Kiran S. Balagani

According to our database1, Kiran S. Balagani authored at least 28 papers between 2004 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
MEG: Memory and Energy Efficient Garbled Circuit Evaluation on Smartphones.
IEEE Trans. Information Forensics and Security, 2019

2018
The impact of application context on privacy and performance of keystroke authentication systems.
Journal of Computer Security, 2018

USB side-channel attack on Tor.
Computer Networks, 2018

SILK-TV: Secret Information Leakage from Keystroke Timing Videos.
Proceedings of the Computer Security, 2018

2017
On Inferring Browsing Activity on Smartphones via USB Power Analysis Side-Channel.
IEEE Trans. Information Forensics and Security, 2017

An Enhanced WLAN Security System With FPGA Implementation for Multimedia Applications.
IEEE Systems Journal, 2017

2016
HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users.
IEEE Trans. Information Forensics and Security, 2016

Secure, Fast, and Energy-Efficient Outsourced Authentication for Smartphones.
IEEE Trans. Information Forensics and Security, 2016

2015
Secure Outsourced Biometric Authentication With Performance Evaluation on Smartphones.
IEEE Trans. Information Forensics and Security, 2015

Utilizing linguistically enhanced keystroke dynamics to predict typist cognition and demographics.
Int. J. Hum.-Comput. Stud., 2015

2014
A multimodal data set for evaluating continuous authentication performance in smartphones.
Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems, 2014

Privacy-preserving population-enhanced biometric key generation from free-text keystroke dynamics.
Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, 2014

Continuous authentication with cognition-centric text production and revision features.
Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, 2014

Automatic identification of solid-phase medication intake using wireless wearable accelerometers.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014

2013
Snoop-Forge-Replay Attacks on Continuous Verification With Keystrokes.
IEEE Trans. Information Forensics and Security, 2013

Scan-Based Evaluation of Continuous Keystroke Authentication Systems.
IT Professional, 2013

On Controlling Genuine Reject Rate in Multi-stage Biometric Verification.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2013

Secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users with touch data.
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013

2012
Transforming animals in a cyber-behavioral biometric menagerie with Frog-Boiling attacks.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012

New impostor score based rejection methods for continuous keystroke verification with weak templates.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012

2011
On the discriminability of keystroke feature vectors used in fixed text keystroke authentication.
Pattern Recognition Letters, 2011

Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2011

2010
On Guo and Nixon's Criterion for Feature Subset Selection: Assumptions, Implications, and Alternative Options.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2010

On the Feature Selection Criterion Based on an Approximation of Multidimensional Mutual Information.
IEEE Trans. Pattern Anal. Mach. Intell., 2010

2007
K-Means+ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning Methods.
IEEE Trans. Knowl. Data Eng., 2007

On the Relationship Between Dependence Tree Classification Error and Bayes Error Rate.
IEEE Trans. Pattern Anal. Mach. Intell., 2007

A Divergence-measure Based Classification Method for Detecting Anomalies in Network Traffic.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2007

2004
Adaptive Neural Network Clustering of Web Users.
IEEE Computer, 2004


  Loading...