Graph-Based Identification and Authentication: A Stochastic Kronecker Approach
Jin, Shengmin, Phoha, Vir V., Zafarani, Reza
Published in IEEE transactions on knowledge and data engineering (01.07.2022)
Published in IEEE transactions on knowledge and data engineering (01.07.2022)
Get full text
Journal Article
Stealing Passwords by Observing Hands Movement
Shukla, Diksha, Phoha, Vir V.
Published in IEEE transactions on information forensics and security (01.12.2019)
Published in IEEE transactions on information forensics and security (01.12.2019)
Get full text
Journal Article
On the discriminability of keystroke feature vectors used in fixed text keystroke authentication
Balagani, Kiran S., Phoha, Vir V., Ray, Asok, Phoha, Shashi
Published in Pattern recognition letters (01.05.2011)
Published in Pattern recognition letters (01.05.2011)
Get full text
Journal Article
Context-Aware Active Authentication Using Smartphone Accelerometer Measurements
Primo, Abena, Phoha, Vir V., Kumar, Rajesh, Serwadda, Abdul
Published in 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops (01.06.2014)
Published in 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops (01.06.2014)
Get full text
Conference Proceeding
Journal Article
Gaitpoint: A Gait Recognition Network Based on Point Cloud Analysis
Chen, Jiajing, Ren, Huantao, Chen, Frank Sicong, Velipasalar, Senem, Phoha, Vir V.
Published in 2022 IEEE International Conference on Image Processing (ICIP) (16.10.2022)
Published in 2022 IEEE International Conference on Image Processing (ICIP) (16.10.2022)
Get full text
Conference Proceeding
Design of an Expert System for Mitigating Trace Element Toxicity in Cancer Risk Management
Kumar, P.T. Krishna, Vinod, P.T., Phoha, Vir V., Iyengar, S.S., Iyengar, Puneeth
Published in Cancer informatics (01.01.2013)
Published in Cancer informatics (01.01.2013)
Get full text
Journal Article
Snoop-Forge-Replay Attacks on Continuous Verification With Keystrokes
Rahman, K. A., Balagani, K. S., Phoha, V. V.
Published in IEEE transactions on information forensics and security (01.03.2013)
Published in IEEE transactions on information forensics and security (01.03.2013)
Get full text
Journal Article
A Non-Interactive Dual Channel Continuous Traffic Authentication Protocol
Irakiza, David, Karim, Md E., Phoha, Vir V.
Published in IEEE transactions on information forensics and security (01.07.2014)
Published in IEEE transactions on information forensics and security (01.07.2014)
Get full text
Journal Article