default search action
Kiran S. Balagani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Nicholas Cariello, Seth Levine, Gang Zhou, Blair Hoplight, Paolo Gasti, Kiran S. Balagani:
SMARTCOPE: Smartphone Change Of Possession Evaluation for continuous authentication. Pervasive Mob. Comput. 97: 101873 (2024) - 2022
- [c13]Kiran S. Balagani, Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Gene Tsudik:
We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads. ESORICS (1) 2022: 633-652 - 2021
- [j20]Md. Shafaeat Hossain, Kiran S. Balagani, Vir V. Phoha:
Effectiveness of symmetric rejection for a secure and user convenient multistage biometric system. Pattern Anal. Appl. 24(1): 49-60 (2021) - 2020
- [j19]Santhanakrishnan Anand, Ding Ding, Paolo Gasti, Mike O'Neal, Mauro Conti, Kiran S. Balagani:
DISPERSE: A Decentralized Architecture for Content Replication Resilient to Node Failures. IEEE Trans. Netw. Serv. Manag. 17(1): 201-212 (2020) - [c12]Matteo Cardaioli, Mauro Conti, Kiran S. Balagani, Paolo Gasti:
Your PIN Sounds Good! Augmentation of PIN Guessing Strategies via Audio Leakage. ESORICS (1) 2020: 720-735
2010 – 2019
- 2019
- [j18]Kiran S. Balagani, Matteo Cardaioli, Mauro Conti, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin, Eugen Saraci, Gene Tsudik, Lynn Wu:
PILOT: Password and PIN information leakage from obfuscated typing videos. J. Comput. Secur. 27(4): 405-425 (2019) - [j17]Qing Yang, Ge Peng, Paolo Gasti, Kiran S. Balagani, Yantao Li, Gang Zhou:
MEG: Memory and Energy Efficient Garbled Circuit Evaluation on Smartphones. IEEE Trans. Inf. Forensics Secur. 14(4): 913-922 (2019) - [i5]Kiran S. Balagani, Matteo Cardaioli, Mauro Conti, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin, Eugen Saraci, Gene Tsudik, Lynn Wu:
PILOT: Password and PIN Information Leakage from Obfuscated Typing Videos. CoRR abs/1904.00188 (2019) - [i4]Matteo Cardaioli, Mauro Conti, Kiran S. Balagani, Paolo Gasti:
Your PIN Sounds Good! On The Feasibility of PIN Inference Through Audio Leakage. CoRR abs/1905.08742 (2019) - 2018
- [j16]Qing Yang, Paolo Gasti, Kiran S. Balagani, Yantao Li, Gang Zhou:
USB side-channel attack on Tor. Comput. Networks 141: 57-66 (2018) - [j15]Kiran S. Balagani, Paolo Gasti, Aaron Elliott, Azriel Richardson, Mike O'Neal:
The impact of application context on privacy and performance of keystroke authentication systems. J. Comput. Secur. 26(4): 543-556 (2018) - [c11]Kiran S. Balagani, Mauro Conti, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin, Eugen Saraci, Gene Tsudik, Lynn Wu:
SILK-TV: Secret Information Leakage from Keystroke Timing Videos. ESORICS (1) 2018: 263-280 - [i3]Md. Enamul Karim, Kiran S. Balagani, Aaron Elliott, David Irakiza, Mike O'Neal, Vir V. Phoha:
Active Authentication of Keyboard Users: Performance Evaluation on 736 Subjects. CoRR abs/1804.08180 (2018) - 2017
- [j14]Thaier Hayajneh, Sana Ullah, Bassam Jamil Mohd, Kiran S. Balagani:
An Enhanced WLAN Security System With FPGA Implementation for Multimedia Applications. IEEE Syst. J. 11(4): 2536-2545 (2017) - [j13]Qing Yang, Paolo Gasti, Gang Zhou, Aydin Farajidavar, Kiran S. Balagani:
On Inferring Browsing Activity on Smartphones via USB Power Analysis Side-Channel. IEEE Trans. Inf. Forensics Secur. 12(5): 1056-1066 (2017) - 2016
- [j12]Zdenka Sitova, Jaroslav Sedenka, Qing Yang, Ge Peng, Gang Zhou, Paolo Gasti, Kiran S. Balagani:
HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users. IEEE Trans. Inf. Forensics Secur. 11(5): 877-892 (2016) - [j11]Paolo Gasti, Jaroslav Sedenka, Qing Yang, Gang Zhou, Kiran S. Balagani:
Secure, Fast, and Energy-Efficient Outsourced Authentication for Smartphones. IEEE Trans. Inf. Forensics Secur. 11(11): 2556-2571 (2016) - 2015
- [j10]David Guy Brizan, Adam Goodkind, Patrick Koch, Kiran S. Balagani, Vir V. Phoha, Andrew Rosenberg:
Utilizing linguistically enhanced keystroke dynamics to predict typist cognition and demographics. Int. J. Hum. Comput. Stud. 82: 57-68 (2015) - [j9]Jaroslav Sedenka, Sathya Govindarajan, Paolo Gasti, Kiran S. Balagani:
Secure Outsourced Biometric Authentication With Performance Evaluation on Smartphones. IEEE Trans. Inf. Forensics Secur. 10(2): 384-396 (2015) - [i2]Zdenka Sitova, Jaroslav Sedenka, Qing Yang, Ge Peng, Gang Zhou, Paolo Gasti, Kiran S. Balagani:
HMOG: A New Biometric Modality for Continuous Authentication of Smartphone Users. CoRR abs/1501.01199 (2015) - 2014
- [c10]Rui Wang, Zdenka Sitova, Xiaoqing Jia, Xiang He, Tobi Abramson, Paolo Gasti, Kiran S. Balagani, Aydin Farajidavar:
Automatic identification of solid-phase medication intake using wireless wearable accelerometers. EMBC 2014: 4168-4171 - [c9]Hilbert Locklear, Sathya Govindarajan, Zdenka Sitova, Adam Goodkind, David Guy Brizan, Andrew Rosenberg, Vir V. Phoha, Paolo Gasti, Kiran S. Balagani:
Continuous authentication with cognition-centric text production and revision features. IJCB 2014: 1-8 - [c8]Jaroslav Sedenka, Kiran S. Balagani, Vir V. Phoha, Paolo Gasti:
Privacy-preserving population-enhanced biometric key generation from free-text keystroke dynamics. IJCB 2014: 1-8 - [c7]Qing Yang, Ge Peng, David T. Nguyen, Xin Qi, Gang Zhou, Zdenka Sitova, Paolo Gasti, Kiran S. Balagani:
A multimodal data set for evaluating continuous authentication performance in smartphones. SenSys 2014: 358-359 - [i1]Jaroslav Sedenka, Kiran S. Balagani, Vir V. Phoha, Paolo Gasti:
Privacy-Preserving Population-Enhanced Biometric Key Generation from Free-Text Keystroke Dynamics. CoRR abs/1407.4179 (2014) - 2013
- [j8]Abdul Serwadda, Zibo Wang, Patrick Koch, Sathya Govindarajan, Raviteja Pokala, Adam Goodkind, David Guy Brizan, Andrew Rosenberg, Vir V. Phoha, Kiran S. Balagani:
Scan-Based Evaluation of Continuous Keystroke Authentication Systems. IT Prof. 15(4): 20-23 (2013) - [j7]Khandaker Abir Rahman, Kiran S. Balagani, Vir V. Phoha:
Snoop-Forge-Replay Attacks on Continuous Verification With Keystrokes. IEEE Trans. Inf. Forensics Secur. 8(3): 528-541 (2013) - [c6]Sathya Govindarajan, Paolo Gasti, Kiran S. Balagani:
Secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users with touch data. BTAS 2013: 1-8 - [c5]Md. Shafaeat Hossain, Kiran S. Balagani, Vir V. Phoha:
On Controlling Genuine Reject Rate in Multi-stage Biometric Verification. CVPR Workshops 2013: 194-199 - 2012
- [c4]Md. Shafaeat Hossain, Kiran S. Balagani, Vir V. Phoha:
New impostor score based rejection methods for continuous keystroke verification with weak templates. BTAS 2012: 251-258 - [c3]Zibo Wang, Abdul Serwadda, Kiran S. Balagani, Vir V. Phoha:
Transforming animals in a cyber-behavioral biometric menagerie with Frog-Boiling attacks. BTAS 2012: 289-296 - 2011
- [j6]Kiran S. Balagani, Vir V. Phoha, Asok Ray, Shashi Phoha:
On the discriminability of keystroke feature vectors used in fixed text keystroke authentication. Pattern Recognit. Lett. 32(7): 1070-1080 (2011) - [c2]Khandaker Abir Rahman, Kiran S. Balagani, Vir V. Phoha:
Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes. CVPR Workshops 2011: 31-38 - 2010
- [j5]Kiran S. Balagani, Vir V. Phoha:
On the Feature Selection Criterion Based on an Approximation of Multidimensional Mutual Information. IEEE Trans. Pattern Anal. Mach. Intell. 32(7): 1342-1343 (2010) - [j4]Kiran S. Balagani, Vir V. Phoha, S. Sitharama Iyengar, N. Balakrishnan:
On Guo and Nixon's Criterion for Feature Subset Selection: Assumptions, Implications, and Alternative Options. IEEE Trans. Syst. Man Cybern. Part A 40(3): 651-655 (2010)
2000 – 2009
- 2007
- [j3]Kiran S. Balagani, Vir V. Phoha:
On the Relationship Between Dependence Tree Classification Error and Bayes Error Rate. IEEE Trans. Pattern Anal. Mach. Intell. 29(10): 1866-1868 (2007) - [j2]Shekhar R. Gaddam, Vir V. Phoha, Kiran S. Balagani:
K-Means+ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning Methods. IEEE Trans. Knowl. Data Eng. 19(3): 345-354 (2007) - [c1]Kiran S. Balagani, Vir V. Phoha, Gopi K. Kuchimanchi:
A Divergence-measure Based Classification Method for Detecting Anomalies in Network Traffic. ICNSC 2007: 374-379 - 2004
- [j1]Santosh K. Rangarajan, Vir V. Phoha, Kiran S. Balagani, Rastko R. Selmic, S. Sitharama Iyengar:
Adaptive Neural Network Clustering of Web Users. Computer 37(4): 34-40 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint