default search action
Vir V. Phoha
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2016
- [b3]Rastko R. Selmic, Vir V. Phoha, Abdul Serwadda:
Wireless Sensor Networks - Security, Coverage, and Localization. Springer 2016, ISBN 978-3-319-46767-2, pp. 1-215 - 2002
- [b2]Vir V. Phoha:
Internet security dictionary. Springer 2002, ISBN 978-0-387-95261-1, pp. I-XIX, 1-259 - 1992
- [b1]Vir Virander Phoha:
Image recovery and segmentation using competitive learning in a computational network. Texas Tech University, Lubbock, USA, 1992
Journal Articles
- 2024
- [j46]Frank Sicong Chen, Jingyu Xin, Vir V. Phoha:
SSPRA: A Robust Approach to Continuous Authentication Amidst Real-World Adversarial Challenges. IEEE Trans. Biom. Behav. Identity Sci. 6(2): 245-260 (2024) - 2022
- [j45]Jingyu Xin, Vir V. Phoha, Asif Salekin:
Combating False Data Injection Attacks on Human-Centric Sensing Applications. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(2): 83:1-83:22 (2022) - [j44]Shengmin Jin, Vir V. Phoha, Reza Zafarani:
Graph-Based Identification and Authentication: A Stochastic Kronecker Approach. IEEE Trans. Knowl. Data Eng. 34(7): 3282-3294 (2022) - 2021
- [j43]Md. Shafaeat Hossain, Kiran S. Balagani, Vir V. Phoha:
Effectiveness of symmetric rejection for a secure and user convenient multistage biometric system. Pattern Anal. Appl. 24(1): 49-60 (2021) - [j42]Md. Shafaeat Hossain, Vir V. Phoha:
Enhancing performance and user convenience of multi-biometric verification systems. Pattern Anal. Appl. 24(4): 1569-1582 (2021) - 2020
- [j41]Borui Li, Wei Wang, Yang Gao, Vir V. Phoha, Zhanpeng Jin:
Wrist in Motion: A Seamless Context-Aware Continuous Authentication Framework Using Your Clickings and Typings. IEEE Trans. Biom. Behav. Identity Sci. 2(3): 294-307 (2020) - [j40]Amith K. Belman, Vir V. Phoha:
Discriminative Power of Typing Features on Desktops, Tablets, and Phones for User Identification. ACM Trans. Priv. Secur. 23(1): 4:1-4:36 (2020) - 2019
- [j39]Changsheng Wan, Li Wang, Vir V. Phoha:
A Survey on Gait Recognition. ACM Comput. Surv. 51(5): 89:1-89:35 (2019) - [j38]Yang Gao, Wei Wang, Vir V. Phoha, Wei Sun, Zhanpeng Jin:
EarEcho: Using Ear Canal Echo for Wearable Authentication. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(3): 81:1-81:24 (2019) - [j37]Diksha Shukla, Vir V. Phoha:
Stealing Passwords by Observing Hands Movement. IEEE Trans. Inf. Forensics Secur. 14(12): 3086-3101 (2019) - 2018
- [j36]Changsheng Wan, Vir Virander Phoha, Daoli Huang:
TR-MCN: light weight task recommendation for mobile crowdsourcing networks. J. Ambient Intell. Humaniz. Comput. 9(4): 1027-1038 (2018) - [j35]Changsheng Wan, Vir Virander Phoha, Yuzhe Tang, Aiqun Hu:
Non-interactive Identity-Based Underwater Data Transmission With Anonymity and Zero Knowledge. IEEE Trans. Veh. Technol. 67(2): 1726-1739 (2018) - 2017
- [j34]Changsheng Wan, Vir Virander Phoha, Bei Pei, Changsong Chen:
Securing dynamic microgrid partition in the smart grid. Int. J. Distributed Sens. Networks 13(5) (2017) - 2016
- [j33]Abdul Serwadda, Vir V. Phoha, Zibo Wang, Rajesh Kumar, Diksha Shukla:
Toward Robotic Robbery on the Touch Screen. ACM Trans. Inf. Syst. Secur. 18(4): 14:1-14:25 (2016) - 2015
- [j32]Abdul Serwadda, Vir V. Phoha:
When Mice devour the Elephants: A DDoS attack against size-based scheduling schemes in the internet. Comput. Secur. 53: 31-43 (2015) - [j31]David Guy Brizan, Adam Goodkind, Patrick Koch, Kiran S. Balagani, Vir V. Phoha, Andrew Rosenberg:
Utilizing linguistically enhanced keystroke dynamics to predict typist cognition and demographics. Int. J. Hum. Comput. Stud. 82: 57-68 (2015) - 2014
- [j30]Ankunda R. Kiremire, Matthias R. Brust, Vir V. Phoha:
Using network motifs to investigate the influence of network topology on PPM-based IP traceback schemes. Comput. Networks 72: 14-32 (2014) - [j29]Jundong Chen, Ankunda R. Kiremire, Matthias R. Brust, Vir V. Phoha:
Modeling online social network users' profile attribute disclosure behavior from a game theoretic perspective. Comput. Commun. 49: 18-32 (2014) - [j28]Jundong Chen, Ankunda R. Kiremire, Matthias R. Brust, Vir V. Phoha:
A Game Theoretic Approach for Modeling Privacy Settings of an Online Social Network. EAI Endorsed Trans. Collab. Comput. 1(1): e4 (2014) - [j27]David Irakiza, Md. Enamul Karim, Vir V. Phoha:
A Non-Interactive Dual Channel Continuous Traffic Authentication Protocol. IEEE Trans. Inf. Forensics Secur. 9(7): 1133-1140 (2014) - 2013
- [j26]Abdul Serwadda, Zibo Wang, Patrick Koch, Sathya Govindarajan, Raviteja Pokala, Adam Goodkind, David Guy Brizan, Andrew Rosenberg, Vir V. Phoha, Kiran S. Balagani:
Scan-Based Evaluation of Continuous Keystroke Authentication Systems. IT Prof. 15(4): 20-23 (2013) - [j25]Khandaker Abir Rahman, Kiran S. Balagani, Vir V. Phoha:
Snoop-Forge-Replay Attacks on Continuous Verification With Keystrokes. IEEE Trans. Inf. Forensics Secur. 8(3): 528-541 (2013) - [j24]Justin L. Rice, Vir V. Phoha, Philip Robinson:
Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds. IEEE Trans. Inf. Forensics Secur. 8(6): 963-972 (2013) - [j23]Abdul Serwadda, Vir V. Phoha:
Examining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings. ACM Trans. Inf. Syst. Secur. 16(2): 8 (2013) - 2012
- [j22]Nitin Kanaskar, Remzi Seker, Jiang Bian, Vir V. Phoha:
Dynamical System Theory for the Detection of Anomalous Behavior in Computer Programs. IEEE Trans. Syst. Man Cybern. Part C 42(6): 1579-1589 (2012) - 2011
- [j21]P. T. Krishna Kumar, P. T. Vinod, Vir V. Phoha, S. Sitharama Iyengar, Puneeth Iyengar:
Design of a smart biomarker for bioremediation: A machine learning approach. Comput. Biol. Medicine 41(6): 357-360 (2011) - [j20]Kiran S. Balagani, Vir V. Phoha, Asok Ray, Shashi Phoha:
On the discriminability of keystroke feature vectors used in fixed text keystroke authentication. Pattern Recognit. Lett. 32(7): 1070-1080 (2011) - 2010
- [j19]Kiran S. Balagani, Vir V. Phoha:
On the Feature Selection Criterion Based on an Approximation of Multidimensional Mutual Information. IEEE Trans. Pattern Anal. Mach. Intell. 32(7): 1342-1343 (2010) - [j18]Kiran S. Balagani, Vir V. Phoha, S. Sitharama Iyengar, N. Balakrishnan:
On Guo and Nixon's Criterion for Feature Subset Selection: Assumptions, Implications, and Alternative Options. IEEE Trans. Syst. Man Cybern. Part A 40(3): 651-655 (2010) - 2009
- [j17]P. T. Krishna Kumar, Vir V. Phoha, S. S. Iyengar, Puneeth Iyengar:
Reduction of noise due to systematic uncertainties in 113mIn SPECT imaging using information theory. Comput. Biol. Medicine 39(5): 482-488 (2009) - [j16]Dimple Juneja, S. Sitharama Iyengar, Vir V. Phoha:
Fuzzy Evaluation of Agent-Based Semantic Match-Making Algorithm for Cyberspace. Int. J. Semantic Comput. 3(1): 57-76 (2009) - 2008
- [j15]P. T. Krishna Kumar, Vir V. Phoha, S. Sitharama Iyengar:
Classification of radio elements using mutual information: A tool for geological mapping. Int. J. Appl. Earth Obs. Geoinformation 10(3): 305-311 (2008) - 2007
- [j14]Kiran S. Balagani, Vir V. Phoha:
On the Relationship Between Dependence Tree Classification Error and Bayes Error Rate. IEEE Trans. Pattern Anal. Mach. Intell. 29(10): 1866-1868 (2007) - [j13]Shekhar R. Gaddam, Vir V. Phoha, Kiran S. Balagani:
K-Means+ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning Methods. IEEE Trans. Knowl. Data Eng. 19(3): 345-354 (2007) - 2005
- [j12]Yong Sheng, Vir V. Phoha, S. M. Rovnyak:
A parallel decision tree-based method for user authentication based on keystroke patterns. IEEE Trans. Syst. Man Cybern. Part B 35(4): 826-833 (2005) - 2004
- [j11]Santosh K. Rangarajan, Vir V. Phoha, Kiran S. Balagani, Rastko R. Selmic, S. Sitharama Iyengar:
Adaptive Neural Network Clustering of Web Users. Computer 37(4): 34-40 (2004) - [j10]Vir V. Phoha, Amit U. Nadgar, Asok Ray, Shashi Phoha:
Supervisory Control of Software Systems. IEEE Trans. Computers 53(9): 1187-1199 (2004) - 2002
- [j9]S. S. Iyengar, Vir V. Phoha, Yuyan Wu, Hla Min:
A New Efficient Edge Extraction Algorithm for Images Using Directional Tracing Techniques. Intell. Autom. Soft Comput. 8(3): 217-234 (2002) - [j8]Vir V. Phoha, S. Sitharama Iyengar, Rajgopal Kannan:
Faster Web Page Allocation with Neural Networks. IEEE Internet Comput. 6(6): 18-26 (2002) - 2001
- [j7]Vir V. Phoha:
The DMCA Needs Fixing. Commun. ACM 44(12): 33-34 (2001) - 1999
- [j6]Vir V. Phoha:
Can a Course Be Taught Entirely Via Email? Commun. ACM 42(9): 29-30 (1999) - 1998
- [j5]Vir V. Phoha:
Review of "Discrete Neural Networks: A Theoretical Foundation by Kai-Yeung Siu, Vwani Roychowdhury and Thomas Kailath", Prentice Hall PTR, 1995, ISBN 0-13-300708-1. SIGART Bull. 9(2): 29-30 (1998) - 1997
- [j4]Vir V. Phoha:
A Standard for Software Documentation. Computer 30(10): 97-98 (1997) - 1996
- [j3]Vir V. Phoha, William J. B. Oldham:
Image recovery and segmentation using competitive learning in a layered network. IEEE Trans. Neural Networks 7(4): 843-856 (1996) - [j2]Vir V. Phoha, William J. B. Oldham:
Corrections to "Image Recovery and Segmentation Using Competitive Learning in a Layered Network. IEEE Trans. Neural Networks 7(6): 1547 (1996) - 1995
- [j1]Vir V. Phoha:
Decision support and executive information systems : by Paul Gray (editor) (1994; Pages 469; Prentice Hall, Englewood Cliffs, NJ 07632, USA; ISBN 0-13-235789-5). Decis. Support Syst. 15(3): 247-248 (1995)
Conference and Workshop Papers
- 2023
- [c56]Mengyu Liu, Lin Zhang, Vir V. Phoha, Fanxin Kong:
Learn-to-Respond: Sequence-Predictive Recovery from Sensor Attacks in Cyber-Physical Systems. RTSS 2023: 78-91 - 2022
- [c55]Jiajing Chen, Huantao Ren, Frank Sicong Chen, Senem Velipasalar, Vir V. Phoha:
Gaitpoint: A Gait Recognition Network Based on Point Cloud Analysis. ICIP 2022: 1916-1920 - [c54]Xinyi Zhou, Kai Shu, Vir V. Phoha, Huan Liu, Reza Zafarani:
"This is Fake! Shared it by Mistake": Assessing the Intent of Fake News Spreaders. WWW 2022: 3685-3694 - 2021
- [c53]Amin Fallahi, Vir V. Phoha:
Adversarial Activity Detection Using Keystroke Acoustics. ESORICS (1) 2021: 626-648 - [c52]Prakash Shrestha, Nitesh Saxena, Diksha Shukla, Vir V. Phoha:
Press @$@$ to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing Gestures. EuroS&P 2021: 71-87 - 2019
- [c51]Shengmin Jin, Vir V. Phoha, Reza Zafarani:
Network Identification and Authentication. ICDM 2019: 1144-1149 - 2018
- [c50]Borui Li, Wei Wang, Yang Gao, Vir V. Phoha, Zhanpeng Jin:
Hand in Motion: Enhanced Authentication Through Wrist and Mouse Movement. BTAS 2018: 1-9 - [c49]Diksha Shukla, Guangcheng Wei, Donghua Xue, Zhanpeng Jin, Vir V. Phoha:
Body-Taps: Authenticating Your Device Through Few Simple Taps. BTAS 2018: 1-8 - [c48]Rajesh Kumar, Partha Pratim Kundu, Vir V. Phoha:
Continuous authentication using one-class classifiers and their fusion. ISBA 2018: 1-8 - [c47]Gayathri Manogna Parimi, Partha Pratim Kundu, Vir V. Phoha:
Analysis of head and torso movements for authentication. ISBA 2018: 1-8 - 2017
- [c46]Rajesh Kumar, Partha Pratim Kundu, Diksha Shukla, Vir V. Phoha:
Continuous user authentication via unlabeled phone movement patterns. IJCB 2017: 177-184 - [c45]Samuel W. Hincks, Sarah Bratt, Sujit Poudel, Vir V. Phoha, Robert J. K. Jacob, Daniel C. Dennett, Leanne M. Hirshfield:
Entropic Brain-computer Interfaces - Using fNIRS and EEG to Measure Attentional States in a Bayesian Framework. PhyCS 2017: 23-34 - [c44]Borui Li, Han Sun, Yang Gao, Vir V. Phoha, Zhanpeng Jin:
Enhanced free-text keystroke continuous authentication based on dynamics of wrist motion. WIFS 2017: 1-6 - 2016
- [c43]Rajesh Kumar, Vir V. Phoha, Abdul Serwadda:
Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns. BTAS 2016: 1-8 - [c42]Chunxu Tang, Vir V. Phoha:
An empirical evaluation of activities and classifiers for user identification on smartphones. BTAS 2016: 1-8 - 2015
- [c41]Rajesh Kumar, Vir V. Phoha, Anshumali Jain:
Treadmill attack on gait-based authentication systems. BTAS 2015: 1-7 - [c40]Sujit Poudel, Abdul Serwadda, Vir V. Phoha:
On humanoid robots imitating human touch gestures on the smart phone. BTAS 2015: 1-7 - [c39]Abena Primo, Vir V. Phoha:
Music and images as contexts in a context-aware touch-based authentication system. BTAS 2015: 1-7 - [c38]Abdul Serwadda, Vir V. Phoha, Sujit Poudel, Leanne M. Hirshfield, Danushka Bandara, Sarah E. Bratt, Mark R. Costa:
fNIRS: A new modality for brain activity-based biometric authentication. BTAS 2015: 1-7 - 2014
- [c37]Ankunda R. Kiremire, Matthias R. Brust, Vir V. Phoha:
Topology-dependent performance of attack graph reconstruction in PPM-based IP traceback. CCNC 2014: 363-370 - [c36]Diksha Shukla, Rajesh Kumar, Abdul Serwadda, Vir V. Phoha:
Beware, Your Hands Reveal Your Secrets! CCS 2014: 904-917 - [c35]Abena Primo, Vir V. Phoha, Rajesh Kumar, Abdul Serwadda:
Context-Aware Active Authentication Using Smartphone Accelerometer Measurements. CVPR Workshops 2014: 98-105 - [c34]Hilbert Locklear, Sathya Govindarajan, Zdenka Sitova, Adam Goodkind, David Guy Brizan, Andrew Rosenberg, Vir V. Phoha, Paolo Gasti, Kiran S. Balagani:
Continuous authentication with cognition-centric text production and revision features. IJCB 2014: 1-8 - [c33]Jaroslav Sedenka, Kiran S. Balagani, Vir V. Phoha, Paolo Gasti:
Privacy-preserving population-enhanced biometric key generation from free-text keystroke dynamics. IJCB 2014: 1-8 - 2013
- [c32]Abdul Serwadda, Vir V. Phoha, Zibo Wang:
Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms. BTAS 2013: 1-8 - [c31]Abdul Serwadda, Vir V. Phoha:
When kids' toys breach mobile phone security. CCS 2013: 599-610 - [c30]Jundong Chen, Matthias R. Brust, Ankunda R. Kiremire, Vir V. Phoha:
Modeling privacy settings of an online social network from a game-theoretical perspective. CollaborateCom 2013: 213-220 - [c29]Md. Shafaeat Hossain, Kiran S. Balagani, Vir V. Phoha:
On Controlling Genuine Reject Rate in Multi-stage Biometric Verification. CVPR Workshops 2013: 194-199 - [c28]David Irakiza, Md. Enamul Karim, Vir V. Phoha:
A Non-interactive Dual-channel Authentication Protocol for Assuring Pseudo-confidentiality. NDSS 2013 - 2012
- [c27]Md. Shafaeat Hossain, Kiran S. Balagani, Vir V. Phoha:
New impostor score based rejection methods for continuous keystroke verification with weak templates. BTAS 2012: 251-258 - [c26]Zibo Wang, Abdul Serwadda, Kiran S. Balagani, Vir V. Phoha:
Transforming animals in a cyber-behavioral biometric menagerie with Frog-Boiling attacks. BTAS 2012: 289-296 - [c25]Ankunda R. Kiremire, Matthias R. Brust, Vir V. Phoha:
A prediction based approach to IP traceback. LCN Workshops 2012: 1022-1029 - 2011
- [c24]Justin L. Rice, Vir V. Phoha, Pat Cappelaere, Dan Mandl:
Web Farm-inspired Computational Cluster in the Cloud. CloudCom 2011: 730-737 - [c23]Khandaker Abir Rahman, Kiran S. Balagani, Vir V. Phoha:
Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes. CVPR Workshops 2011: 31-38 - [c22]Christian A. Duncan, Vir V. Phoha:
On the Complexity of Aggregating Information for Authentication and Profiling. DPM/SETOP 2011: 58-71 - [c21]Abdul Serwadda, Vir V. Phoha, Ankunda R. Kiremire:
Using global knowledge of users' typing traits to attack keystroke biometrics templates. MM&Sec 2011: 51-60 - 2010
- [c20]Abdul Serwadda, Vir V. Phoha, Idris A. Rai:
Size-based scheduling: a recipe for DDOS? CCS 2010: 729-731 - 2009
- [c19]Gregory Vert, S. S. Iyengar, Vir V. Phoha:
Security models for contextual based global processing an architecture and overview. CSIIRW 2009: 53 - [c18]Md. Shafaeat Hossain, Khandaker Abir Rahman, Md. Hasanuzzaman, Vir V. Phoha:
A simple and efficient video image clustering algorithm for person specific query and image retrieval. ICIMCS 2009: 85-89 - [c17]Gregory Vert, S. Sitharama Iyengar, Vir V. Phoha:
Defining A New Type of Global Information Architecture for Contextual Information Processing. IKE 2009: 214-219 - [c16]Vasanth Iyer, S. Sitharama Iyengar, Garimella Rama Murthy, Bertrand Hochet, Vir V. Phoha, M. B. Srinivas:
Multi-hop scheduling and local data link aggregation dependant Qos in modeling and simulation of power-aware wireless sensor networks. IWCMC 2009: 844-848 - 2007
- [c15]Shrijit S. Joshi, Vir V. Phoha:
Competition between SOM Clusters to Model User Authentication System in Computer Networks. COMSWARE 2007 - [c14]Vir V. Phoha, Shashi Phoha:
Situation-Aware Software Engineering for Sensor Networks. COMSWARE 2007 - [c13]Yenumula B. Reddy, Vir V. Phoha:
Genetic Algorithm Approach for Resource Allocation in Multi-User OFDM Systems. COMSWARE 2007 - [c12]Kiran S. Balagani, Vir V. Phoha, Gopi K. Kuchimanchi:
A Divergence-measure Based Classification Method for Detecting Anomalies in Network Traffic. ICNSC 2007: 374-379 - 2005
- [c11]Brenda F. Miles, Vir V. Phoha:
The bipartite clique: a topological paradigm for WWWeb user search customization. ACM Southeast Regional Conference (1) 2005: 90-95 - [c10]Shrijit S. Joshi, Vir V. Phoha:
Investigating hidden Markov models capabilities in anomaly detection. ACM Southeast Regional Conference (1) 2005: 98-103 - [c9]Xin Xu, Weihua Song, Vir V. Phoha:
Early detection and propagation mitigation of worm programs. ACM Southeast Regional Conference (2) 2005: 193-194 - 2004
- [c8]Weihua Song, Vir V. Phoha:
Opinion Filtered Recommendation Trust Model in Peer-to-Peer Networks. AP2PC 2004: 237-244 - [c7]Weihua Song, Vir V. Phoha, Xin Xu:
An Adaptive Recommendation Trust Model in Multiagent System. IAT 2004: 462-465 - [c6]Weihua Song, Vir V. Phoha:
Neural Network-Based Reputation Model in a Distributed System. CEC 2004: 321-324 - 2003
- [c5]Vir Virander Phoha, Amit U. Nadgar, Asok Ray, Jinbo Fu, Shashi Phoha:
Supervisory control of software systems for fault mitigation. ACC 2003: 2229-2233 - [c4]Rastko R. Selmic, Vir V. Phoha, Frank L. Lewis:
Intelligent compensation of actuator nonlinearities. CDC 2003: 4327-4332 - 2002
- [c3]Wen Tian, Ben Choi, Vir V. Phoha:
An Adaptive Web Cache Access Predictor Using Neural Network. IEA/AIE 2002: 450-459 - 2001
- [c2]Yunjuan Xie, Vir V. Phoha:
Web user clustering from access log using belief function. K-CAP 2001: 202-208 - [c1]Vir V. Phoha:
An interactive dynamic model for integrating knowledge management methods and knowledge sharing technology in a traditional classroom. SIGCSE 2001: 144-148
Editorship
- 2009
- [e1]Sanjay Ranka, Srinivas Aluru, Rajkumar Buyya, Yeh-Ching Chung, Sumeet Dua, Ananth Grama, Sandeep K. S. Gupta, Rajeev Kumar, Vir V. Phoha:
Contemporary Computing - Second International Conference, IC3 2009, Noida, India, August 17-19, 2009. Proceedings. Communications in Computer and Information Science 40, Springer 2009, ISBN 978-3-642-03546-3 [contents]
Data and Artifacts
- 2020
- [d2]Amith K. Belman, Li Wang, Sundaraja Sitharama Iyengar, Pawel Sniatala, Robert Wright, Robert Dora, Jacob Baldwin, Zhanpeng Jin, Vir V. Phoha:
SU-AIS BB-MAS (Syracuse University and Assured Information Security - Behavioral Biometrics Multi-device and multi-Activity data from Same users) Dataset. IEEE DataPort, 2020 - 2019
- [d1]Diksha Shukla, Frank Sicong Chen, Yao Lu, Partha Pratim Kundu, Ravichandra Malapati, Sujit Poudel, Zhanpeng Jin, Vir Virander Phoha:
Brain Signals and the Corresponding Hand Movement Signals Dataset (BS-HMS-Dataset). IEEE DataPort, 2019
Informal and Other Publications
- 2022
- [i11]Xinyi Zhou, Kai Shu, Vir V. Phoha, Huan Liu, Reza Zafarani:
"This is Fake! Shared it by Mistake": Assessing the Intent of Fake News Spreaders. CoRR abs/2202.04752 (2022) - [i10]Frank Sicong Chen, Amith K. Belman, Vir V. Phoha:
Formalizing PQRST Complex in Accelerometer-based Gait Cycle for Authentication. CoRR abs/2205.07108 (2022) - 2020
- [i9]Rajesh Kumar, Can Isik, Vir V. Phoha:
Treadmill Assisted Gait Spoofing (TAGS): An Emerging Threat to wearable Sensor-based Gait Authentication. CoRR abs/2012.09950 (2020) - 2019
- [i8]Xinyi Zhou, Atishay Jain, Vir V. Phoha, Reza Zafarani:
Fake News Early Detection: A Theory-driven Model. CoRR abs/1904.11679 (2019) - [i7]Amith K. Belman, Li Wang, S. S. Iyengar, Pawel Sniatala, Robert Wright, Robert Dora, Jacob Baldwin, Zhanpeng Jin, Vir V. Phoha:
Insights from BB-MAS - A Large Dataset for Typing, Gait and Swipes of the Same Person on Desktop, Tablet and Phone. CoRR abs/1912.02736 (2019) - 2018
- [i6]Md. Enamul Karim, Kiran S. Balagani, Aaron Elliott, David Irakiza, Mike O'Neal, Vir V. Phoha:
Active Authentication of Keyboard Users: Performance Evaluation on 736 Subjects. CoRR abs/1804.08180 (2018) - 2017
- [i5]Rajesh Kumar, Partha Pratim Kundu, Diksha Shukla, Vir V. Phoha:
Continuous User Authentication via Unlabeled Phone Movement Patterns. CoRR abs/1708.04399 (2017) - [i4]Rajesh Kumar, Partha Pratim Kundu, Vir V. Phoha:
Continuous Authentication Using One-class Classifiers and their Fusion. CoRR abs/1710.11075 (2017) - 2016
- [i3]Rajesh Kumar, Vir V. Phoha, Rahul Raina:
Authenticating users through their arm movement patterns. CoRR abs/1603.02211 (2016) - [i2]Ricky Laishram, Vir Virander Phoha:
Curie: A method for protecting SVM Classifier from Poisoning Attack. CoRR abs/1606.01584 (2016) - 2014
- [i1]Jaroslav Sedenka, Kiran S. Balagani, Vir V. Phoha, Paolo Gasti:
Privacy-Preserving Population-Enhanced Biometric Key Generation from Free-Text Keystroke Dynamics. CoRR abs/1407.4179 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint