HMOG: New behavioral biometric features for continuous authentication of smartphone users Z Sitová, J Šeděnka, Q Yang, G Peng, G Zhou, P Gasti, KS Balagani IEEE Transactions on Information Forensics and Security 11 (5), 877-892, 2015 | 484 | 2015 |
K-Means+ ID3: A novel method for supervised anomaly detection by cascading K-Means clustering and ID3 decision tree learning methods SR Gaddam, VV Phoha, KS Balagani IEEE transactions on knowledge and data engineering 19 (3), 345-354, 2007 | 283 | 2007 |
On the discriminability of keystroke feature vectors used in fixed text keystroke authentication KS Balagani, VV Phoha, A Ray, S Phoha Pattern Recognition Letters 32 (7), 1070-1080, 2011 | 110 | 2011 |
On inferring browsing activity on smartphones via USB power analysis side-channel Q Yang, P Gasti, G Zhou, A Farajidavar, KS Balagani IEEE Transactions on Information Forensics and Security 12 (5), 1056-1066, 2016 | 92 | 2016 |
Dimension reduction using feature extraction methods for Real-time misuse detection systems GK Kuchimanchi, VV Phoha, KS Balagani, SR Gaddam Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop …, 2004 | 74 | 2004 |
Adaptive neural network clustering of Web users SK Rangarajan, VV Phoha, KS Balagani, RR Selmic, SS Iyengar Computer 37 (4), 34-40, 2004 | 74 | 2004 |
Snoop-forge-replay attacks on continuous verification with keystrokes KA Rahman, KS Balagani, VV Phoha IEEE Transactions on information forensics and security 8 (3), 528-541, 2013 | 73 | 2013 |
On the feature selection criterion based on an approximation of multidimensional mutual information KS Balagani, VV Phoha IEEE Transactions on pattern analysis and machine intelligence 32 (7), 1342-1343, 2010 | 72 | 2010 |
A weighted metric based adaptive algorithm for web server load balancing DC Shadrach, KS Balagani, VV Phoha 2009 Third International Symposium on Intelligent Information Technology …, 2009 | 71 | 2009 |
Utilizing linguistically enhanced keystroke dynamics to predict typist cognition and demographics DG Brizan, A Goodkind, P Koch, K Balagani, VV Phoha, A Rosenberg International Journal of Human-Computer Studies 82, 57-68, 2015 | 67 | 2015 |
Method to indentify anomalous data using cascaded K-Means clustering and an ID3 decision tree VV Phoha, KS Balagani US Patent 7,792,770, 2010 | 66 | 2010 |
A multimodal data set for evaluating continuous authentication performance in smartphones Q Yang, G Peng, DT Nguyen, X Qi, G Zhou, Z Sitová, P Gasti, KS Balagani Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems …, 2014 | 60 | 2014 |
Secure outsourced biometric authentication with performance evaluation on smartphones J Šeděnka, S Govindarajan, P Gasti, KS Balagani IEEE Transactions on Information Forensics and Security 10 (2), 384-396, 2014 | 57 | 2014 |
Secure, fast, and energy-efficient outsourced authentication for smartphones P Gasti, J Šeděnka, Q Yang, G Zhou, KS Balagani IEEE Transactions on Information Forensics and Security 11 (11), 2556-2571, 2016 | 51 | 2016 |
An enhanced WLAN security system with FPGA implementation for multimedia applications T Hayajneh, S Ullah, BJ Mohd, KS Balagani IEEE Systems Journal 11 (4), 2536-2545, 2015 | 43 | 2015 |
Secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users with touch data S Govindarajan, P Gasti, KS Balagani 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications …, 2013 | 43 | 2013 |
Continuous authentication with cognition-centric text production and revision features H Locklear, S Govindarajan, Z Sitová, A Goodkind, DG Brizan, ... Ieee international joint conference on biometrics, 1-8, 2014 | 41 | 2014 |
Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes KA Rahman, KS Balagani, VV Phoha CVPR 2011 workshops, 31-38, 2011 | 40 | 2011 |
Transforming animals in a cyber-behavioral biometric menagerie with frog-boiling attacks Z Wang, A Serwadda, KS Balagani, VV Phoha 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications …, 2012 | 35 | 2012 |
Automatic identification of solid-phase medication intake using wireless wearable accelerometers R Wang, Z Sitová, X Jia, X He, T Abramson, P Gasti, KS Balagani, ... 2014 36th Annual International Conference of the IEEE Engineering in …, 2014 | 29 | 2014 |