Search Results - "Phoha, Vir V."
-
1
K-Means+ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning Methods
Published in IEEE transactions on knowledge and data engineering (01-03-2007)“…In this paper, we present "k-means+ID3", a method to cascade k-means clustering and the ID3 decision tree learning methods for classifying anomalous and normal…”
Get full text
Journal Article -
2
Modeling online social network users’ profile attribute disclosure behavior from a game theoretic perspective
Published in Computer communications (01-08-2014)“…Privacy settings are a crucial part of any online social network as users are confronted with determining which and how many profile attributes to disclose…”
Get full text
Journal Article -
3
Graph-Based Identification and Authentication: A Stochastic Kronecker Approach
Published in IEEE transactions on knowledge and data engineering (01-07-2022)“…A large body of research has focused on analyzing large networks and graphs. However, network and graph data is often anonymized for reasons such as protecting…”
Get full text
Journal Article -
4
Stealing Passwords by Observing Hands Movement
Published in IEEE transactions on information forensics and security (01-12-2019)“…The use of mobile phones in public places opens up the possibilities of remote side channel attacks on these devices. We present a video-based side channel…”
Get full text
Journal Article -
5
SSPRA: A Robust Approach to Continuous Authentication Amidst Real-World Adversarial Challenges
Published in IEEE transactions on biometrics, behavior, and identity science (01-04-2024)“…In real-world deployment, continuous authentication for mobile devices faces challenges such as intermittent data streams, variable data quality, and varying…”
Get full text
Journal Article -
6
Enhancing performance and user convenience of multi-biometric verification systems
Published in Pattern analysis and applications : PAA (01-11-2021)“…A multi-biometric verification system lowers the verification errors by fusing information from multiple biometric sources. Information can be fused in…”
Get full text
Journal Article -
7
Effectiveness of symmetric rejection for a secure and user convenient multistage biometric system
Published in Pattern analysis and applications : PAA (01-02-2021)“…A multistage biometric verification system uses multiple biometrics and/or multiple biometric verifiers to generate a verification decision. The core of a…”
Get full text
Journal Article -
8
On the discriminability of keystroke feature vectors used in fixed text keystroke authentication
Published in Pattern recognition letters (01-05-2011)“…► We present a discriminability analysis of keystroke feature vectors. ► We show why heterogeneous vectors are more discriminative than aggregate vectors. ►…”
Get full text
Journal Article -
9
Context-Aware Active Authentication Using Smartphone Accelerometer Measurements
Published in 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops (01-06-2014)“…While body movement patterns recorded by a smartphone accelerometer are now well understood to be discriminative enough to separate users, little work has been…”
Get full text
Conference Proceeding Journal Article -
10
On the Feature Selection Criterion Based on an Approximation of Multidimensional Mutual Information
Published in IEEE transactions on pattern analysis and machine intelligence (01-07-2010)“…We derive the feature selection criterion presented in [1] and [2] from the multidimensional mutual information between features and the class. Our derivation:…”
Get full text
Journal Article -
11
A Game Theoretic Approach for Modeling Privacy Settings of an Online Social Network
Published in EAI endorsed transactions on collaborative computing (01-05-2014)“…Users of online social networks often adjust their privacy settings to control how much information on their profiles is accessible to other users of the…”
Get full text
Journal Article -
12
When Mice devour the Elephants: A DDoS attack against size-based scheduling schemes in the internet
Published in Computers & security (01-09-2015)“…Size-based scheduling (SBS) has been shown to offer significant performance improvement in Web servers and routers. However, most of the performance benefits…”
Get full text
Journal Article -
13
Gaitpoint: A Gait Recognition Network Based on Point Cloud Analysis
Published in 2022 IEEE International Conference on Image Processing (ICIP) (16-10-2022)“…We propose a novel gait recognition method that combines convolutional features with features of human pose key points obtained by a point cloud analysis…”
Get full text
Conference Proceeding -
14
Wrist in Motion: A Seamless Context-Aware Continuous Authentication Framework Using Your Clickings and Typings
Published in IEEE transactions on biometrics, behavior, and identity science (01-07-2020)“…In this paper, we propose enhanced continuous authentication by supplementing keystroke and mouse dynamics with wrist motion behaviors. Our method bridges the…”
Get full text
Journal Article -
15
Design of an Expert System for Mitigating Trace Element Toxicity in Cancer Risk Management
Published in Cancer informatics (01-01-2013)“…Cancer risk management involves obliterating excess concentration of cancer causing trace elements by the natural immune system and hence intake of nutritious…”
Get full text
Journal Article -
16
Snoop-Forge-Replay Attacks on Continuous Verification With Keystrokes
Published in IEEE transactions on information forensics and security (01-03-2013)“…We present a new attack called the snoop-forge-replay attack on keystroke-based continuous verification systems. The snoop-forge-replay is a sample-level…”
Get full text
Journal Article -
17
Using network motifs to investigate the influence of network topology on PPM-based IP traceback schemes
Published in Computer networks (Amsterdam, Netherlands : 1999) (29-10-2014)“…Multiple schemes that utilize Probabilistic Packet Marking (PPM) have been proposed to deal with Distributed Denial of Service (DDoS) attacks by reconstructing…”
Get full text
Journal Article -
18
A Non-Interactive Dual Channel Continuous Traffic Authentication Protocol
Published in IEEE transactions on information forensics and security (01-07-2014)“…We introduce a non-interactive dual-channel protocol for continuous traffic authentication and analyze its security properties. We realize the proposed…”
Get full text
Journal Article -
19
Scan-Based Evaluation of Continuous Keystroke Authentication Systems
Published in IT professional (01-07-2013)“…For biometric modalities in which error rates are typically high--including behavioral biometrics, such as keystroke dynamics--temporal information associated…”
Get full text
Journal Article -
20
Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds
Published in IEEE transactions on information forensics and security (01-06-2013)“…Recent research has provided evidence indicating how a malicious user could perform coresidence profiling and public-to-private IP mapping to target and…”
Get full text
Journal Article