Следене
Vir V Phoha
Vir V Phoha
Потвърден имейл адрес: syr.edu - Начална страница
Заглавие
Позовавания
Позовавания
Година
Fake news early detection: A theory-driven model
X Zhou, A Jain, VV Phoha, R Zafarani
Digital Threats: Research and Practice 1 (2), 1-25, 2020
3322020
A survey on gait recognition
C Wan, L Wang, VV Phoha
ACM Computing Surveys (CSUR) 51 (5), 1-35, 2018
3112018
K-Means+ ID3: A novel method for supervised anomaly detection by cascading K-Means clustering and ID3 decision tree learning methods
SR Gaddam, VV Phoha, KS Balagani
IEEE transactions on knowledge and data engineering 19 (3), 345-354, 2007
2772007
Beware, your hands reveal your secrets!
D Shukla, R Kumar, A Serwadda, VV Phoha
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1812014
Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms
A Serwadda, VV Phoha, Z Wang
2013 IEEE sixth international conference on biometrics: theory, applications …, 2013
1732013
Context-aware active authentication using smartphone accelerometer measurements
A Primo, VV Phoha, R Kumar, A Serwadda
Proceedings of the IEEE conference on computer vision and pattern …, 2014
1692014
A chipless RFID sensor system for cyber centric monitoring applications
S Shrestha, M Balachandran, M Agarwal, VV Phoha, K Varahramyan
IEEE Transactions on Microwave Theory and Techniques 57 (5), 1303-1309, 2009
1692009
Investigating hidden Markov models capabilities in anomaly detection
SS Joshi, VV Phoha
Proceedings of the 43rd annual Southeast regional conference-Volume 1, 98-103, 2005
1542005
A parallel decision tree-based method for user authentication based on keystroke patterns
Y Sheng, VV Phoha, SM Rovnyak
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 35 …, 2005
1462005
Foundations of wavelet networks and applications
SS Iyengar, VV Phoha
Chapman and Hall/CRC, 2018
1302018
EarEcho: Using ear canal echo for wearable authentication
Y Gao, W Wang, VV Phoha, W Sun, Z Jin
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2019
1292019
Web user clustering from access log using belief function
Y Xie, VV Phoha
Proceedings of the 1st international conference on Knowledge capture, 202-208, 2001
1162001
Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns
R Kumar, VV Phoha, A Serwadda
2016 IEEE 8th international conference on biometrics theory, applications …, 2016
1132016
When kids' toys breach mobile phone security
A Serwadda, VV Phoha
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1132013
On the discriminability of keystroke feature vectors used in fixed text keystroke authentication
KS Balagani, VV Phoha, A Ray, S Phoha
Pattern Recognition Letters 32 (7), 1070-1080, 2011
1102011
Detecting malicious defects in 3D printing process using machine learning and image classification
M Wu, VV Phoha, YB Moon, AK Belman
ASME international mechanical engineering congress and exposition 50688 …, 2016
1012016
Wireless Sensor Networks
RR Selmic, VV Phoha, A Serwadda
Springer International Publishing AG, 2016
80*2016
Examining a large keystroke biometrics dataset for statistical-attack openings
A Serwadda, VV Phoha
ACM Transactions on Information and System Security (TISSEC) 16 (2), 1-30, 2013
752013
Dimension reduction using feature extraction methods for Real-time misuse detection systems
GK Kuchimanchi, VV Phoha, KS Balagani, SR Gaddam
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop …, 2004
742004
Adaptive neural network clustering of Web users
SK Rangarajan, VV Phoha, KS Balagani, RR Selmic, SS Iyengar
Computer 37 (4), 34-40, 2004
742004
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20