Find Research Outputs

Search in all content

Filters for Research Output

Search concepts
Selected Filters

Publication Year

  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011

Author

  • Vir Phoha
2020
Open Access
2019

Body-taps: Authenticating your device through few simple taps

Shukla, D., Wei, G., Xue, D., Jin, Z. & Phoha, V., Apr 24 2019, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems, BTAS 2018. Institute of Electrical and Electronics Engineers Inc., 8698602. (2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems, BTAS 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hand in Motion: Enhanced authentication through wrist and mouse movement

Li, B., Wang, W., Gao, Y., Phoha, V. & Jin, Z., Apr 24 2019, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems, BTAS 2018. Institute of Electrical and Electronics Engineers Inc., 8698577. (2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems, BTAS 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Looking through your smartphone screen to steal your pin using a 3D camera

Shukla, D., Phoha, V. & Prakash, S., Jan 1 2019, Intelligent Computing - Proceedings of the 2018 Computing Conference. Kapoor, S., Bhatia, R. & Arai, K. (eds.). Springer Verlag, p. 1010-1020 11 p. (Advances in Intelligent Systems and Computing; vol. 857).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network identification and authentication

Jin, S., Phoha, V. & Zafarani, R., Nov 2019, Proceedings - 19th IEEE International Conference on Data Mining, ICDM 2019. Wang, J., Shim, K. & Wu, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1144-1149 6 p. 8970917. (Proceedings - IEEE International Conference on Data Mining, ICDM; vol. 2019-November).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Physical data auditing for attack detection in cyber-manufacturing systems: Blockchain for machine learning process

Song, J., Shukla, D., Wu, M., Phoha, V. V. & Moon, Y. B., Jan 1 2019, Advanced Manufacturing. American Society of Mechanical Engineers (ASME), (ASME International Mechanical Engineering Congress and Exposition, Proceedings (IMECE); vol. 2B-2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Resource Management for Uninterrupted Microgrid Operation

Ghosh, P. K., Sahinoglu, M. & Phoha, V. V., Aug 2019, Proceedings of 2019 the 7th International Conference on Smart Energy Grid Engineering, SEGE 2019. Institute of Electrical and Electronics Engineers Inc., p. 321-324 4 p. 8859865. (Proceedings of 2019 the 7th International Conference on Smart Energy Grid Engineering, SEGE 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Stealing passwords by observing hands movement

Shukla, D. & Phoha, V., Dec 1 2019, In : IEEE Transactions on Information Forensics and Security. 14, 12, p. 3086-3101 16 p., 8691569.

Research output: Contribution to journalArticle

1 Scopus citations
2018

Analysis of head and torso movements for authentication

Parimi, G. M., Kundu, P. P. & Phoha, V., Mar 9 2018, 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis, ISBA 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 1-8 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A survey on gait recognition

Wan, C., Wang, L. & Phoha, V. V., Aug 2018, In : ACM Computing Surveys. 51, 5, 89.

Research output: Contribution to journalReview article

24 Scopus citations

Continuous authentication using one-class classifiers and their fusion

Kumar, R., Kundu, P. P. & Phoha, V., Mar 9 2018, 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis, ISBA 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 1-8 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Continuous user authentication via unlabeled phone movement patterns

Kumar, R., Kundu, P. P., Shukla, D. & Phoha, V. V., Jan 29 2018, IEEE International Joint Conference on Biometrics, IJCB 2017. Institute of Electrical and Electronics Engineers Inc., p. 177-184 8 p. (IEEE International Joint Conference on Biometrics, IJCB 2017; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Non-interactive Identity-Based Underwater Data Transmission with Anonymity and Zero Knowledge

Wan, C., Phoha, V. V., Tang, Y. & Hu, A., Feb 2018, In : IEEE Transactions on Vehicular Technology. 67, 2, p. 1726-1739 14 p.

Research output: Contribution to journalArticle

1 Scopus citations
2017

Enhanced free-text keystroke continuous authentication based on dynamics of wrist motion

Li, B., Sun, H., Gao, Y., Phoha, V. V. & Jin, Z., Jul 2 2017, 2017 IEEE Workshop on Information Forensics and Security, WIFS 2017. Institute of Electrical and Electronics Engineers Inc., p. 1-6 6 p. (2017 IEEE Workshop on Information Forensics and Security, WIFS 2017; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Entropic brain-computer interfaces using fNIRS & EEG to measure attentional states in a Bayesian framework

Hincks, S. W., Bratt, S., Poudel, S., Phoha, V., Jacob, R. J. K., Dennett, D. C. & Hirshfield, L. M., 2017, PhyCS 2017 - Proceedings of the 4th International Conference on Physiological Computing Systems. SciTePress, p. 23-34 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Securing dynamic microgrid partition in the smart grid

Wan, C., Phoha, V., Pei, B. & Chen, C., May 1 2017, In : International Journal of Distributed Sensor Networks. 13, 5

Research output: Contribution to journalArticle

1 Scopus citations

TR-MCN: light weight task recommendation for mobile crowdsourcing networks

Wan, C., Phoha, V. & Huang, D., May 26 2017, (Accepted/In press) In : Journal of Ambient Intelligence and Humanized Computing. p. 1-12 12 p.

Research output: Contribution to journalArticle

2016

An empirical evaluation of activities and classifiers for user identification on smartphones

Tang, C. & Phoha, V., Dec 19 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems, BTAS 2016. Institute of Electrical and Electronics Engineers Inc., 7791159

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns

Kumar, R., Phoha, V. & Serwadda, A., Dec 19 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems, BTAS 2016. Institute of Electrical and Electronics Engineers Inc., 7791164

Research output: Chapter in Book/Report/Conference proceedingConference contribution

24 Scopus citations

Detecting malicious defects in 3D printing process using machine learning and image classification

Wu, M., Phoha, V. V., Moon, Y. B. & Belman, A. K., Jan 1 2016, Emerging Technologies; Materials: Genetics to Structures; Safety Engineering and Risk Analysis. American Society of Mechanical Engineers (ASME), (ASME International Mechanical Engineering Congress and Exposition, Proceedings (IMECE); vol. 14).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Toward robotic robbery on the touch screen

Serwadda, A., Phoha, V., Wang, Z., Kumar, R. & Shukla, D., May 1 2016, In : ACM Transactions on Information and System Security. 18, 4, 14.

Research output: Contribution to journalArticle

7 Scopus citations
2015

FNIRS: A new modality for brain activity-based biometric authentication

Serwadda, A., Phoha, V. V., Poudel, S., Hirshfield, L. M., Bandara, D., Bratt, S. E. & Costa, M. R., Dec 16 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems, BTAS 2015. Institute of Electrical and Electronics Engineers Inc., 7358763

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Music and images as contexts in a context-aware touch-based authentication system

Primo, A. & Phoha, V., Dec 16 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems, BTAS 2015. Institute of Electrical and Electronics Engineers Inc., 7358779

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

On humanoid robots imitating human touch gestures on the smart phone

Poudel, S., Serwadda, A. & Phoha, V. V., Dec 16 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems, BTAS 2015. Institute of Electrical and Electronics Engineers Inc., 7358781. (2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems, BTAS 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Transient Behavior of Fractional Queues and Related Processes

Cahoy, D. O., Polito, F. & Phoha, V., Sep 10 2015, In : Methodology and Computing in Applied Probability. 17, 3, p. 739-759 21 p.

Research output: Contribution to journalArticle

7 Scopus citations

Treadmill attack on gait-based authentication systems

Kumar, R., Phoha, V. & Jain, A., Dec 16 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems, BTAS 2015. Institute of Electrical and Electronics Engineers Inc., 7358801

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Utilizing linguistically enhanced keystroke dynamics to predict typist cognition and demographics

Brizan, D. G., Goodkind, A., Koch, P., Balagani, K., Phoha, V. V. & Rosenberg, A., Jun 14 2015, In : International Journal of Human Computer Studies. 82, p. 57-68 12 p., 1959.

Research output: Contribution to journalArticle

15 Scopus citations

When mice devour the elephants: A DDoS attack against size-based scheduling schemes in the internet

Serwadda, A. & Phoha, V. V., Jun 12 2015, In : Computers and Security. 53, p. 31-43 13 p., 901.

Research output: Contribution to journalArticle

2 Scopus citations
2014

A non-interactive dual channel continuous traffic authentication protocol

Irakiza, D., Karim, M. E. & Phoha, V. V., Jul 2014, In : IEEE Transactions on Information Forensics and Security. 9, 7, p. 1133-1140 8 p., 6815645.

Research output: Contribution to journalArticle

2 Scopus citations

Beware, your hands reveal your secrets !

Shukia, D., Kumar, R., Phoha, V. V. & Serwadda, A., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 904-917 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

68 Scopus citations

Context-aware active authentication using smartphone accelerometer measurements

Primo, A., Phoha, V. V., Kumar, R. & Serwadda, A., Sep 24 2014, Proceedings - 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops, CVPRW 2014. IEEE Computer Society, p. 98-105 8 p. 6909965. (IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

63 Scopus citations

Continuous authentication with cognition-centric text production and revision features

Locklear, H., Govindarajan, S., Sitova, Z., Goodkind, A., Brizan, D. G., Rosenberg, A., Phoha, V. V., Gasti, P. & Balagani, K. S., Dec 23 2014, IJCB 2014 - 2014 IEEE/IAPR International Joint Conference on Biometrics. Institute of Electrical and Electronics Engineers Inc., 6996227. (IJCB 2014 - 2014 IEEE/IAPR International Joint Conference on Biometrics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Cyber-physical systems security

Karim, M. E. & Phoha, V. V., Jul 1 2014, Applied Cyber-Physical Systems. Springer New York, Vol. 9781461473367. p. 75-83 9 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

14 Scopus citations

Modeling online social network users' profile attribute disclosure behavior from a game theoretic perspective

Chen, J., Kiremire, A. R., Brust, M. R. & Phoha, V. V., Aug 1 2014, In : Computer Communications. 49, p. 18-32 15 p.

Research output: Contribution to journalArticle

13 Scopus citations

Privacy-preserving population-enhanced biometric key generation from free-text keystroke dynamics

Sedenkay, J., Balagani, K. S., Phoha, V. & Gasti, P., Dec 23 2014, IJCB 2014 - 2014 IEEE/IAPR International Joint Conference on Biometrics. Institute of Electrical and Electronics Engineers Inc., 6996244. (IJCB 2014 - 2014 IEEE/IAPR International Joint Conference on Biometrics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Topology-dependent performance of attack graph reconstruction in PPM-based IP traceback

Kiremire, A. R., Brust, M. R. & Phoha, V. V., Jan 1 2014, 2014 IEEE 11th Consumer Communications and Networking Conference, CCNC 2014. IEEE Computer Society, p. 363-370 8 p. 6866596. (2014 IEEE 11th Consumer Communications and Networking Conference, CCNC 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Using network motifs to investigate the influence of network topology on PPM-based IP traceback schemes

Kiremire, A. R., Brust, M. R. & Phoha, V. V., Oct 29 2014, In : Computer Networks. 72, p. 14-32 19 p.

Research output: Contribution to journalArticle

9 Scopus citations
2013

Design of an expert system for mitigating trace element toxicity in cancer risk management

Krishna Kumar, P. T., Vinod, P. T., Phoha, V. V., Iyengar, S. S. & Iyengar, P., Feb 12 2013, In : Cancer Informatics. 12, p. 21-29 9 p.

Research output: Contribution to journalArticle

23 Scopus citations

Modeling privacy settings of an online social network from a game-theoretical perspective

Chen, J., Brust, M. R., Kiremire, A. R. & Phoha, V. V., Dec 1 2013, Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, COLLABORATECOM 2013. p. 213-220 8 p. 6679987. (Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, COLLABORATECOM 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

On controlling genuine reject rate in multi-stage biometric verification

Hossain, M. S., Balagani, K. S. & Phoha, V. V., Oct 8 2013, Proceedings - 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops, CVPRW 2013. p. 194-199 6 p. 6595874. (IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Scan-based evaluation of continuous keystroke authentication systems

Serwadda, A., Wang, Z., Koch, P., Govindarajan, S., Pokala, R., Goodkind, A., Brizan, D. G., Rosenberg, A., Phoha, V. V. & Balagani, K., Sep 9 2013, In : IT Professional. 15, 4, p. 20-23 4 p., 6544526.

Research output: Contribution to journalArticle

10 Scopus citations

Snoop-forge-replay attacks on continuous verification with keystrokes

Rahman, K. A., Balagani, K. S. & Phoha, V. V., Mar 11 2013, In : IEEE Transactions on Information Forensics and Security. 8, 3, p. 528-541 14 p., 6425469.

Research output: Contribution to journalArticle

27 Scopus citations

Using mussel-inspired self-organization and account proxies to obfuscate workload ownership and placement in clouds

Rice, J. L., Phoha, V. V. & Robinson, P., Jun 3 2013, In : IEEE Transactions on Information Forensics and Security. 8, 6, p. 963-972 10 p., 6506103.

Research output: Contribution to journalArticle

2 Scopus citations

When kids' toys breach mobile phone security

Serwadda, A. & Phoha, V. V., Dec 9 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 599-610 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

45 Scopus citations

Which verifiers work? A benchmark evaluation of touch-based authentication algorithms

Serwadda, A., Phoha, V. V. & Wang, Z., Jan 1 2013, IEEE 6th International Conference on Biometrics: Theory, Applications and Systems, BTAS 2013. IEEE Computer Society, 6712758. (IEEE 6th International Conference on Biometrics: Theory, Applications and Systems, BTAS 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

67 Scopus citations
2012

A prediction based approach to IP traceback

Kiremire, A. R., Brust, M. R. & Phoha, V. V., Dec 1 2012, 2012 IEEE 37th Conference on Local Computer Networks Workshops, LCN Workshops 2012. p. 1022-1029 8 p. 6424039. (Proceedings - Conference on Local Computer Networks, LCN).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Dynamical system theory for the detection of anomalous behavior in computer programs

Kanaskar, N., Seker, R., Bian, J. & Phoha, V. V., Dec 1 2012, In : IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews. 42, 6, p. 1579-1589 11 p., 6392448.

Research output: Contribution to journalArticle

1 Scopus citations

Model dependence in sample-size calculation

Cahoy, D. & Phoha, V., Aug 1 2012, In : Communications of the ACM. 55, 8, 1 p.

Research output: Contribution to journalLetter

1 Scopus citations

New impostor score based rejection methods for continuous keystroke verification with weak templates

Hossain, M. S., Balagani, K. S. & Phoha, V. V., Dec 1 2012, 2012 IEEE 5th International Conference on Biometrics: Theory, Applications and Systems, BTAS 2012. p. 251-258 8 p. 6374585. (2012 IEEE 5th International Conference on Biometrics: Theory, Applications and Systems, BTAS 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations