Vir V. Phoha
Orcid: 0000-0002-5390-8253
According to our database1,
Vir V. Phoha
authored at least 118 papers
between 1992 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
SSPRA: A Robust Approach to Continuous Authentication Amidst Real-World Adversarial Challenges.
IEEE Trans. Biom. Behav. Identity Sci., April, 2024
DSTER: A Dual-Stream Transformer-based Emotion Recognition Model through Keystrokes Dynamics.
Proceedings of the IEEE International Joint Conference on Biometrics, 2024
2023
Learn-to-Respond: Sequence-Predictive Recovery from Sensor Attacks in Cyber-Physical Systems.
Proceedings of the IEEE Real-Time Systems Symposium, 2023
2022
IEEE Trans. Knowl. Data Eng., 2022
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022
CoRR, 2022
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022
2021
Pattern Anal. Appl., 2021
Effectiveness of symmetric rejection for a secure and user convenient multistage biometric system.
Pattern Anal. Appl., 2021
Game Theory based Cyber-Insurance to Cover Potential Loss from Mobile Malware Exploitation.
DTRAP, 2021
Treadmill Assisted Gait Spoofing (TAGS): An Emerging Threat to Wearable Sensor-based Gait Authentication.
DTRAP, 2021
Press @$@$ to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing Gestures.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
2020
SU-AIS BB-MAS (Syracuse University and Assured Information Security - Behavioral Biometrics Multi-device and multi-Activity data from Same users) Dataset.
Dataset, July, 2020
Discriminative Power of Typing Features on Desktops, Tablets, and Phones for User Identification.
ACM Trans. Priv. Secur., 2020
Wrist in Motion: A Seamless Context-Aware Continuous Authentication Framework Using Your Clickings and Typings.
IEEE Trans. Biom. Behav. Identity Sci., 2020
DTRAP, 2020
2019
Dataset, December, 2019
IEEE Trans. Inf. Forensics Secur., 2019
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019
Insights from BB-MAS - A Large Dataset for Typing, Gait and Swipes of the Same Person on Desktop, Tablet and Phone.
CoRR, 2019
Proceedings of the 2019 IEEE International Conference on Data Mining, 2019
2018
Non-interactive Identity-Based Underwater Data Transmission With Anonymity and Zero Knowledge.
IEEE Trans. Veh. Technol., 2018
J. Ambient Intell. Humaniz. Comput., 2018
CoRR, 2018
Proceedings of the IEEE 4th International Conference on Identity, 2018
Proceedings of the IEEE 4th International Conference on Identity, 2018
Proceedings of the 9th IEEE International Conference on Biometrics Theory, 2018
Proceedings of the 9th IEEE International Conference on Biometrics Theory, 2018
2017
Int. J. Distributed Sens. Networks, 2017
Enhanced free-text keystroke continuous authentication based on dynamics of wrist motion.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017
Entropic Brain-computer Interfaces - Using fNIRS and EEG to Measure Attentional States in a Bayesian Framework.
Proceedings of the 4th International Conference on Physiological Computing Systems (PhyCS 2017), 2017
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017
2016
An empirical evaluation of activities and classifiers for user identification on smartphones.
Proceedings of the 8th IEEE International Conference on Biometrics Theory, 2016
Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns.
Proceedings of the 8th IEEE International Conference on Biometrics Theory, 2016
Springer, ISBN: 978-3-319-46769-6, 2016
2015
Utilizing linguistically enhanced keystroke dynamics to predict typist cognition and demographics.
Int. J. Hum. Comput. Stud., 2015
When Mice devour the Elephants: A DDoS attack against size-based scheduling schemes in the internet.
Comput. Secur., 2015
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
EAI Endorsed Trans. Collab. Comput., 2014
Modeling online social network users' profile attribute disclosure behavior from a game theoretic perspective.
Comput. Commun., 2014
Using network motifs to investigate the influence of network topology on PPM-based IP traceback schemes.
Comput. Networks, 2014
Privacy-preserving population-enhanced biometric key generation from free-text keystroke dynamics.
Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, 2014
Continuous authentication with cognition-centric text production and revision features.
Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, 2014
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Topology-dependent performance of attack graph reconstruction in PPM-based IP traceback.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014
2013
ACM Trans. Inf. Syst. Secur., 2013
Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds.
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Trans. Inf. Forensics Secur., 2013
A Non-interactive Dual-channel Authentication Protocol for Assuring Pseudo-confidentiality.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2013
Modeling privacy settings of an online social network from a game-theoretical perspective.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms.
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013
2012
Dynamical System Theory for the Detection of Anomalous Behavior in Computer Programs.
IEEE Trans. Syst. Man Cybern. Part C, 2012
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012
Transforming animals in a cyber-behavioral biometric menagerie with Frog-Boiling attacks.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012
New impostor score based rejection methods for continuous keystroke verification with weak templates.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012
2011
On the discriminability of keystroke feature vectors used in fixed text keystroke authentication.
Pattern Recognit. Lett., 2011
Comput. Biol. Medicine, 2011
Using global knowledge of users' typing traits to attack keystroke biometrics templates.
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011
Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2011
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011
2010
On Guo and Nixon's Criterion for Feature Subset Selection: Assumptions, Implications, and Alternative Options.
IEEE Trans. Syst. Man Cybern. Part A, 2010
On the Feature Selection Criterion Based on an Approximation of Multidimensional Mutual Information.
IEEE Trans. Pattern Anal. Mach. Intell., 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Int. J. Semantic Comput., 2009
Reduction of noise due to systematic uncertainties in <sup>113m</sup>In SPECT imaging using information theory.
Comput. Biol. Medicine, 2009
Multi-hop scheduling and local data link aggregation dependant Qos in modeling and simulation of power-aware wireless sensor networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009
Defining A New Type of Global Information Architecture for Contextual Information Processing.
Proceedings of the 2009 International Conference on Information & Knowledge Engineering, 2009
A simple and efficient video image clustering algorithm for person specific query and image retrieval.
Proceedings of the First International Conference on Internet Multimedia Computing and Service, 2009
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009
2008
Classification of radio elements using mutual information: A tool for geological mapping.
Int. J. Appl. Earth Obs. Geoinformation, 2008
2007
K-Means+ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning Methods.
IEEE Trans. Knowl. Data Eng., 2007
On the Relationship Between Dependence Tree Classification Error and Bayes Error Rate.
IEEE Trans. Pattern Anal. Mach. Intell., 2007
A Divergence-measure Based Classification Method for Detecting Anomalies in Network Traffic.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2007
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007
Competition between SOM Clusters to Model User Authentication System in Computer Networks.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007
2005
A parallel decision tree-based method for user authentication based on keystroke patterns.
IEEE Trans. Syst. Man Cybern. Part B, 2005
Proceedings of the 43nd Annual Southeast Regional Conference, 2005
Proceedings of the 43nd Annual Southeast Regional Conference, 2005
Proceedings of the 43nd Annual Southeast Regional Conference, 2005
2004
Proceedings of the 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 2004
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004), 2004
Proceedings of the Agents and Peer-to-Peer Computing, Third International Workshop, 2004
2003
Proceedings of the 42nd IEEE Conference on Decision and Control, 2003
Proceedings of the American Control Conference, 2003
2002
A New Efficient Edge Extraction Algorithm for Images Using Directional Tracing Techniques.
Intell. Autom. Soft Comput., 2002
Proceedings of the Developments in Applied Artificial Intelligence, 2002
2001
An interactive dynamic model for integrating knowledge management methods and knowledge sharing technology in a traditional classroom.
Proceedings of the 32rd SIGCSE Technical Symposium on Computer Science Education, 2001
Web user clustering from access log using belief function.
Proceedings of the First International Conference on Knowledge Capture (K-CAP 2001), 2001
1999
1998
Review of "Discrete Neural Networks: A Theoretical Foundation by Kai-Yeung Siu, Vwani Roychowdhury and Thomas Kailath", Prentice Hall PTR, 1995, ISBN 0-13-300708-1.
SIGART Bull., 1998
1997
1996
Corrections to "Image Recovery and Segmentation Using Competitive Learning in a Layered Network.
IEEE Trans. Neural Networks, 1996
IEEE Trans. Neural Networks, 1996
1995
Decision support and executive information systems : by Paul Gray (editor) (1994; Pages 469; Prentice Hall, Englewood Cliffs, NJ 07632, USA; ISBN 0-13-235789-5).
Decis. Support Syst., 1995
1992
Image recovery and segmentation using competitive learning in a computational network.
PhD thesis, 1992