2025
Explainable Face Recognition via Improved Localization.
CoRR, May, 2025
An Empirical Study on the Capability of LLMs in Decomposing Bug Reports.
CoRR, April, 2025
Physics-Aware POD-Based Learning for Ab initio QEM-Galerkin Simulations of Periodic Nanostructures.
CoRR, January, 2025
Impact of Data Breadth and Depth on Performance of Siamese Neural Network Model: Experiments with Three Keystroke Dynamic Datasets.
CoRR, January, 2025
Evaluating Keystroke Dynamics Performance in e-Commerce.
Proceedings of the 11th International Conference on Information Systems Security and Privacy, 2025
User-Specific Feature Selection in Keystroke Dynamics Authentication.
Proceedings of the 22nd IEEE Consumer Communications & Networking Conference, 2025
2024
Mouse Dynamics Behavioral Biometrics: A Survey.
ACM Comput. Surv., June, 2024
Deepfake Attacks on Biometric Recognition: Evaluation of Resistance to Injection Attacks.
Proceedings of the 15th IEEE Annual Ubiquitous Computing, 2024
A Novel Keystroke Dataset for Preventing Advanced Persistent Threats.
Proceedings of the 13th International Conference on Pattern Recognition Applications and Methods, 2024
A large-scale study of performance and equity of commercial remote identity verification technologies across demographics.
Proceedings of the IEEE International Joint Conference on Biometrics, 2024
Providing Technical Support to Sustain Student Motivation and Engagement in Software Engineering Project-Based Learning.
Proceedings of the IEEE Frontiers in Education Conference, 2024
An Exploratory Comparative Study on the Impacts of Technical Support on Student Successes in Computing Project-Based Learning.
Proceedings of the IEEE Frontiers in Education Conference, 2024
2023
Stationary mobile behavioral biometrics: A survey.
Comput. Secur., May, 2023
Deep Learning-Based Approaches for Contactless Fingerprints Segmentation and Extraction.
CoRR, 2023
Keystroke Dynamics: Concepts, Techniques, and Applications.
CoRR, 2023
A Hybrid Optimization and Deep Learning Algorithm for Cyber-resilient DER Control.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2023
When Simple Statistical Algorithms Outperform Deep Learning: A Case of Keystroke Dynamics.
Proceedings of the 12th International Conference on Pattern Recognition Applications and Methods, 2023
Mapping Learning Objectives of Project-Based Undergraduate Software Engineering Courses to CC2020 Competency Model.
Proceedings of the IEEE Frontiers in Education Conference, 2023
The Importance of Project-Scale Scaffolding for Retention and Experience in Computing Courses.
Proceedings of the IEEE Frontiers in Education Conference, 2023
The 2023 DREE Workshop on Designing and Running Project-Based Courses in Software Engineering Education.
Proceedings of the IEEE Frontiers in Education Conference, 2023
A User Study of Keystroke Dynamics as Second Factor in Web MFA.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
Multi-Modality Mobile Datasets for Behavioral Biometrics Research: Data/Toolset paper.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
User Authentication by Fusion of Mouse Dynamics and Widget Interactions: Two Experiments with PayPal and Facebook.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023
Impact of Data Breadth and Depth on Performance of Siamese Neural Network Model: Experiments with Two Behavioral Biometric Datasets.
Proceedings of the 22nd International Conference of the Biometrics Special Interest Group, 2023
Statistical Methods for Testing Equity of False Non Match Rates Across Multiple Demographic Groups.
Proceedings of the 22nd International Conference of the Biometrics Special Interest Group, 2023
2022
Securing Account Recovery Mechanism on Desktop Computers and Mobile Phones with Keystroke Dynamics.
SN Comput. Sci., 2022
Channel Reduction for an EEG-Based Authentication System While Performing Motor Movements.
Sensors, 2022
Machine Learning at the Network Edge: A Survey.
ACM Comput. Surv., 2022
Mouse Dynamics Behavioral Biometrics: A Survey.
CoRR, 2022
Evaluating multi-modal mobile behavioral biometrics using public datasets.
Comput. Secur., 2022
Statistical Methods for Assessing Differences in False Non-match Rates Across Demographic Groups.
Proceedings of the Pattern Recognition, Computer Vision, and Image Processing. ICPR 2022 International Workshops and Challenges, 2022
Shared Multi-Keyboard and Bilingual Datasets to Support Keystroke Dynamics Research.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
2021
Cyber Physical Grid-Interactive Distributed Energy Resources Control for VPP Dispatch and Regulation.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Europe, 2021
Utilizing Keystroke Dynamics as Additional Security Measure to Protect Account Recovery Mechanism.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
Continuous Authentication based on Hand Micro-movement during Smartphone Form Filling by Seated Human Subjects.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
Study of Intra- and Inter-user Variance in Password Keystroke Dynamics.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
Group Leakage Overestimates Performance: A Case Study in Keystroke Dynamics.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2021
Authenticating Facebook Users Based on Widget Interaction Behavior.
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021
2020
Fast Free-Text Authentication via Instance-Based Keystroke Dynamics.
IEEE Trans. Biom. Behav. Identity Sci., 2020
2019
Removing Personally Identifiable Information from Shared Dataset for Keystroke Authentication Research.
Proceedings of the 5th IEEE International Conference on Identity, 2019
Fast Continuous User Authentication Using Distance Metric Fusion of Free-Text Keystroke Data.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2019
Fast and Accurate Continuous User Authentication by Fusion of Instance-based, Free-text Keystroke Dynamics.
Proceedings of the 2019 International Conference of the Biometrics Special Interest Group, 2019
Toward Industry Oriented Software Engineering Project Course: A Pilot Study.
Proceedings of the 2nd Software Engineering Education Workshop 2019 co-located with 26th Asia Pacific Software Engineering Conference, 2019
2018
Occupancy Detection in Smart Housing Using Both Aggregated and Appliance-Specific Power Consumption Data.
Proceedings of the 17th IEEE International Conference on Machine Learning and Applications, 2018
2017
Benchmarking keystroke authentication algorithms.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017
Home appliance detection from aggregated energy consumption data on a single circuit.
Proceedings of the 2017 IEEE SmartWorld, 2017
FEMIR: a tool for recommending framework extension examples.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017
A practical evaluation of free-text keystroke dynamics.
Proceedings of the IEEE International Conference on Identity, 2017
Recommending Framework Extension Examples.
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017
Home Appliance Energy Disaggregation Using Low Frequency Data and Machine Learning Classifiers.
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017
Shared dataset on natural human-computer interaction to support continuous authentication research.
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017
2016
A Simple, Efficient, Context-sensitive Approach for Code Completion.
J. Softw. Evol. Process., 2016
Effects of text filtering on authentication performance of keystroke biometrics.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016
Fixture identification from aggregated hot water consumption data.
Proceedings of the IEEE International Smart Cities Conference, 2016
Linking usage tutorials into API client code.
Proceedings of the 3rd International Workshop on CrowdSourcing in Software Engineering, 2016
Water Fixture Identification in Smart Housing: A Domain Knowledge Based Case Study.
Proceedings of the 15th IEEE International Conference on Machine Learning and Applications, 2016
2015
Effect of data size on performance of free-text keystroke authentication.
Proceedings of the IEEE International Conference on Identity, 2015
ArchFLoc: Locating and explaining architectural features in running web applications.
Proceedings of the 2015 IEEE International Conference on Software Maintenance and Evolution, 2015
2014
LDA Analyzer: A Tool for Exploring Topic Models.
Proceedings of the 30th IEEE International Conference on Software Maintenance and Evolution, Victoria, BC, Canada, September 29, 2014
Context-Sensitive Code Completion Tool for Better API Usability.
Proceedings of the 30th IEEE International Conference on Software Maintenance and Evolution, Victoria, BC, Canada, September 29, 2014
CSCC: Simple, Efficient, Context Sensitive Code Completion.
Proceedings of the 30th IEEE International Conference on Software Maintenance and Evolution, Victoria, BC, Canada, September 29, 2014
Shared research dataset to support development of keystroke authentication.
Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, 2014
2013
Extracting problematic API features from forum discussions.
Proceedings of the IEEE 21st International Conference on Program Comprehension, 2013
Content Categorization of API Discussions.
Proceedings of the 2013 IEEE International Conference on Software Maintenance, 2013
2012
CriticAL: A critic for APIs and libraries.
Proceedings of the IEEE 20th International Conference on Program Comprehension, 2012
Evaluating forum discussions to inform the design of an API critic.
Proceedings of the IEEE 20th International Conference on Program Comprehension, 2012
Finding errors from reverse-engineered equality models using a constraint solver.
Proceedings of the 28th IEEE International Conference on Software Maintenance, 2012
2011
Exploring the Intent behind API Evolution: A Case Study.
Proceedings of the 18th Working Conference on Reverse Engineering, 2011
Satisfying Programmers' Information Needs in API-Based Programming.
Proceedings of the 19th IEEE International Conference on Program Comprehension, 2011
Obstacles in Using Frameworks and APIs: An Exploratory Study of Programmers' Newsgroup Discussions.
Proceedings of the 19th IEEE International Conference on Program Comprehension, 2011
EQ: Checking the implementation of equality in Java.
Proceedings of the IEEE 27th International Conference on Software Maintenance, 2011
An evaluation of the strategies of sorting, filtering, and grouping API methods for Code Completion.
Proceedings of the IEEE 27th International Conference on Software Maintenance, 2011
2010
An Abstraction-Oriented, Path-Based Approach for Analyzing Object Equality in Java.
Proceedings of the 17th Working Conference on Reverse Engineering, 2010
Actively comparing clones inside the code editor.
Proceedings of the Proceeding of the 4th ICSE International Workshop on Software Clones, 2010
Aiding Software Maintenance with Copy-and-Paste Clone-Awareness.
Proceedings of the 18th IEEE International Conference on Program Comprehension, 2010
Renaming Parts of Identifiers Consistently within Code Clones.
Proceedings of the 18th IEEE International Conference on Program Comprehension, 2010
Towards a better code completion system by API grouping, filtering, and popularity-based ranking.
Proceedings of the 2nd International Workshop on Recommendation Systems for Software Engineering, 2010
2009
CnP: Towards an environment for the proactive management of copy-and-paste programming.
Proceedings of the 17th IEEE International Conference on Program Comprehension, 2009
BCC: Enhancing code completion for better API usability.
Proceedings of the 25th IEEE International Conference on Software Maintenance (ICSM 2009), 2009
Analyzing the evolution of user-visible features: A case study with Eclipse.
Proceedings of the 25th IEEE International Conference on Software Maintenance (ICSM 2009), 2009
Proactively managing copy-and-paste induced code clones.
Proceedings of the 25th IEEE International Conference on Software Maintenance (ICSM 2009), 2009
An empirical analysis of the evolution of user-visible features in an integrated development environment.
Proceedings of the 2009 conference of the Centre for Advanced Studies on Collaborative Research, 2009
Exploring the design space of proactive tool support for copy-and-paste programming.
Proceedings of the 2009 conference of the Centre for Advanced Studies on Collaborative Research, 2009
2008
An Empirical Study of Function Overloading in C++.
Proceedings of the Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 2008
Investigating the effects of frameworkdesign knowledge in example-based framework learning.
Proceedings of the 24th IEEE International Conference on Software Maintenance (ICSM 2008), September 28, 2008
An empirical study of the design and implementation of object equality in Java.
Proceedings of the 2008 conference of the Centre for Advanced Studies on Collaborative Research, 2008
Documenting and Evaluating Scattered Concerns for Framework Usability: A Case Study.
Proceedings of the 15th Asia-Pacific Software Engineering Conference (APSEC 2008), 2008
2007
SCL: Static Enforcement and Exploration of Developer Intent in Source Code.
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007
CReN: a tool for tracking copy-and-paste code clones and renaming identifiers consistently in the IDE.
Proceedings of the 2007 OOPSLA workshop on Eclipse Technology eXchange, 2007
Studying the evolution of the Eclipse Java editor.
Proceedings of the 2007 OOPSLA workshop on Eclipse Technology eXchange, 2007
2006
Using SCL to Specify and Check Design Intent in Source Code.
IEEE Trans. Software Eng., 2006
Reverse Engineering Scripting Language Extensions.
Proceedings of the 14th International Conference on Program Comprehension (ICPC 2006), 2006
Source-Level Linkage: Adding Semantic Information to C++ Fact-bases.
Proceedings of the 22nd IEEE International Conference on Software Maintenance (ICSM 2006), 2006
Using Structural Constraints to Specify and Check Design Intent in Source Code - Ph.D. Dissertation Synopsis.
Proceedings of the 22nd IEEE International Conference on Software Maintenance (ICSM 2006), 2006
2005
What Can Programmer Questions Tell Us About Frameworks?
Proceedings of the 13th International Workshop on Program Comprehension (IWPC 2005), 2005
2004
Specifying the Law of Demeter and C++ Programming Guidelines with FCL.
Proceedings of the 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 2004
Specifying framework constraints with FCL.
Proceedings of the 2004 conference of the Centre for Advanced Studies on Collaborative research, 2004
2002
Towards Specifying Constraints for Object-Oriented Frameworks.
Inf. Syst. Frontiers, 2002
Supporting the Deployment of Object-Oriented Frameworks.
Proceedings of the Advanced Information Systems Engineering, 14th International Conference, 2002
2001
Supporting the Deployment of Object-Oriented Frameworks.
Proceedings of the 23rd International Conference on Software Engineering, 2001