Fake news early detection: A theory-driven model X Zhou, A Jain, VV Phoha, R Zafarani Digital Threats: Research and Practice 1 (2), 1-25, 2020 | 352 | 2020 |
A survey on gait recognition C Wan, L Wang, VV Phoha ACM Computing Surveys (CSUR) 51 (5), 1-35, 2018 | 343 | 2018 |
K-Means+ ID3: A novel method for supervised anomaly detection by cascading K-Means clustering and ID3 decision tree learning methods SR Gaddam, VV Phoha, KS Balagani IEEE transactions on knowledge and data engineering 19 (3), 345-354, 2007 | 283 | 2007 |
Beware, your hands reveal your secrets! D Shukla, R Kumar, A Serwadda, VV Phoha Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 189 | 2014 |
Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms A Serwadda, VV Phoha, Z Wang 2013 IEEE sixth international conference on biometrics: theory, applications …, 2013 | 175 | 2013 |
Context-aware active authentication using smartphone accelerometer measurements A Primo, VV Phoha, R Kumar, A Serwadda Proceedings of the IEEE conference on computer vision and pattern …, 2014 | 172 | 2014 |
A chipless RFID sensor system for cyber centric monitoring applications S Shrestha, M Balachandran, M Agarwal, VV Phoha, K Varahramyan IEEE Transactions on Microwave Theory and Techniques 57 (5), 1303-1309, 2009 | 171 | 2009 |
Investigating hidden Markov models capabilities in anomaly detection SS Joshi, VV Phoha Proceedings of the 43rd annual Southeast regional conference-Volume 1, 98-103, 2005 | 157 | 2005 |
EarEcho: Using ear canal echo for wearable authentication Y Gao, W Wang, VV Phoha, W Sun, Z Jin Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2019 | 147 | 2019 |
A parallel decision tree-based method for user authentication based on keystroke patterns Y Sheng, VV Phoha, SM Rovnyak IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 35 …, 2005 | 146 | 2005 |
Foundations of wavelet networks and applications SS Iyengar, VV Phoha Chapman and Hall/CRC, 2018 | 130 | 2018 |
Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns R Kumar, VV Phoha, A Serwadda 2016 IEEE 8th international conference on biometrics theory, applications …, 2016 | 119 | 2016 |
Web user clustering from access log using belief function Y Xie, VV Phoha Proceedings of the 1st international conference on Knowledge capture, 202-208, 2001 | 117 | 2001 |
When kids' toys breach mobile phone security A Serwadda, VV Phoha Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 116 | 2013 |
On the discriminability of keystroke feature vectors used in fixed text keystroke authentication KS Balagani, VV Phoha, A Ray, S Phoha Pattern Recognition Letters 32 (7), 1070-1080, 2011 | 110 | 2011 |
Detecting malicious defects in 3D printing process using machine learning and image classification M Wu, VV Phoha, YB Moon, AK Belman ASME international mechanical engineering congress and exposition 50688 …, 2016 | 105 | 2016 |
Wireless Sensor Networks RR Selmic, VV Phoha, A Serwadda Springer International Publishing AG, 2016 | 83* | 2016 |
Examining a large keystroke biometrics dataset for statistical-attack openings A Serwadda, VV Phoha ACM Transactions on Information and System Security (TISSEC) 16 (2), 1-30, 2013 | 77 | 2013 |
Curie: A method for protecting SVM classifier from poisoning attack R Laishram, VV Phoha arXiv preprint arXiv:1606.01584, 2016 | 74 | 2016 |
Dimension reduction using feature extraction methods for Real-time misuse detection systems GK Kuchimanchi, VV Phoha, KS Balagani, SR Gaddam Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop …, 2004 | 74 | 2004 |