Vir V. Phoha

Orcid: 0000-0002-5390-8253

According to our database1, Vir V. Phoha authored at least 118 papers between 1992 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SSPRA: A Robust Approach to Continuous Authentication Amidst Real-World Adversarial Challenges.
IEEE Trans. Biom. Behav. Identity Sci., April, 2024

DSTER: A Dual-Stream Transformer-based Emotion Recognition Model through Keystrokes Dynamics.
Proceedings of the IEEE International Joint Conference on Biometrics, 2024

2023
Learn-to-Respond: Sequence-Predictive Recovery from Sensor Attacks in Cyber-Physical Systems.
Proceedings of the IEEE Real-Time Systems Symposium, 2023

2022
Graph-Based Identification and Authentication: A Stochastic Kronecker Approach.
IEEE Trans. Knowl. Data Eng., 2022

Combating False Data Injection Attacks on Human-Centric Sensing Applications.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

Formalizing PQRST Complex in Accelerometer-based Gait Cycle for Authentication.
CoRR, 2022

"This is Fake! Shared it by Mistake": Assessing the Intent of Fake News Spreaders.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Gaitpoint: A Gait Recognition Network Based on Point Cloud Analysis.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

2021
Enhancing performance and user convenience of multi-biometric verification systems.
Pattern Anal. Appl., 2021

Effectiveness of symmetric rejection for a secure and user convenient multistage biometric system.
Pattern Anal. Appl., 2021

Inroduction on Recent Trends and Perspectives in Fake News Research.
DTRAP, 2021

Game Theory based Cyber-Insurance to Cover Potential Loss from Mobile Malware Exploitation.
DTRAP, 2021

Treadmill Assisted Gait Spoofing (TAGS): An Emerging Threat to Wearable Sensor-based Gait Authentication.
DTRAP, 2021

Press @$@$ to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing Gestures.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Adversarial Activity Detection Using Keystroke Acoustics.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
SU-AIS BB-MAS (Syracuse University and Assured Information Security - Behavioral Biometrics Multi-device and multi-Activity data from Same users) Dataset.
Dataset, July, 2020

Discriminative Power of Typing Features on Desktops, Tablets, and Phones for User Identification.
ACM Trans. Priv. Secur., 2020

Wrist in Motion: A Seamless Context-Aware Continuous Authentication Framework Using Your Clickings and Typings.
IEEE Trans. Biom. Behav. Identity Sci., 2020

Thinking Unveiled: An Inference and Correlation Model to Attack EEG Biometrics.
DTRAP, 2020

Fake News Early Detection: A Theory-driven Model.
DTRAP, 2020

2019
Brain Signals and the Corresponding Hand Movement Signals Dataset (BS-HMS-Dataset).
Dataset, December, 2019

Stealing Passwords by Observing Hands Movement.
IEEE Trans. Inf. Forensics Secur., 2019

EarEcho: Using Ear Canal Echo for Wearable Authentication.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

A Survey on Gait Recognition.
ACM Comput. Surv., 2019

Insights from BB-MAS - A Large Dataset for Typing, Gait and Swipes of the Same Person on Desktop, Tablet and Phone.
CoRR, 2019

Network Identification and Authentication.
Proceedings of the 2019 IEEE International Conference on Data Mining, 2019

2018
Non-interactive Identity-Based Underwater Data Transmission With Anonymity and Zero Knowledge.
IEEE Trans. Veh. Technol., 2018

TR-MCN: light weight task recommendation for mobile crowdsourcing networks.
J. Ambient Intell. Humaniz. Comput., 2018

Active Authentication of Keyboard Users: Performance Evaluation on 736 Subjects.
CoRR, 2018

Analysis of head and torso movements for authentication.
Proceedings of the IEEE 4th International Conference on Identity, 2018

Continuous authentication using one-class classifiers and their fusion.
Proceedings of the IEEE 4th International Conference on Identity, 2018

Body-Taps: Authenticating Your Device Through Few Simple Taps.
Proceedings of the 9th IEEE International Conference on Biometrics Theory, 2018

Hand in Motion: Enhanced Authentication Through Wrist and Mouse Movement.
Proceedings of the 9th IEEE International Conference on Biometrics Theory, 2018

2017
Securing dynamic microgrid partition in the smart grid.
Int. J. Distributed Sens. Networks, 2017

Enhanced free-text keystroke continuous authentication based on dynamics of wrist motion.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Entropic Brain-computer Interfaces - Using fNIRS and EEG to Measure Attentional States in a Bayesian Framework.
Proceedings of the 4th International Conference on Physiological Computing Systems (PhyCS 2017), 2017

Continuous user authentication via unlabeled phone movement patterns.
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017

2016
Toward Robotic Robbery on the Touch Screen.
ACM Trans. Inf. Syst. Secur., 2016

Curie: A method for protecting SVM Classifier from Poisoning Attack.
CoRR, 2016

Authenticating users through their arm movement patterns.
CoRR, 2016

An empirical evaluation of activities and classifiers for user identification on smartphones.
Proceedings of the 8th IEEE International Conference on Biometrics Theory, 2016

Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns.
Proceedings of the 8th IEEE International Conference on Biometrics Theory, 2016

Wireless Sensor Networks - Security, Coverage, and Localization
Springer, ISBN: 978-3-319-46769-6, 2016

2015
Utilizing linguistically enhanced keystroke dynamics to predict typist cognition and demographics.
Int. J. Hum. Comput. Stud., 2015

When Mice devour the Elephants: A DDoS attack against size-based scheduling schemes in the internet.
Comput. Secur., 2015

fNIRS: A new modality for brain activity-based biometric authentication.
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015

Music and images as contexts in a context-aware touch-based authentication system.
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015

On humanoid robots imitating human touch gestures on the smart phone.
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015

Treadmill attack on gait-based authentication systems.
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015

2014
A Non-Interactive Dual Channel Continuous Traffic Authentication Protocol.
IEEE Trans. Inf. Forensics Secur., 2014

A Game Theoretic Approach for Modeling Privacy Settings of an Online Social Network.
EAI Endorsed Trans. Collab. Comput., 2014

Modeling online social network users' profile attribute disclosure behavior from a game theoretic perspective.
Comput. Commun., 2014

Using network motifs to investigate the influence of network topology on PPM-based IP traceback schemes.
Comput. Networks, 2014

Privacy-preserving population-enhanced biometric key generation from free-text keystroke dynamics.
Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, 2014

Continuous authentication with cognition-centric text production and revision features.
Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, 2014

Context-Aware Active Authentication Using Smartphone Accelerometer Measurements.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2014

Beware, Your Hands Reveal Your Secrets!
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Topology-dependent performance of attack graph reconstruction in PPM-based IP traceback.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

2013
Examining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings.
ACM Trans. Inf. Syst. Secur., 2013

Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds.
IEEE Trans. Inf. Forensics Secur., 2013

Snoop-Forge-Replay Attacks on Continuous Verification With Keystrokes.
IEEE Trans. Inf. Forensics Secur., 2013

Scan-Based Evaluation of Continuous Keystroke Authentication Systems.
IT Prof., 2013

A Non-interactive Dual-channel Authentication Protocol for Assuring Pseudo-confidentiality.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

On Controlling Genuine Reject Rate in Multi-stage Biometric Verification.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2013

Modeling privacy settings of an online social network from a game-theoretical perspective.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

When kids' toys breach mobile phone security.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms.
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013

2012
Dynamical System Theory for the Detection of Anomalous Behavior in Computer Programs.
IEEE Trans. Syst. Man Cybern. Part C, 2012

A prediction based approach to IP traceback.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Transforming animals in a cyber-behavioral biometric menagerie with Frog-Boiling attacks.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012

New impostor score based rejection methods for continuous keystroke verification with weak templates.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012

2011
On the discriminability of keystroke feature vectors used in fixed text keystroke authentication.
Pattern Recognit. Lett., 2011

Design of a smart biomarker for bioremediation: A machine learning approach.
Comput. Biol. Medicine, 2011

Using global knowledge of users' typing traits to attack keystroke biometrics templates.
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011

On the Complexity of Aggregating Information for Authentication and Profiling.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2011

Web Farm-inspired Computational Cluster in the Cloud.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

2010
On Guo and Nixon's Criterion for Feature Subset Selection: Assumptions, Implications, and Alternative Options.
IEEE Trans. Syst. Man Cybern. Part A, 2010

On the Feature Selection Criterion Based on an Approximation of Multidimensional Mutual Information.
IEEE Trans. Pattern Anal. Mach. Intell., 2010

Size-based scheduling: a recipe for DDOS?
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Fuzzy Evaluation of Agent-Based Semantic Match-Making Algorithm for Cyberspace.
Int. J. Semantic Comput., 2009

Reduction of noise due to systematic uncertainties in <sup>113m</sup>In SPECT imaging using information theory.
Comput. Biol. Medicine, 2009

Multi-hop scheduling and local data link aggregation dependant Qos in modeling and simulation of power-aware wireless sensor networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

Defining A New Type of Global Information Architecture for Contextual Information Processing.
Proceedings of the 2009 International Conference on Information & Knowledge Engineering, 2009

A simple and efficient video image clustering algorithm for person specific query and image retrieval.
Proceedings of the First International Conference on Internet Multimedia Computing and Service, 2009

Security models for contextual based global processing an architecture and overview.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

2008
Classification of radio elements using mutual information: A tool for geological mapping.
Int. J. Appl. Earth Obs. Geoinformation, 2008

2007
K-Means+ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning Methods.
IEEE Trans. Knowl. Data Eng., 2007

On the Relationship Between Dependence Tree Classification Error and Bayes Error Rate.
IEEE Trans. Pattern Anal. Mach. Intell., 2007

A Divergence-measure Based Classification Method for Detecting Anomalies in Network Traffic.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2007

Genetic Algorithm Approach for Resource Allocation in Multi-User OFDM Systems.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

Situation-Aware Software Engineering for Sensor Networks.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

Competition between SOM Clusters to Model User Authentication System in Computer Networks.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

2005
A parallel decision tree-based method for user authentication based on keystroke patterns.
IEEE Trans. Syst. Man Cybern. Part B, 2005

Early detection and propagation mitigation of worm programs.
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

The bipartite clique: a topological paradigm for WWWeb user search customization.
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

Investigating hidden Markov models capabilities in anomaly detection.
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

2004
Supervisory Control of Software Systems.
IEEE Trans. Computers, 2004

Adaptive Neural Network Clustering of Web Users.
Computer, 2004

Neural Network-Based Reputation Model in a Distributed System.
Proceedings of the 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 2004

An Adaptive Recommendation Trust Model in Multiagent System.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004), 2004

Opinion Filtered Recommendation Trust Model in Peer-to-Peer Networks.
Proceedings of the Agents and Peer-to-Peer Computing, Third International Workshop, 2004

2003
Intelligent compensation of actuator nonlinearities.
Proceedings of the 42nd IEEE Conference on Decision and Control, 2003

Supervisory control of software systems for fault mitigation.
Proceedings of the American Control Conference, 2003

2002
Faster Web Page Allocation with Neural Networks.
IEEE Internet Comput., 2002

A New Efficient Edge Extraction Algorithm for Images Using Directional Tracing Techniques.
Intell. Autom. Soft Comput., 2002

An Adaptive Web Cache Access Predictor Using Neural Network.
Proceedings of the Developments in Applied Artificial Intelligence, 2002

Internet security dictionary.
Springer, ISBN: 978-0-387-95261-1, 2002

2001
The DMCA Needs Fixing.
Commun. ACM, 2001

An interactive dynamic model for integrating knowledge management methods and knowledge sharing technology in a traditional classroom.
Proceedings of the 32rd SIGCSE Technical Symposium on Computer Science Education, 2001

Web user clustering from access log using belief function.
Proceedings of the First International Conference on Knowledge Capture (K-CAP 2001), 2001

1999
Can a Course Be Taught Entirely Via Email?
Commun. ACM, 1999

1998
Review of "Discrete Neural Networks: A Theoretical Foundation by Kai-Yeung Siu, Vwani Roychowdhury and Thomas Kailath", Prentice Hall PTR, 1995, ISBN 0-13-300708-1.
SIGART Bull., 1998

1997
A Standard for Software Documentation.
Computer, 1997

1996
Corrections to "Image Recovery and Segmentation Using Competitive Learning in a Layered Network.
IEEE Trans. Neural Networks, 1996

Image recovery and segmentation using competitive learning in a layered network.
IEEE Trans. Neural Networks, 1996

1995
Decision support and executive information systems : by Paul Gray (editor) (1994; Pages 469; Prentice Hall, Englewood Cliffs, NJ 07632, USA; ISBN 0-13-235789-5).
Decis. Support Syst., 1995

1992
Image recovery and segmentation using competitive learning in a computational network.
PhD thesis, 1992


  Loading...