Search Results - "Phoha, Vir V."

Refine Results
  1. 1

    K-Means+ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning Methods by Gaddam, S.R., Phoha, V.V., Balagani, K.S.

    “…In this paper, we present "k-means+ID3", a method to cascade k-means clustering and the ID3 decision tree learning methods for classifying anomalous and normal…”
    Get full text
    Journal Article
  2. 2

    Modeling online social network users’ profile attribute disclosure behavior from a game theoretic perspective by Chen, Jundong, Kiremire, Ankunda R., Brust, Matthias R., Phoha, Vir V.

    Published in Computer communications (01-08-2014)
    “…Privacy settings are a crucial part of any online social network as users are confronted with determining which and how many profile attributes to disclose…”
    Get full text
    Journal Article
  3. 3

    Graph-Based Identification and Authentication: A Stochastic Kronecker Approach by Jin, Shengmin, Phoha, Vir V., Zafarani, Reza

    “…A large body of research has focused on analyzing large networks and graphs. However, network and graph data is often anonymized for reasons such as protecting…”
    Get full text
    Journal Article
  4. 4

    Stealing Passwords by Observing Hands Movement by Shukla, Diksha, Phoha, Vir V.

    “…The use of mobile phones in public places opens up the possibilities of remote side channel attacks on these devices. We present a video-based side channel…”
    Get full text
    Journal Article
  5. 5

    SSPRA: A Robust Approach to Continuous Authentication Amidst Real-World Adversarial Challenges by Chen, Frank, Xin, Jingyu, Phoha, Vir V.

    “…In real-world deployment, continuous authentication for mobile devices faces challenges such as intermittent data streams, variable data quality, and varying…”
    Get full text
    Journal Article
  6. 6

    Enhancing performance and user convenience of multi-biometric verification systems by Hossain, Md S., Phoha, Vir V.

    Published in Pattern analysis and applications : PAA (01-11-2021)
    “…A multi-biometric verification system lowers the verification errors by fusing information from multiple biometric sources. Information can be fused in…”
    Get full text
    Journal Article
  7. 7

    Effectiveness of symmetric rejection for a secure and user convenient multistage biometric system by Hossain, Md S., Balagani, Kiran S., Phoha, Vir V.

    Published in Pattern analysis and applications : PAA (01-02-2021)
    “…A multistage biometric verification system uses multiple biometrics and/or multiple biometric verifiers to generate a verification decision. The core of a…”
    Get full text
    Journal Article
  8. 8

    On the discriminability of keystroke feature vectors used in fixed text keystroke authentication by Balagani, Kiran S., Phoha, Vir V., Ray, Asok, Phoha, Shashi

    Published in Pattern recognition letters (01-05-2011)
    “…► We present a discriminability analysis of keystroke feature vectors. ► We show why heterogeneous vectors are more discriminative than aggregate vectors. ►…”
    Get full text
    Journal Article
  9. 9

    Context-Aware Active Authentication Using Smartphone Accelerometer Measurements by Primo, Abena, Phoha, Vir V., Kumar, Rajesh, Serwadda, Abdul

    “…While body movement patterns recorded by a smartphone accelerometer are now well understood to be discriminative enough to separate users, little work has been…”
    Get full text
    Conference Proceeding Journal Article
  10. 10

    On the Feature Selection Criterion Based on an Approximation of Multidimensional Mutual Information by Balagani, Kiran S, Phoha, Vir V

    “…We derive the feature selection criterion presented in [1] and [2] from the multidimensional mutual information between features and the class. Our derivation:…”
    Get full text
    Journal Article
  11. 11

    A Game Theoretic Approach for Modeling Privacy Settings of an Online Social Network by Jundong Chen, Ankunda R. Kiremire, Matthias R. Brust, Vir V. Phoha

    “…Users of online social networks often adjust their privacy settings to control how much information on their profiles is accessible to other users of the…”
    Get full text
    Journal Article
  12. 12

    When Mice devour the Elephants: A DDoS attack against size-based scheduling schemes in the internet by Serwadda, Abdul, Phoha, Vir V.

    Published in Computers & security (01-09-2015)
    “…Size-based scheduling (SBS) has been shown to offer significant performance improvement in Web servers and routers. However, most of the performance benefits…”
    Get full text
    Journal Article
  13. 13

    Gaitpoint: A Gait Recognition Network Based on Point Cloud Analysis by Chen, Jiajing, Ren, Huantao, Chen, Frank Sicong, Velipasalar, Senem, Phoha, Vir V.

    “…We propose a novel gait recognition method that combines convolutional features with features of human pose key points obtained by a point cloud analysis…”
    Get full text
    Conference Proceeding
  14. 14

    Wrist in Motion: A Seamless Context-Aware Continuous Authentication Framework Using Your Clickings and Typings by Li, Borui, Wang, Wei, Gao, Yang, Phoha, Vir V., Jin, Zhanpeng

    “…In this paper, we propose enhanced continuous authentication by supplementing keystroke and mouse dynamics with wrist motion behaviors. Our method bridges the…”
    Get full text
    Journal Article
  15. 15

    Design of an Expert System for Mitigating Trace Element Toxicity in Cancer Risk Management by Kumar, P.T. Krishna, Vinod, P.T., Phoha, Vir V., Iyengar, S.S., Iyengar, Puneeth

    Published in Cancer informatics (01-01-2013)
    “…Cancer risk management involves obliterating excess concentration of cancer causing trace elements by the natural immune system and hence intake of nutritious…”
    Get full text
    Journal Article
  16. 16

    Snoop-Forge-Replay Attacks on Continuous Verification With Keystrokes by Rahman, K. A., Balagani, K. S., Phoha, V. V.

    “…We present a new attack called the snoop-forge-replay attack on keystroke-based continuous verification systems. The snoop-forge-replay is a sample-level…”
    Get full text
    Journal Article
  17. 17

    Using network motifs to investigate the influence of network topology on PPM-based IP traceback schemes by Kiremire, Ankunda R., Brust, Matthias R., Phoha, Vir V.

    “…Multiple schemes that utilize Probabilistic Packet Marking (PPM) have been proposed to deal with Distributed Denial of Service (DDoS) attacks by reconstructing…”
    Get full text
    Journal Article
  18. 18

    A Non-Interactive Dual Channel Continuous Traffic Authentication Protocol by Irakiza, David, Karim, Md E., Phoha, Vir V.

    “…We introduce a non-interactive dual-channel protocol for continuous traffic authentication and analyze its security properties. We realize the proposed…”
    Get full text
    Journal Article
  19. 19

    Scan-Based Evaluation of Continuous Keystroke Authentication Systems by Serwadda, Abdul, Balagani, Kiran, Wang, Zibo, Koch, Patrick, Govindarajan, Sathya, Pokala, Raviteja, Goodkind, Adam, Brizan, David-Guy, Rosenberg, Andrew, Phoha, Vir V.

    Published in IT professional (01-07-2013)
    “…For biometric modalities in which error rates are typically high--including behavioral biometrics, such as keystroke dynamics--temporal information associated…”
    Get full text
    Journal Article
  20. 20

    Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds by Rice, J. L., Phoha, V. V., Robinson, P.

    “…Recent research has provided evidence indicating how a malicious user could perform coresidence profiling and public-to-private IP mapping to target and…”
    Get full text
    Journal Article