Vir V. Phoha

According to our database1, Vir V. Phoha authored at least 89 papers between 1995 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Non-interactive Identity-Based Underwater Data Transmission With Anonymity and Zero Knowledge.
IEEE Trans. Vehicular Technology, 2018

TR-MCN: light weight task recommendation for mobile crowdsourcing networks.
J. Ambient Intelligence and Humanized Computing, 2018

Active Authentication of Keyboard Users: Performance Evaluation on 736 Subjects.
CoRR, 2018

Analysis of head and torso movements for authentication.
Proceedings of the IEEE 4th International Conference on Identity, 2018

Continuous authentication using one-class classifiers and their fusion.
Proceedings of the IEEE 4th International Conference on Identity, 2018

2017
Securing dynamic microgrid partition in the smart grid.
IJDSN, 2017

Continuous Authentication Using One-class Classifiers and their Fusion.
CoRR, 2017

Continuous User Authentication via Unlabeled Phone Movement Patterns.
CoRR, 2017

Enhanced free-text keystroke continuous authentication based on dynamics of wrist motion.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Entropic Brain-computer Interfaces - Using fNIRS and EEG to Measure Attentional States in a Bayesian Framework.
Proceedings of the 4th International Conference on Physiological Computing Systems (PhyCS 2017), 2017

Continuous user authentication via unlabeled phone movement patterns.
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017

2016
Toward Robotic Robbery on the Touch Screen.
ACM Trans. Inf. Syst. Secur., 2016

Curie: A method for protecting SVM Classifier from Poisoning Attack.
CoRR, 2016

Authenticating users through their arm movement patterns.
CoRR, 2016

An empirical evaluation of activities and classifiers for user identification on smartphones.
Proceedings of the 8th IEEE International Conference on Biometrics Theory, 2016

Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns.
Proceedings of the 8th IEEE International Conference on Biometrics Theory, 2016

Wireless Sensor Networks - Security, Coverage, and Localization
Springer, ISBN: 978-3-319-46769-6, 2016

2015
Utilizing linguistically enhanced keystroke dynamics to predict typist cognition and demographics.
Int. J. Hum.-Comput. Stud., 2015

When Mice devour the Elephants: A DDoS attack against size-based scheduling schemes in the internet.
Computers & Security, 2015

fNIRS: A new modality for brain activity-based biometric authentication.
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015

Music and images as contexts in a context-aware touch-based authentication system.
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015

On humanoid robots imitating human touch gestures on the smart phone.
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015

Treadmill attack on gait-based authentication systems.
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015

2014
A Non-Interactive Dual Channel Continuous Traffic Authentication Protocol.
IEEE Trans. Information Forensics and Security, 2014

A Game Theoretic Approach for Modeling Privacy Settings of an Online Social Network.
EAI Endorsed Trans. Collaborative Computing, 2014

Privacy-Preserving Population-Enhanced Biometric Key Generation from Free-Text Keystroke Dynamics.
CoRR, 2014

Modeling online social network users' profile attribute disclosure behavior from a game theoretic perspective.
Computer Communications, 2014

Using network motifs to investigate the influence of network topology on PPM-based IP traceback schemes.
Computer Networks, 2014

Privacy-preserving population-enhanced biometric key generation from free-text keystroke dynamics.
Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, 2014

Continuous authentication with cognition-centric text production and revision features.
Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, 2014

Context-Aware Active Authentication Using Smartphone Accelerometer Measurements.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2014

Beware, Your Hands Reveal Your Secrets!
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Topology-dependent performance of attack graph reconstruction in PPM-based IP traceback.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

2013
Examining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings.
ACM Trans. Inf. Syst. Secur., 2013

Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds.
IEEE Trans. Information Forensics and Security, 2013

Snoop-Forge-Replay Attacks on Continuous Verification With Keystrokes.
IEEE Trans. Information Forensics and Security, 2013

Scan-Based Evaluation of Continuous Keystroke Authentication Systems.
IT Professional, 2013

A Non-interactive Dual-channel Authentication Protocol for Assuring Pseudo-confidentiality.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

On Controlling Genuine Reject Rate in Multi-stage Biometric Verification.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2013

Modeling privacy settings of an online social network from a game-theoretical perspective.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

When kids' toys breach mobile phone security.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms.
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013

2012
Dynamical System Theory for the Detection of Anomalous Behavior in Computer Programs.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2012

A prediction based approach to IP traceback.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Transforming animals in a cyber-behavioral biometric menagerie with Frog-Boiling attacks.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012

New impostor score based rejection methods for continuous keystroke verification with weak templates.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012

2011
On the discriminability of keystroke feature vectors used in fixed text keystroke authentication.
Pattern Recognition Letters, 2011

Design of a smart biomarker for bioremediation: A machine learning approach.
Comp. in Bio. and Med., 2011

On the Complexity of Aggregating Information for Authentication and Profiling.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2011

Web Farm-inspired Computational Cluster in the Cloud.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

2010
On Guo and Nixon's Criterion for Feature Subset Selection: Assumptions, Implications, and Alternative Options.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2010

On the Feature Selection Criterion Based on an Approximation of Multidimensional Mutual Information.
IEEE Trans. Pattern Anal. Mach. Intell., 2010

Size-based scheduling: a recipe for DDOS?
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Fuzzy Evaluation of Agent-Based Semantic Match-Making Algorithm for Cyberspace.
Int. J. Semantic Computing, 2009

Reduction of noise due to systematic uncertainties in 113mIn SPECT imaging using information theory.
Comp. in Bio. and Med., 2009

Multi-hop scheduling and local data link aggregation dependant Qos in modeling and simulation of power-aware wireless sensor networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

Defining A New Type of Global Information Architecture for Contextual Information Processing.
Proceedings of the 2009 International Conference on Information & Knowledge Engineering, 2009

A simple and efficient video image clustering algorithm for person specific query and image retrieval.
Proceedings of the First International Conference on Internet Multimedia Computing and Service, 2009

Security models for contextual based global processing an architecture and overview.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

2008
Classification of radio elements using mutual information: A tool for geological mapping.
Int. J. Applied Earth Observation and Geoinformation, 2008

2007
K-Means+ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning Methods.
IEEE Trans. Knowl. Data Eng., 2007

On the Relationship Between Dependence Tree Classification Error and Bayes Error Rate.
IEEE Trans. Pattern Anal. Mach. Intell., 2007

A Divergence-measure Based Classification Method for Detecting Anomalies in Network Traffic.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2007

Genetic Algorithm Approach for Resource Allocation in Multi-User OFDM Systems.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

Situation-Aware Software Engineering for Sensor Networks.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

Competition between SOM Clusters to Model User Authentication System in Computer Networks.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

2005
A parallel decision tree-based method for user authentication based on keystroke patterns.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 2005

Early detection and propagation mitigation of worm programs.
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

The bipartite clique: a topological paradigm for WWWeb user search customization.
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

Investigating hidden Markov models capabilities in anomaly detection.
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

2004
Supervisory Control of Software Systems.
IEEE Trans. Computers, 2004

Adaptive Neural Network Clustering of Web Users.
IEEE Computer, 2004

Neural Network-Based Reputation Model in a Distributed System.
Proceedings of the 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 2004

An Adaptive Recommendation Trust Model in Multiagent System.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004), 2004

Opinion Filtered Recommendation Trust Model in Peer-to-Peer Networks.
Proceedings of the Agents and Peer-to-Peer Computing, Third International Workshop, 2004

2002
Faster Web Page Allocation with Neural Networks.
IEEE Internet Computing, 2002

A New Efficient Edge Extraction Algorithm for Images Using Directional Tracing Techniques.
Intelligent Automation & Soft Computing, 2002

An Adaptive Web Cache Access Predictor Using Neural Network.
Proceedings of the Developments in Applied Artificial Intelligence, 2002

Internet security dictionary.
Springer, ISBN: 978-0-387-95261-1, 2002

2001
The DMCA Needs Fixing.
Commun. ACM, 2001

An interactive dynamic model for integrating knowledge management methods and knowledge sharing technology in a traditional classroom.
Proceedings of the 32rd SIGCSE Technical Symposium on Computer Science Education, 2001

Web user clustering from access log using belief function.
Proceedings of the First International Conference on Knowledge Capture (K-CAP 2001), 2001

1999
Can a Course Be Taught Entirely Via Email?
Commun. ACM, 1999

1998
Review of "Discrete Neural Networks: A Theoretical Foundation by Kai-Yeung Siu, Vwani Roychowdhury and Thomas Kailath", Prentice Hall PTR, 1995, ISBN 0-13-300708-1.
SIGART Bulletin, 1998

1997
A Standard for Software Documentation.
IEEE Computer, 1997

1996
Corrections to "Image Recovery and Segmentation Using Competitive Learning in a Layered Network.
IEEE Trans. Neural Networks, 1996

Image recovery and segmentation using competitive learning in a layered network.
IEEE Trans. Neural Networks, 1996

1995
Decision support and executive information systems : by Paul Gray (editor) (1994; Pages 469; Prentice Hall, Englewood Cliffs, NJ 07632, USA; ISBN 0-13-235789-5).
Decision Support Systems, 1995


  Loading...