Projects per year
Fingerprint
- 1 Similar Profiles
Collaborations and top research areas from the last five years
Projects
- 5 Finished
-
Planning IUCRC Syracuse University: Center for High-Assurance Secure Systems and IoT (CHASSI)
Chin, S. K. (PI), Du, W. (CoI), Phoha, V. (CoI), Tang, Y. (CoI) & Oh, J. C. (CoI)
10/1/19 → 9/30/21
Project: Sponsored Project
-
-
Spoof-Resistant Smartphone Authentication using Cooperating Wearables: TWC: Small: Collaborative
Phoha, V. (PI)
9/1/15 → 8/31/19
Project: Sponsored Project
-
Video Analytics Cryptanalysis Project
Phoha, V. (PI), Yu, E. (CoI) & Mehrotra, K. (CoI)
3/3/15 → 12/31/16
Project: Sponsored Project
-
Context-Aware Active Authentication using Touch Gestures, Typing Patterns and Body Movement
Phoha, V. (PI)
8/16/14 → 6/30/15
Project: Sponsored Project
-
SSPRA: A Robust Approach to Continuous Authentication Amidst Real-World Adversarial Challenges
Chen, F., Xin, J. & Phoha, V. V., 2024, (Accepted/In press) In: IEEE Transactions on Biometrics, Behavior, and Identity Science. p. 1 1 p.Research output: Contribution to journal › Article › peer-review
-
Learn-to-Respond: Sequence-Predictive Recovery from Sensor Attacks in Cyber-Physical Systems
Liu, M., Zhang, L., Phoha, V. V. & Kong, F., 2023, 44th IEEE Real-Time Systems Symposium, RTSS 2023. Institute of Electrical and Electronics Engineers Inc., p. 78-91 14 p. (Proceedings - Real-Time Systems Symposium).Research output: Chapter in Book/Entry/Poem › Conference contribution
9 Scopus citations -
Combating False Data Injection Attacks on Human-Centric Sensing Applications
Xin, J., Phoha, V. V. & Salekin, A., Jul 2022, In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies. 6, 2, 83.Research output: Contribution to journal › Article › peer-review
Open Access3 Scopus citations -
GAITPOINT: A GAIT RECOGNITION NETWORK BASED ON POINT CLOUD ANALYSIS
Chen, J., Ren, H., Chen, F., Velipasalar, S. & Phoha, V. V., 2022, 2022 IEEE International Conference on Image Processing, ICIP 2022 - Proceedings. IEEE Computer Society, p. 1916-1920 5 p. (Proceedings - International Conference on Image Processing, ICIP).Research output: Chapter in Book/Entry/Poem › Conference contribution
3 Scopus citations -
Graph-Based Identification and Authentication: A Stochastic Kronecker Approach
Jin, S., Phoha, V. V. & Zafarani, R., Jul 1 2022, In: IEEE Transactions on Knowledge and Data Engineering. 34, 7, p. 3282-3294 13 p.Research output: Contribution to journal › Article › peer-review
2 Scopus citations
Press and Media
-
Decoded: The pager bomb Trojan Horse used against militant group Hezbollah
9/20/24
1 item of Media coverage
Press/Media: Expert Comment
-
3 FACULTY MEMBERS ATTAIN PRESTIGIOUS IEEE FELLOW RECOGNITION
Chen, B., Du, W., Phoha, V., Varshney, P. K. & Plourde, B.
12/14/22
1 item of Media coverage
Press/Media: Expert Comment
-
Three Faculty Members Attain Prestigious IEEE Fellow Recognition – Syracuse University News
Chen, B., Du, W., Phoha, V., Varshney, P. K. & Plourde, B.
12/14/22
1 item of Media coverage
Press/Media: Expert Comment
-
Facebook decision on facial recognition won’t curb investment
11/3/21
1 item of Media coverage
Press/Media: Expert Comment
-
Massachusetts becomes the first state to pass legislation restricting the use of facial recognition technology
5/21/21
1 item of Media coverage
Press/Media: Expert Comment