Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Kiran S. Balagani
@inproceedings{DBLP:conf/esorics/BalaganiCCCT22, author = {Kiran S. Balagani and Matteo Cardaioli and Stefano Cecconello and Mauro Conti and Gene Tsudik}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {We Can Hear Your {PIN} Drop: An Acoustic Side-Channel Attack on {ATM} {PIN} Pads}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13554}, pages = {633--652}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17140-6\_31}, doi = {10.1007/978-3-031-17140-6\_31}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BalaganiCCCT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/paa/HossainBP21, author = {Md. Shafaeat Hossain and Kiran S. Balagani and Vir V. Phoha}, title = {Effectiveness of symmetric rejection for a secure and user convenient multistage biometric system}, journal = {Pattern Anal. Appl.}, volume = {24}, number = {1}, pages = {49--60}, year = {2021}, url = {https://doi.org/10.1007/s10044-020-00899-0}, doi = {10.1007/S10044-020-00899-0}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/paa/HossainBP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/AnandDGOCB20, author = {Santhanakrishnan Anand and Ding Ding and Paolo Gasti and Mike O'Neal and Mauro Conti and Kiran S. Balagani}, title = {{DISPERSE:} {A} Decentralized Architecture for Content Replication Resilient to Node Failures}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {17}, number = {1}, pages = {201--212}, year = {2020}, url = {https://doi.org/10.1109/TNSM.2019.2936425}, doi = {10.1109/TNSM.2019.2936425}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/AnandDGOCB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CardaioliCBG20, author = {Matteo Cardaioli and Mauro Conti and Kiran S. Balagani and Paolo Gasti}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {Your {PIN} Sounds Good! Augmentation of {PIN} Guessing Strategies via Audio Leakage}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12308}, pages = {720--735}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58951-6\_35}, doi = {10.1007/978-3-030-58951-6\_35}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CardaioliCBG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BalaganiCCGGGLM19, author = {Kiran S. Balagani and Matteo Cardaioli and Mauro Conti and Paolo Gasti and Martin Georgiev and Tristan Gurtler and Daniele Lain and Charissa Miller and Kendall Molas and Nikita Samarin and Eugen Saraci and Gene Tsudik and Lynn Wu}, title = {{PILOT:} Password and {PIN} information leakage from obfuscated typing videos}, journal = {J. Comput. Secur.}, volume = {27}, number = {4}, pages = {405--425}, year = {2019}, url = {https://doi.org/10.3233/JCS-191289}, doi = {10.3233/JCS-191289}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BalaganiCCGGGLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangPGBLZ19, author = {Qing Yang and Ge Peng and Paolo Gasti and Kiran S. Balagani and Yantao Li and Gang Zhou}, title = {{MEG:} Memory and Energy Efficient Garbled Circuit Evaluation on Smartphones}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {4}, pages = {913--922}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2018.2868221}, doi = {10.1109/TIFS.2018.2868221}, timestamp = {Fri, 26 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangPGBLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-00188, author = {Kiran S. Balagani and Matteo Cardaioli and Mauro Conti and Paolo Gasti and Martin Georgiev and Tristan Gurtler and Daniele Lain and Charissa Miller and Kendall Molas and Nikita Samarin and Eugen Saraci and Gene Tsudik and Lynn Wu}, title = {{PILOT:} Password and {PIN} Information Leakage from Obfuscated Typing Videos}, journal = {CoRR}, volume = {abs/1904.00188}, year = {2019}, url = {http://arxiv.org/abs/1904.00188}, eprinttype = {arXiv}, eprint = {1904.00188}, timestamp = {Wed, 24 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-00188.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-08742, author = {Matteo Cardaioli and Mauro Conti and Kiran S. Balagani and Paolo Gasti}, title = {Your {PIN} Sounds Good! On The Feasibility of {PIN} Inference Through Audio Leakage}, journal = {CoRR}, volume = {abs/1905.08742}, year = {2019}, url = {http://arxiv.org/abs/1905.08742}, eprinttype = {arXiv}, eprint = {1905.08742}, timestamp = {Wed, 29 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-08742.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/YangGBLZ18, author = {Qing Yang and Paolo Gasti and Kiran S. Balagani and Yantao Li and Gang Zhou}, title = {{USB} side-channel attack on Tor}, journal = {Comput. Networks}, volume = {141}, pages = {57--66}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.05.018}, doi = {10.1016/J.COMNET.2018.05.018}, timestamp = {Fri, 26 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/YangGBLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BalaganiGERO18, author = {Kiran S. Balagani and Paolo Gasti and Aaron Elliott and Azriel Richardson and Mike O'Neal}, title = {The impact of application context on privacy and performance of keystroke authentication systems}, journal = {J. Comput. Secur.}, volume = {26}, number = {4}, pages = {543--556}, year = {2018}, url = {https://doi.org/10.3233/JCS-171017}, doi = {10.3233/JCS-171017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BalaganiGERO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BalaganiCGGGLMM18, author = {Kiran S. Balagani and Mauro Conti and Paolo Gasti and Martin Georgiev and Tristan Gurtler and Daniele Lain and Charissa Miller and Kendall Molas and Nikita Samarin and Eugen Saraci and Gene Tsudik and Lynn Wu}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {{SILK-TV:} Secret Information Leakage from Keystroke Timing Videos}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {263--280}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_13}, doi = {10.1007/978-3-319-99073-6\_13}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BalaganiCGGGLMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-08180, author = {Md. Enamul Karim and Kiran S. Balagani and Aaron Elliott and David Irakiza and Mike O'Neal and Vir V. Phoha}, title = {Active Authentication of Keyboard Users: Performance Evaluation on 736 Subjects}, journal = {CoRR}, volume = {abs/1804.08180}, year = {2018}, url = {http://arxiv.org/abs/1804.08180}, eprinttype = {arXiv}, eprint = {1804.08180}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-08180.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/HayajnehUMB17, author = {Thaier Hayajneh and Sana Ullah and Bassam Jamil Mohd and Kiran S. Balagani}, title = {An Enhanced {WLAN} Security System With {FPGA} Implementation for Multimedia Applications}, journal = {{IEEE} Syst. J.}, volume = {11}, number = {4}, pages = {2536--2545}, year = {2017}, url = {https://doi.org/10.1109/JSYST.2015.2424702}, doi = {10.1109/JSYST.2015.2424702}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/HayajnehUMB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangGZFB17, author = {Qing Yang and Paolo Gasti and Gang Zhou and Aydin Farajidavar and Kiran S. Balagani}, title = {On Inferring Browsing Activity on Smartphones via {USB} Power Analysis Side-Channel}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {5}, pages = {1056--1066}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2639446}, doi = {10.1109/TIFS.2016.2639446}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangGZFB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SitovaSYPZGB16, author = {Zdenka Sitova and Jaroslav Sedenka and Qing Yang and Ge Peng and Gang Zhou and Paolo Gasti and Kiran S. Balagani}, title = {{HMOG:} New Behavioral Biometric Features for Continuous Authentication of Smartphone Users}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {5}, pages = {877--892}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2506542}, doi = {10.1109/TIFS.2015.2506542}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SitovaSYPZGB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GastiS0ZB16, author = {Paolo Gasti and Jaroslav Sedenka and Qing Yang and Gang Zhou and Kiran S. Balagani}, title = {Secure, Fast, and Energy-Efficient Outsourced Authentication for Smartphones}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {11}, pages = {2556--2571}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2585093}, doi = {10.1109/TIFS.2016.2585093}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GastiS0ZB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/BrizanGKBPR15, author = {David Guy Brizan and Adam Goodkind and Patrick Koch and Kiran S. Balagani and Vir V. Phoha and Andrew Rosenberg}, title = {Utilizing linguistically enhanced keystroke dynamics to predict typist cognition and demographics}, journal = {Int. J. Hum. Comput. Stud.}, volume = {82}, pages = {57--68}, year = {2015}, url = {https://doi.org/10.1016/j.ijhcs.2015.04.005}, doi = {10.1016/J.IJHCS.2015.04.005}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmms/BrizanGKBPR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/sedenkaGGB15, author = {Jaroslav Sedenka and Sathya Govindarajan and Paolo Gasti and Kiran S. Balagani}, title = {Secure Outsourced Biometric Authentication With Performance Evaluation on Smartphones}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {2}, pages = {384--396}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2375571}, doi = {10.1109/TIFS.2014.2375571}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/sedenkaGGB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SitovaSYPZGB15, author = {Zdenka Sitova and Jaroslav Sedenka and Qing Yang and Ge Peng and Gang Zhou and Paolo Gasti and Kiran S. Balagani}, title = {{HMOG:} {A} New Biometric Modality for Continuous Authentication of Smartphone Users}, journal = {CoRR}, volume = {abs/1501.01199}, year = {2015}, url = {http://arxiv.org/abs/1501.01199}, eprinttype = {arXiv}, eprint = {1501.01199}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SitovaSYPZGB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/embc/WangSJHAGBF14, author = {Rui Wang and Zdenka Sitova and Xiaoqing Jia and Xiang He and Tobi Abramson and Paolo Gasti and Kiran S. Balagani and Aydin Farajidavar}, title = {Automatic identification of solid-phase medication intake using wireless wearable accelerometers}, booktitle = {36th Annual International Conference of the {IEEE} Engineering in Medicine and Biology Society, {EMBC} 2014, Chicago, IL, USA, August 26-30, 2014}, pages = {4168--4171}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/EMBC.2014.6944542}, doi = {10.1109/EMBC.2014.6944542}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/embc/WangSJHAGBF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/LocklearGSGBRPGB14, author = {Hilbert Locklear and Sathya Govindarajan and Zdenka Sitova and Adam Goodkind and David Guy Brizan and Andrew Rosenberg and Vir V. Phoha and Paolo Gasti and Kiran S. Balagani}, title = {Continuous authentication with cognition-centric text production and revision features}, booktitle = {{IEEE} International Joint Conference on Biometrics, Clearwater, {IJCB} 2014, FL, USA, September 29 - October 2, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/BTAS.2014.6996227}, doi = {10.1109/BTAS.2014.6996227}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icb/LocklearGSGBRPGB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/SedenkaBPG14, author = {Jaroslav Sedenka and Kiran S. Balagani and Vir V. Phoha and Paolo Gasti}, title = {Privacy-preserving population-enhanced biometric key generation from free-text keystroke dynamics}, booktitle = {{IEEE} International Joint Conference on Biometrics, Clearwater, {IJCB} 2014, FL, USA, September 29 - October 2, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/BTAS.2014.6996244}, doi = {10.1109/BTAS.2014.6996244}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icb/SedenkaBPG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sensys/YangPNQZSGB14, author = {Qing Yang and Ge Peng and David T. Nguyen and Xin Qi and Gang Zhou and Zdenka Sitova and Paolo Gasti and Kiran S. Balagani}, editor = {{\'{A}}kos L{\'{e}}deczi and Prabal Dutta and Chenyang Lu}, title = {A multimodal data set for evaluating continuous authentication performance in smartphones}, booktitle = {Proceedings of the 12th {ACM} Conference on Embedded Network Sensor Systems, SenSys '14, Memphis, Tennessee, USA, November 3-6, 2014}, pages = {358--359}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2668332.2668366}, doi = {10.1145/2668332.2668366}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sensys/YangPNQZSGB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SedenkaBPG14, author = {Jaroslav Sedenka and Kiran S. Balagani and Vir V. Phoha and Paolo Gasti}, title = {Privacy-Preserving Population-Enhanced Biometric Key Generation from Free-Text Keystroke Dynamics}, journal = {CoRR}, volume = {abs/1407.4179}, year = {2014}, url = {http://arxiv.org/abs/1407.4179}, eprinttype = {arXiv}, eprint = {1407.4179}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SedenkaBPG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/SerwaddaWKGPGBRPB13, author = {Abdul Serwadda and Zibo Wang and Patrick Koch and Sathya Govindarajan and Raviteja Pokala and Adam Goodkind and David Guy Brizan and Andrew Rosenberg and Vir V. Phoha and Kiran S. Balagani}, title = {Scan-Based Evaluation of Continuous Keystroke Authentication Systems}, journal = {{IT} Prof.}, volume = {15}, number = {4}, pages = {20--23}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.51}, doi = {10.1109/MITP.2013.51}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itpro/SerwaddaWKGPGBRPB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RahmanBP13, author = {Khandaker Abir Rahman and Kiran S. Balagani and Vir V. Phoha}, title = {Snoop-Forge-Replay Attacks on Continuous Verification With Keystrokes}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {3}, pages = {528--541}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2013.2244091}, doi = {10.1109/TIFS.2013.2244091}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RahmanBP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/btas/GovindarajanGB13, author = {Sathya Govindarajan and Paolo Gasti and Kiran S. Balagani}, title = {Secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users with touch data}, booktitle = {{IEEE} Sixth International Conference on Biometrics: Theory, Applications and Systems, {BTAS} 2013, Arlington, VA, USA, September 29 - October 2, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/BTAS.2013.6712742}, doi = {10.1109/BTAS.2013.6712742}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/btas/GovindarajanGB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/HossainBP13, author = {Md. Shafaeat Hossain and Kiran S. Balagani and Vir V. Phoha}, title = {On Controlling Genuine Reject Rate in Multi-stage Biometric Verification}, booktitle = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} Workshops 2013, Portland, OR, USA, June 23-28, 2013}, pages = {194--199}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CVPRW.2013.36}, doi = {10.1109/CVPRW.2013.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/HossainBP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/btas/HossainBP12, author = {Md. Shafaeat Hossain and Kiran S. Balagani and Vir V. Phoha}, title = {New impostor score based rejection methods for continuous keystroke verification with weak templates}, booktitle = {{IEEE} Fifth International Conference on Biometrics: Theory, Applications and Systems, {BTAS} 2012, Arlington, VA, USA, September 23-27, 2012}, pages = {251--258}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/BTAS.2012.6374585}, doi = {10.1109/BTAS.2012.6374585}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/btas/HossainBP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/btas/WangSBP12, author = {Zibo Wang and Abdul Serwadda and Kiran S. Balagani and Vir V. Phoha}, title = {Transforming animals in a cyber-behavioral biometric menagerie with Frog-Boiling attacks}, booktitle = {{IEEE} Fifth International Conference on Biometrics: Theory, Applications and Systems, {BTAS} 2012, Arlington, VA, USA, September 23-27, 2012}, pages = {289--296}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/BTAS.2012.6374591}, doi = {10.1109/BTAS.2012.6374591}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/btas/WangSBP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/prl/BalaganiPRP11, author = {Kiran S. Balagani and Vir V. Phoha and Asok Ray and Shashi Phoha}, title = {On the discriminability of keystroke feature vectors used in fixed text keystroke authentication}, journal = {Pattern Recognit. Lett.}, volume = {32}, number = {7}, pages = {1070--1080}, year = {2011}, url = {https://doi.org/10.1016/j.patrec.2011.02.014}, doi = {10.1016/J.PATREC.2011.02.014}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/prl/BalaganiPRP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/RahmanBP11, author = {Khandaker Abir Rahman and Kiran S. Balagani and Vir V. Phoha}, title = {Making impostor pass rates meaningless: {A} case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes}, booktitle = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} Workshops 2011, Colorado Springs, CO, USA, 20-25 June, 2011}, pages = {31--38}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CVPRW.2011.5981729}, doi = {10.1109/CVPRW.2011.5981729}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/RahmanBP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pami/BalaganiP10, author = {Kiran S. Balagani and Vir V. Phoha}, title = {On the Feature Selection Criterion Based on an Approximation of Multidimensional Mutual Information}, journal = {{IEEE} Trans. Pattern Anal. Mach. Intell.}, volume = {32}, number = {7}, pages = {1342--1343}, year = {2010}, url = {https://doi.org/10.1109/TPAMI.2010.62}, doi = {10.1109/TPAMI.2010.62}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pami/BalaganiP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/BalaganiPIB10, author = {Kiran S. Balagani and Vir V. Phoha and S. Sitharama Iyengar and N. Balakrishnan}, title = {On Guo and Nixon's Criterion for Feature Subset Selection: Assumptions, Implications, and Alternative Options}, journal = {{IEEE} Trans. Syst. Man Cybern. Part {A}}, volume = {40}, number = {3}, pages = {651--655}, year = {2010}, url = {https://doi.org/10.1109/TSMCA.2009.2036935}, doi = {10.1109/TSMCA.2009.2036935}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/BalaganiPIB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pami/BalaganiP07, author = {Kiran S. Balagani and Vir V. Phoha}, title = {On the Relationship Between Dependence Tree Classification Error and Bayes Error Rate}, journal = {{IEEE} Trans. Pattern Anal. Mach. Intell.}, volume = {29}, number = {10}, pages = {1866--1868}, year = {2007}, url = {https://doi.org/10.1109/TPAMI.2007.1184}, doi = {10.1109/TPAMI.2007.1184}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pami/BalaganiP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/GaddamPB07, author = {Shekhar R. Gaddam and Vir V. Phoha and Kiran S. Balagani}, title = {K-Means+ID3: {A} Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and {ID3} Decision Tree Learning Methods}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {19}, number = {3}, pages = {345--354}, year = {2007}, url = {https://doi.org/10.1109/TKDE.2007.44}, doi = {10.1109/TKDE.2007.44}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/GaddamPB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnsc/BalaganiPK07, author = {Kiran S. Balagani and Vir V. Phoha and Gopi K. Kuchimanchi}, title = {A Divergence-measure Based Classification Method for Detecting Anomalies in Network Traffic}, booktitle = {Proceedings of the {IEEE} International Conference on Networking, Sensing and Control, {ICNSC} 2007, London, UK, 15-17 April 2007}, pages = {374--379}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ICNSC.2007.372808}, doi = {10.1109/ICNSC.2007.372808}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icnsc/BalaganiPK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/RangarajanPBSI04, author = {Santosh K. Rangarajan and Vir V. Phoha and Kiran S. Balagani and Rastko R. Selmic and S. Sitharama Iyengar}, title = {Adaptive Neural Network Clustering of Web Users}, journal = {Computer}, volume = {37}, number = {4}, pages = {34--40}, year = {2004}, url = {https://doi.org/10.1109/MC.2004.1297299}, doi = {10.1109/MC.2004.1297299}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/RangarajanPBSI04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.