Kiran S Balagani
Title
Cited by
Cited by
Year
HMOG: New behavioral biometric features for continuous authentication of smartphone users
Z Sitová, J Šeděnka, Q Yang, G Peng, G Zhou, P Gasti, KS Balagani
IEEE Transactions on Information Forensics and Security 11 (5), 877-892, 2015
2932015
K-Means+ ID3: A novel method for supervised anomaly detection by cascading K-Means clustering and ID3 decision tree learning methods
SR Gaddam, VV Phoha, KS Balagani
IEEE transactions on knowledge and data engineering 19 (3), 345-354, 2007
2302007
On the discriminability of keystroke feature vectors used in fixed text keystroke authentication
KS Balagani, VV Phoha, A Ray, S Phoha
Pattern Recognition Letters 32 (7), 1070-1080, 2011
922011
Dimension reduction using feature extraction methods for Real-time misuse detection systems
GK Kuchimanchi, VV Phoha, KS Balagani, SR Gaddam
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop …, 2004
732004
Adaptive neural network clustering of Web users
SK Rangarajan, VV Phoha, KS Balagani, RR Selmic, SS Iyengar
Computer 37 (4), 34-40, 2004
702004
On the feature selection criterion based on an approximation of multidimensional mutual information
KS Balagani, VV Phoha
IEEE Transactions on pattern analysis and machine intelligence 32 (7), 1342-1343, 2010
632010
Snoop-forge-replay attacks on continuous verification with keystrokes
KA Rahman, KS Balagani, VV Phoha
IEEE Transactions on information forensics and security 8 (3), 528-541, 2013
582013
A weighted metric based adaptive algorithm for web server load balancing
DC Shadrach, KS Balagani, VV Phoha
2009 Third International Symposium on Intelligent Information Technology …, 2009
562009
Utilizing linguistically enhanced keystroke dynamics to predict typist cognition and demographics
DG Brizan, A Goodkind, P Koch, K Balagani, VV Phoha, A Rosenberg
International Journal of Human-Computer Studies 82, 57-68, 2015
502015
On inferring browsing activity on smartphones via USB power analysis side-channel
Q Yang, P Gasti, G Zhou, A Farajidavar, KS Balagani
IEEE Transactions on Information Forensics and Security 12 (5), 1056-1066, 2016
472016
Method to indentify anomalous data using cascaded K-Means clustering and an ID3 decision tree
VV Phoha, KS Balagani
US Patent 7,792,770, 2010
472010
Secure outsourced biometric authentication with performance evaluation on smartphones
J Šeděnka, S Govindarajan, P Gasti, KS Balagani
IEEE Transactions on Information Forensics and Security 10 (2), 384-396, 2014
462014
Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes
KA Rahman, KS Balagani, VV Phoha
CVPR 2011 workshops, 31-38, 2011
362011
An enhanced WLAN security system with FPGA implementation for multimedia applications
T Hayajneh, S Ullah, BJ Mohd, KS Balagani
IEEE Systems Journal 11 (4), 2536-2545, 2015
342015
Secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users with touch data
S Govindarajan, P Gasti, KS Balagani
2013 IEEE Sixth International Conference on Biometrics: Theory, Applications …, 2013
312013
Continuous authentication with cognition-centric text production and revision features
H Locklear, S Govindarajan, Z Sitová, A Goodkind, DG Brizan, ...
IEEE International Joint Conference on Biometrics, 1-8, 2014
302014
Secure, fast, and energy-efficient outsourced authentication for smartphones
P Gasti, J Šeděnka, Q Yang, G Zhou, KS Balagani
IEEE Transactions on Information Forensics and Security 11 (11), 2556-2571, 2016
292016
Transforming animals in a cyber-behavioral biometric menagerie with frog-boiling attacks
Z Wang, A Serwadda, KS Balagani, VV Phoha
2012 IEEE Fifth International Conference on Biometrics: Theory, Applications …, 2012
272012
A multimodal data set for evaluating continuous authentication performance in smartphones
Q Yang, G Peng, DT Nguyen, X Qi, G Zhou, Z Sitová, P Gasti, KS Balagani
Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems …, 2014
262014
Web user clustering and its application to prefetching using ART neural networks
SK Rangarajan, VV Phoha, K Balagani, RR Selmic, SS Iyengar
IEEE Computer, 45-62, 2004
242004
The system can't perform the operation now. Try again later.
Articles 1–20