Year |
Citation |
Score |
2020 |
Belman AK, Phoha VV. Discriminative Power of Typing Features on Desktops, Tablets, and Phones for User Identification Acm Transactions On Privacy and Security. 23: 1-36. DOI: 10.1145/3377404 |
0.307 |
|
2020 |
Hossain S, Balagani KS, Phoha VV. Effectiveness of symmetric rejection for a secure and user convenient multistage biometric system Pattern Analysis and Applications. 1-12. DOI: 10.1007/S10044-020-00899-0 |
0.422 |
|
2019 |
Shukla D, Phoha VV. Stealing Passwords by Observing Hands Movement Ieee Transactions On Information Forensics and Security. 14: 3086-3101. DOI: 10.1109/Tifs.2019.2911171 |
0.409 |
|
2018 |
Wan C, Phoha VV, Huang D. TR-MCN: light weight task recommendation for mobile crowdsourcing networks Journal of Ambient Intelligence and Humanized Computing. 9: 1027-1038. DOI: 10.1007/S12652-017-0505-5 |
0.452 |
|
2017 |
Wan C, Phoha VV, Pei B, Chen C. Securing dynamic microgrid partition in the smart grid International Journal of Distributed Sensor Networks. 13: 155014771771113. DOI: 10.1177/1550147717711136 |
0.363 |
|
2017 |
Wan C, Phoha VV, Tang Y, Hu A. Non-interactive Identity-Based Underwater Data Transmission With Anonymity and Zero Knowledge Ieee Transactions On Vehicular Technology. 67: 1726-1739. DOI: 10.1109/Tvt.2017.2757500 |
0.401 |
|
2017 |
Kumar R, Kundu PP, Shukla D, Phoha VV. Continuous user authentication via unlabeled phone movement patterns International Journal of Central Banking. 177-184. DOI: 10.1109/Btas.2017.8272696 |
0.51 |
|
2016 |
Serwadda A, Phoha VV, Wang Z, Kumar R, Shukla D. Toward robotic robbery on the touch screen Acm Transactions On Information and System Security. 18. DOI: 10.1145/2898353 |
0.797 |
|
2015 |
Kumar R, Phoha VV, Jain A. Treadmill attack on gait-based authentication systems 2015 Ieee 7th International Conference On Biometrics Theory, Applications and Systems, Btas 2015. DOI: 10.1109/BTAS.2015.7358801 |
0.404 |
|
2015 |
Poudel S, Serwadda A, Phoha VV. On humanoid robots imitating human touch gestures on the smart phone 2015 Ieee 7th International Conference On Biometrics Theory, Applications and Systems, Btas 2015. DOI: 10.1109/BTAS.2015.7358781 |
0.762 |
|
2015 |
Primo A, Phoha VV. Music and images as contexts in a context-aware touch-based authentication system 2015 Ieee 7th International Conference On Biometrics Theory, Applications and Systems, Btas 2015. DOI: 10.1109/BTAS.2015.7358779 |
0.393 |
|
2015 |
Serwadda A, Phoha VV, Poudel S, Hirshfield LM, Bandara D, Bratt SE, Costa MR. FNIRS: A new modality for brain activity-based biometric authentication 2015 Ieee 7th International Conference On Biometrics Theory, Applications and Systems, Btas 2015. DOI: 10.1109/BTAS.2015.7358763 |
0.762 |
|
2015 |
Serwadda A, Phoha VV. When mice devour the elephants: A DDoS attack against size-based scheduling schemes in the internet Computers and Security. 53: 31-43. DOI: 10.1016/J.Cose.2015.04.014 |
0.784 |
|
2014 |
Shukia D, Kumar R, Phoha VV, Serwadda A. Beware, your hands reveal your secrets ! Proceedings of the Acm Conference On Computer and Communications Security. 904-917. DOI: 10.1145/2660267.2660360 |
0.771 |
|
2014 |
Irakiza D, Karim ME, Phoha VV. A non-interactive dual channel continuous traffic authentication protocol Ieee Transactions On Information Forensics and Security. 9: 1133-1140. DOI: 10.1109/Tifs.2014.2323700 |
0.73 |
|
2014 |
Primo A, Phoha VV, Kumar R, Serwadda A. Context-aware active authentication using smartphone accelerometer measurements Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops. 98-105. DOI: 10.1109/CVPRW.2014.20 |
0.806 |
|
2014 |
Kiremire AR, Brust MR, Phoha VV. Topology-dependent performance of attack graph reconstruction in PPM-based IP traceback 2014 Ieee 11th Consumer Communications and Networking Conference, Ccnc 2014. 363-370. DOI: 10.1109/CCNC.2014.6866596 |
0.784 |
|
2014 |
Šeděnka J, Gasti P, Phoha V, Balagani KS. Privacy-preserving population-enhanced biometric key generation from free-text keystroke dynamics International Journal of Central Banking. 1-8. DOI: 10.1109/Btas.2014.6996244 |
0.467 |
|
2014 |
Locklear H, Govindarajan S, Sitova Z, Goodkind A, Brizan DG, Rosenberg A, Phoha VV, Gasti P, Balagani KS. Continuous authentication with cognition-centric text production and revision features Ijcb 2014 - 2014 Ieee/Iapr International Joint Conference On Biometrics. DOI: 10.1109/Btas.2014.6996227 |
0.397 |
|
2014 |
Kiremire AR, Brust MR, Phoha VV. Using network motifs to investigate the influence of network topology on PPM-based IP traceback schemes Computer Networks. 72: 14-32. DOI: 10.1016/J.Comnet.2014.07.005 |
0.778 |
|
2014 |
Chen J, Kiremire AR, Brust MR, Phoha VV. Modeling online social network users' profile attribute disclosure behavior from a game theoretic perspective Computer Communications. 49: 18-32. DOI: 10.1016/J.Comcom.2014.05.001 |
0.76 |
|
2013 |
Chen J, Brust MR, Kiremire AR, Phoha VV. Modeling privacy settings of an online social network from a game-theoretical perspective Proceedings of the 9th Ieee International Conference On Collaborative Computing: Networking, Applications and Worksharing, Collaboratecom 2013. 213-220. DOI: 10.4108/icst.collaboratecom.2013.254054 |
0.795 |
|
2013 |
Serwadda A, Phoha VV. Examining a large keystroke biometrics dataset for statistical-attack openings Acm Transactions On Information and System Security. 16. DOI: 10.1145/2516960 |
0.81 |
|
2013 |
Serwadda A, Phoha VV. When kids' toys breach mobile phone security Proceedings of the Acm Conference On Computer and Communications Security. 599-610. DOI: 10.1145/2508859.2516659 |
0.752 |
|
2013 |
Rice JL, Phoha VV, Robinson P. Using mussel-inspired self-organization and account proxies to obfuscate workload ownership and placement in clouds Ieee Transactions On Information Forensics and Security. 8: 963-972. DOI: 10.1109/Tifs.2013.2259158 |
0.707 |
|
2013 |
Rahman KA, Balagani KS, Phoha VV. Snoop-forge-replay attacks on continuous verification with keystrokes Ieee Transactions On Information Forensics and Security. 8: 528-541. DOI: 10.1109/Tifs.2013.2244091 |
0.691 |
|
2013 |
Serwadda A, Wang Z, Koch P, Govindarajan S, Pokala R, Goodkind A, Brizan DG, Rosenberg A, Phoha VV, Balagani K. Scan-based evaluation of continuous keystroke authentication systems It Professional. 15: 20-23. DOI: 10.1109/Mitp.2013.51 |
0.745 |
|
2013 |
Serwadda A, Phoha VV, Wang Z. Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms Ieee 6th International Conference On Biometrics: Theory, Applications and Systems, Btas 2013. DOI: 10.1109/BTAS.2013.6712758 |
0.771 |
|
2012 |
Kiremire AR, Brust MR, Phoha VV. A prediction based approach to IP traceback Proceedings - Conference On Local Computer Networks, Lcn. 1022-1029. DOI: 10.1109/LCNW.2012.6424039 |
0.778 |
|
2012 |
Wang Z, Serwadda A, Balagani KS, Phoha VV. Transforming animals in a cyber-behavioral biometric menagerie with Frog-Boiling attacks 2012 Ieee 5th International Conference On Biometrics: Theory, Applications and Systems, Btas 2012. 289-296. DOI: 10.1109/BTAS.2012.6374591 |
0.81 |
|
2011 |
Serwadda A, Phoha VV, Kiremire A. Using global knowledge of users' typing traits to attack keystroke biometrics templates Mm and Sec'11 - Proceedings of the 2011 Acm Sigmm Multimedia and Security Workshop. 51-59. DOI: 10.1145/2037252.2037263 |
0.799 |
|
2011 |
Rahman KA, Balagani KS, Phoha VV. Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops. DOI: 10.1109/CVPRW.2011.5981729 |
0.581 |
|
2011 |
Rice JL, Phoha VV, Cappelaere P, Mandl D. Web farm-inspired computational cluster in the cloud Proceedings - 2011 3rd Ieee International Conference On Cloud Computing Technology and Science, Cloudcom 2011. 730-737. DOI: 10.1109/CloudCom.2011.113 |
0.581 |
|
2011 |
Balagani KS, Phoha VV, Ray A, Phoha S. On the discriminability of keystroke feature vectors used in fixed text keystroke authentication Pattern Recognition Letters. 32: 1070-1080. DOI: 10.1016/J.Patrec.2011.02.014 |
0.319 |
|
2010 |
Serwadda A, Phoha VV, Rai IA. Size-based scheduling: A recipe for DDOS? Proceedings of the Acm Conference On Computer and Communications Security. 729-731. DOI: 10.1145/1866307.1866412 |
0.75 |
|
2009 |
Hossain MS, Rahman KA, Hasanuzzaman M, Phoha VV. A simple and efficient video image clustering algorithm for person specific query and image retrieval 1st International Conference On Internet Multimedia Computing and Service, Icimcs 2009. 85-89. DOI: 10.1145/1734605.1734628 |
0.592 |
|
2009 |
Karim ME, Phoha VV, Sultan MA. An immunological model for detecting bot activities Proceedings of Spie - the International Society For Optical Engineering. 7352. DOI: 10.1117/12.819073 |
0.321 |
|
2009 |
Shrestha S, Agarwal M, Phoha VV, Varahramyan K. A chipless sensor tag-based RFID technology for cyber-oriented environmental sensing applications Proceedings of Spie - the International Society For Optical Engineering. 7352. DOI: 10.1117/12.818293 |
0.304 |
|
2009 |
Shadrach DC, Balagani KS, Phoha VV. A weighted metric based adaptive algorithm for web server load balancing 3rd International Symposium On Intelligent Information Technology Application, Iita 2009. 1: 449-452. DOI: 10.1109/IITA.2009.84 |
0.327 |
|
2007 |
Joshi SS, Phoha VV. Competition between SOM clusters to model user authentication system in computer networks Proceedings of the 2007 2nd International Conference On Communication System Software and Middleware and Workshops, Comsware 2007. DOI: 10.1109/COMSWA.2007.382421 |
0.392 |
|
2005 |
Miles BF, Phoha VV. The bipartite clique-a topological paradigm for WWWeb user search customization Proceedings of the Annual Southeast Conference. 1: 190-195. DOI: 10.1145/1167350.1167385 |
0.356 |
|
2005 |
Sheng Y, Phoha VV, Rovnyak SM. A parallel decision tree-based method for user authentication based on keystroke patterns Ieee Transactions On Systems, Man, and Cybernetics, Part B: Cybernetics. 35: 826-833. DOI: 10.1109/TSMCB.2005.846648 |
0.333 |
|
2005 |
Song W, Phoha VV. Opinion filtered recommendation trust model in peer-to-peer networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3601: 237-244. DOI: 10.1007/11574781_23 |
0.38 |
|
2004 |
Rangarajan SK, Phoha VV, Balagani KS, Selmic RR, Iyengar SS. Adaptive neural network clustering of web users Computer. 37: 34-40. DOI: 10.1109/Mc.2004.1297299 |
0.426 |
|
2001 |
Xie Y, Phoha VV. Web user clustering from access log using belief function Proceedings of the First International Conference On Knowledge Capture. 202-208. |
0.33 |
|
Show low-probability matches. |