Rajesh Kumar

Orcid: 0000-0001-7467-5762

Affiliations:
  • Bucknell University, Department of Computer Science, Lewisburg, PA, USA
  • Syracuse University, Haverford College, Syracuse, NY, USA (PhD 2021)


According to our database1, Rajesh Kumar authored at least 30 papers between 2014 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Detecting LLM-Assisted Academic Dishonesty using Keystroke Dynamics.
CoRR, November, 2025

How Well Do LLMs Imitate Human Writing Style?
CoRR, September, 2025

Evaluating a Bimodal User Verification Robustness Against Synthetic Data Attacks.
Proceedings of the 22nd International Conference on Security and Cryptography, 2025

Active Authentication via Korean Keystrokes Under Varying LLM Assistance and Cognitive Contexts.
Proceedings of the International Conference on Machine Learning and Applications, 2025

LLM-Assisted Cheating Detection in Korean Language via Keystrokes.
Proceedings of the IEEE International Joint Conference on Biometrics, 2025

Weak Links in LinkedIn: Enhancing Fake Profile Detection in the Age of LLMs.
Proceedings of the Social Networks Analysis and Mining - 17th International Conference, 2025

2024
Deep Generative Attacks and Countermeasures for Data-Driven Offline Signature Verification.
Proceedings of the IEEE International Joint Conference on Biometrics, 2024

Keystroke Dynamics Against Academic Dishonesty in the Age of LLMs.
Proceedings of the IEEE International Joint Conference on Biometrics, 2024

Spotting Fake Profiles in Social Networks via Keystroke Dynamics.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
Deep Generative Attacks and Countermeasures for Data-Driven Offline Signature Verification.
CoRR, 2023

Synthesizing Human Gaze Feedback for Improved NLP Performance.
Proceedings of the 17th Conference of the European Chapter of the Association for Computational Linguistics, 2023

Dictionary Attack on IMU-based Gait Authentication.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023

2022
GANTouch: An Attack-Resilient Framework for Touch-Based Continuous Authentication System.
IEEE Trans. Biom. Behav. Identity Sci., 2022

IDeAuth: A novel behavioral biometric-based implicit deauthentication scheme for smartphones.
Pattern Recognit. Lett., 2022

iCTGAN-An Attack Mitigation Technique for Random-vector Attack on Accelerometer-based Gait Authentication Systems.
Proceedings of the IEEE International Joint Conference on Biometrics, 2022

2021
Treadmill Assisted Gait Spoofing (TAGS): An Emerging Threat to Wearable Sensor-based Gait Authentication.
DTRAP, 2021

Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks.
Proceedings of the International IEEE Joint Conference on Biometrics, 2021

2020
On the Inference of Soft Biometrics from Typing Patterns Collected in a Multi-device Environment.
Proceedings of the 6th IEEE International Conference on Multimedia Big Data, 2020

Touchless Typing Using Head Movement-based Gestures.
Proceedings of the 6th IEEE International Conference on Multimedia Big Data, 2020

2018
Identification of internal faults in indirect symmetrical phase shift transformers using ensemble learning.
Proceedings of the 2018 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2018

Continuous authentication using one-class classifiers and their fusion.
Proceedings of the IEEE 4th International Conference on Identity, 2018

2017
Continuous user authentication via unlabeled phone movement patterns.
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017

2016
Toward Robotic Robbery on the Touch Screen.
ACM Trans. Inf. Syst. Secur., 2016

Authenticating users through their arm movement patterns.
CoRR, 2016

Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns.
Proceedings of the 8th IEEE International Conference on Biometrics Theory, 2016

2015
Treadmill attack on gait-based authentication systems.
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015

2014
Geometrical Localization Algorithm for Three Dimensional Wireless Sensor Networks.
Wirel. Pers. Commun., 2014

Geometrical Localization Algorithm for 3-D Wireless Sensor Networks.
CoRR, 2014

Context-Aware Active Authentication Using Smartphone Accelerometer Measurements.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2014

Beware, Your Hands Reveal Your Secrets!
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014


  Loading...