [j2]Vir V. Phoha, William J. B. Oldham:
Corrections to "Image Recovery and Segmentation Using Competitive Learning in a Layered Network. IEEE Trans. Neural Networks 7(6): 1547 (1996) - 1995
- [j1]Vir V. Phoha:
Decision support and executive information systems : by Paul Gray (editor) (1994; Pages 469; Prentice Hall, Englewood Cliffs, NJ 07632, USA; ISBN 0-13-235789-5). Decision Support Systems 15(3): 247-248 (1995)
Coauthor Index
S. Sitharama Iyengar
aka: S. S. Iyengar
aka: S. S. Iyengar
last updated on 2019-02-14 22:51 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint