Umut Topkara

Affiliations:
  • Purdue University, West Lafayette, USA


According to our database1, Umut Topkara authored at least 24 papers between 2002 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Human Distinguishable Visual Key Fingerprints.
Proceedings of the 29th USENIX Security Symposium, 2020

2017
Video Liveness for Citizen Journalism: Attacks and Defenses.
IEEE Trans. Mob. Comput., 2017

Camera Based Two Factor Authentication Through Mobile and Wearable Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017

A Secure Mobile Authentication Alternative to Biometrics.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Movee: Video Liveness Verification for Mobile Devices Using Built-In Motion Sensors.
IEEE Trans. Mob. Comput., 2016

Secure Management of Low Power Fitness Trackers.
IEEE Trans. Mob. Comput., 2016

2015
Enabling Multiple QR Codes in Close Proximity.
CoRR, 2015

Liveness verifications for citizen journalism videos.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

2014
SensCrypt: A Secure Protocol for Managing Low Power Fitness Trackers.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

2013
Runtime adaptive multi-factor authentication for mobile devices.
IBM J. Res. Dev., 2013

Seeing is not believing: visual verifications through liveness analysis using mobile devices.
Proceedings of the Annual Computer Security Applications Conference, 2013

2011
ACE-Cost: Acquisition Cost Efficient Classifier by Hybrid Decision Tree with Local SVM Leaves.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2011

2009
CoCoST: A Computational Cost Efficient Classifier.
Proceedings of the ICDM 2009, 2009

2007
Passwords for Everyone: Secure Mnemonic-based Accessible Authentication.
Proceedings of the 2007 USENIX Annual Technical Conference, 2007

Information hiding through errors: a confusing approach.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Passwords decay, words endure: secure and re-usable multiple password mnemonics.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

2006
Pairwise Alignment of Protein Interaction Networks.
J. Comput. Biol., 2006

Inferring functional information from domain co-evolution.
Bioinform., 2006

Attacks on lexical natural language steganography systems.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions.
Proceedings of the 8th workshop on Multimedia & Security, 2006

2005
Have the cake and eat it too - Infusing usability into text-password based authentication systems.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
A hierarchical protocol for increasing the stealthiness of steganographic methods.
Proceedings of the 6th workshop on Multimedia & Security, 2004

2002
Natural Language Watermarking and Tamperproofing.
Proceedings of the Information Hiding, 5th International Workshop, 2002

Towards Universal Speech Recognition.
Proceedings of the 4th IEEE International Conference on Multimodal Interfaces (ICMI 2002), 2002


  Loading...