Kiran S. Balagani

Orcid: 0000-0002-7152-2936

According to our database1, Kiran S. Balagani authored at least 37 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SMARTCOPE: Smartphone Change Of Possession Evaluation for continuous authentication.
Pervasive Mob. Comput., 2024

2022
We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Effectiveness of symmetric rejection for a secure and user convenient multistage biometric system.
Pattern Anal. Appl., 2021

2020
DISPERSE: A Decentralized Architecture for Content Replication Resilient to Node Failures.
IEEE Trans. Netw. Serv. Manag., 2020

Your PIN Sounds Good! Augmentation of PIN Guessing Strategies via Audio Leakage.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
MEG: Memory and Energy Efficient Garbled Circuit Evaluation on Smartphones.
IEEE Trans. Inf. Forensics Secur., 2019

PILOT: Password and PIN information leakage from obfuscated typing videos.
J. Comput. Secur., 2019

Your PIN Sounds Good! On The Feasibility of PIN Inference Through Audio Leakage.
CoRR, 2019

2018
The impact of application context on privacy and performance of keystroke authentication systems.
J. Comput. Secur., 2018

Active Authentication of Keyboard Users: Performance Evaluation on 736 Subjects.
CoRR, 2018

USB side-channel attack on Tor.
Comput. Networks, 2018

SILK-TV: Secret Information Leakage from Keystroke Timing Videos.
Proceedings of the Computer Security, 2018

2017
On Inferring Browsing Activity on Smartphones via USB Power Analysis Side-Channel.
IEEE Trans. Inf. Forensics Secur., 2017

An Enhanced WLAN Security System With FPGA Implementation for Multimedia Applications.
IEEE Syst. J., 2017

2016
HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users.
IEEE Trans. Inf. Forensics Secur., 2016

Secure, Fast, and Energy-Efficient Outsourced Authentication for Smartphones.
IEEE Trans. Inf. Forensics Secur., 2016

2015
Secure Outsourced Biometric Authentication With Performance Evaluation on Smartphones.
IEEE Trans. Inf. Forensics Secur., 2015

Utilizing linguistically enhanced keystroke dynamics to predict typist cognition and demographics.
Int. J. Hum. Comput. Stud., 2015

HMOG: A New Biometric Modality for Continuous Authentication of Smartphone Users.
CoRR, 2015

2014
A multimodal data set for evaluating continuous authentication performance in smartphones.
Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems, 2014

Privacy-preserving population-enhanced biometric key generation from free-text keystroke dynamics.
Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, 2014

Continuous authentication with cognition-centric text production and revision features.
Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, 2014

Automatic identification of solid-phase medication intake using wireless wearable accelerometers.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014

2013
Snoop-Forge-Replay Attacks on Continuous Verification With Keystrokes.
IEEE Trans. Inf. Forensics Secur., 2013

Scan-Based Evaluation of Continuous Keystroke Authentication Systems.
IT Prof., 2013

On Controlling Genuine Reject Rate in Multi-stage Biometric Verification.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2013

Secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users with touch data.
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013

2012
Transforming animals in a cyber-behavioral biometric menagerie with Frog-Boiling attacks.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012

New impostor score based rejection methods for continuous keystroke verification with weak templates.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012

2011
On the discriminability of keystroke feature vectors used in fixed text keystroke authentication.
Pattern Recognit. Lett., 2011

Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2011

2010
On Guo and Nixon's Criterion for Feature Subset Selection: Assumptions, Implications, and Alternative Options.
IEEE Trans. Syst. Man Cybern. Part A, 2010

On the Feature Selection Criterion Based on an Approximation of Multidimensional Mutual Information.
IEEE Trans. Pattern Anal. Mach. Intell., 2010

2007
K-Means+ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning Methods.
IEEE Trans. Knowl. Data Eng., 2007

On the Relationship Between Dependence Tree Classification Error and Bayes Error Rate.
IEEE Trans. Pattern Anal. Mach. Intell., 2007

A Divergence-measure Based Classification Method for Detecting Anomalies in Network Traffic.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2007

2004
Adaptive Neural Network Clustering of Web Users.
Computer, 2004


  Loading...