Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

BibTeX records: Kiran S. Balagani

download as .bib file

@inproceedings{DBLP:conf/esorics/BalaganiCCCT22,
  author       = {Kiran S. Balagani and
                  Matteo Cardaioli and
                  Stefano Cecconello and
                  Mauro Conti and
                  Gene Tsudik},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {We Can Hear Your {PIN} Drop: An Acoustic Side-Channel Attack on {ATM}
                  {PIN} Pads},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13554},
  pages        = {633--652},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17140-6\_31},
  doi          = {10.1007/978-3-031-17140-6\_31},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BalaganiCCCT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/paa/HossainBP21,
  author       = {Md. Shafaeat Hossain and
                  Kiran S. Balagani and
                  Vir V. Phoha},
  title        = {Effectiveness of symmetric rejection for a secure and user convenient
                  multistage biometric system},
  journal      = {Pattern Anal. Appl.},
  volume       = {24},
  number       = {1},
  pages        = {49--60},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10044-020-00899-0},
  doi          = {10.1007/S10044-020-00899-0},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/paa/HossainBP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/AnandDGOCB20,
  author       = {Santhanakrishnan Anand and
                  Ding Ding and
                  Paolo Gasti and
                  Mike O'Neal and
                  Mauro Conti and
                  Kiran S. Balagani},
  title        = {{DISPERSE:} {A} Decentralized Architecture for Content Replication
                  Resilient to Node Failures},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {17},
  number       = {1},
  pages        = {201--212},
  year         = {2020},
  url          = {https://doi.org/10.1109/TNSM.2019.2936425},
  doi          = {10.1109/TNSM.2019.2936425},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/AnandDGOCB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CardaioliCBG20,
  author       = {Matteo Cardaioli and
                  Mauro Conti and
                  Kiran S. Balagani and
                  Paolo Gasti},
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {Your {PIN} Sounds Good! Augmentation of {PIN} Guessing Strategies
                  via Audio Leakage},
  booktitle    = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12308},
  pages        = {720--735},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58951-6\_35},
  doi          = {10.1007/978-3-030-58951-6\_35},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CardaioliCBG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BalaganiCCGGGLM19,
  author       = {Kiran S. Balagani and
                  Matteo Cardaioli and
                  Mauro Conti and
                  Paolo Gasti and
                  Martin Georgiev and
                  Tristan Gurtler and
                  Daniele Lain and
                  Charissa Miller and
                  Kendall Molas and
                  Nikita Samarin and
                  Eugen Saraci and
                  Gene Tsudik and
                  Lynn Wu},
  title        = {{PILOT:} Password and {PIN} information leakage from obfuscated typing
                  videos},
  journal      = {J. Comput. Secur.},
  volume       = {27},
  number       = {4},
  pages        = {405--425},
  year         = {2019},
  url          = {https://doi.org/10.3233/JCS-191289},
  doi          = {10.3233/JCS-191289},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BalaganiCCGGGLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangPGBLZ19,
  author       = {Qing Yang and
                  Ge Peng and
                  Paolo Gasti and
                  Kiran S. Balagani and
                  Yantao Li and
                  Gang Zhou},
  title        = {{MEG:} Memory and Energy Efficient Garbled Circuit Evaluation on Smartphones},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {4},
  pages        = {913--922},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2018.2868221},
  doi          = {10.1109/TIFS.2018.2868221},
  timestamp    = {Fri, 26 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangPGBLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-00188,
  author       = {Kiran S. Balagani and
                  Matteo Cardaioli and
                  Mauro Conti and
                  Paolo Gasti and
                  Martin Georgiev and
                  Tristan Gurtler and
                  Daniele Lain and
                  Charissa Miller and
                  Kendall Molas and
                  Nikita Samarin and
                  Eugen Saraci and
                  Gene Tsudik and
                  Lynn Wu},
  title        = {{PILOT:} Password and {PIN} Information Leakage from Obfuscated Typing
                  Videos},
  journal      = {CoRR},
  volume       = {abs/1904.00188},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.00188},
  eprinttype    = {arXiv},
  eprint       = {1904.00188},
  timestamp    = {Wed, 24 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-00188.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-08742,
  author       = {Matteo Cardaioli and
                  Mauro Conti and
                  Kiran S. Balagani and
                  Paolo Gasti},
  title        = {Your {PIN} Sounds Good! On The Feasibility of {PIN} Inference Through
                  Audio Leakage},
  journal      = {CoRR},
  volume       = {abs/1905.08742},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.08742},
  eprinttype    = {arXiv},
  eprint       = {1905.08742},
  timestamp    = {Wed, 29 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-08742.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/YangGBLZ18,
  author       = {Qing Yang and
                  Paolo Gasti and
                  Kiran S. Balagani and
                  Yantao Li and
                  Gang Zhou},
  title        = {{USB} side-channel attack on Tor},
  journal      = {Comput. Networks},
  volume       = {141},
  pages        = {57--66},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comnet.2018.05.018},
  doi          = {10.1016/J.COMNET.2018.05.018},
  timestamp    = {Fri, 26 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/YangGBLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BalaganiGERO18,
  author       = {Kiran S. Balagani and
                  Paolo Gasti and
                  Aaron Elliott and
                  Azriel Richardson and
                  Mike O'Neal},
  title        = {The impact of application context on privacy and performance of keystroke
                  authentication systems},
  journal      = {J. Comput. Secur.},
  volume       = {26},
  number       = {4},
  pages        = {543--556},
  year         = {2018},
  url          = {https://doi.org/10.3233/JCS-171017},
  doi          = {10.3233/JCS-171017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BalaganiGERO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BalaganiCGGGLMM18,
  author       = {Kiran S. Balagani and
                  Mauro Conti and
                  Paolo Gasti and
                  Martin Georgiev and
                  Tristan Gurtler and
                  Daniele Lain and
                  Charissa Miller and
                  Kendall Molas and
                  Nikita Samarin and
                  Eugen Saraci and
                  Gene Tsudik and
                  Lynn Wu},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {{SILK-TV:} Secret Information Leakage from Keystroke Timing Videos},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {263--280},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_13},
  doi          = {10.1007/978-3-319-99073-6\_13},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BalaganiCGGGLMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-08180,
  author       = {Md. Enamul Karim and
                  Kiran S. Balagani and
                  Aaron Elliott and
                  David Irakiza and
                  Mike O'Neal and
                  Vir V. Phoha},
  title        = {Active Authentication of Keyboard Users: Performance Evaluation on
                  736 Subjects},
  journal      = {CoRR},
  volume       = {abs/1804.08180},
  year         = {2018},
  url          = {http://arxiv.org/abs/1804.08180},
  eprinttype    = {arXiv},
  eprint       = {1804.08180},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-08180.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/HayajnehUMB17,
  author       = {Thaier Hayajneh and
                  Sana Ullah and
                  Bassam Jamil Mohd and
                  Kiran S. Balagani},
  title        = {An Enhanced {WLAN} Security System With {FPGA} Implementation for
                  Multimedia Applications},
  journal      = {{IEEE} Syst. J.},
  volume       = {11},
  number       = {4},
  pages        = {2536--2545},
  year         = {2017},
  url          = {https://doi.org/10.1109/JSYST.2015.2424702},
  doi          = {10.1109/JSYST.2015.2424702},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/HayajnehUMB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangGZFB17,
  author       = {Qing Yang and
                  Paolo Gasti and
                  Gang Zhou and
                  Aydin Farajidavar and
                  Kiran S. Balagani},
  title        = {On Inferring Browsing Activity on Smartphones via {USB} Power Analysis
                  Side-Channel},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {5},
  pages        = {1056--1066},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2639446},
  doi          = {10.1109/TIFS.2016.2639446},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangGZFB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SitovaSYPZGB16,
  author       = {Zdenka Sitova and
                  Jaroslav Sedenka and
                  Qing Yang and
                  Ge Peng and
                  Gang Zhou and
                  Paolo Gasti and
                  Kiran S. Balagani},
  title        = {{HMOG:} New Behavioral Biometric Features for Continuous Authentication
                  of Smartphone Users},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {5},
  pages        = {877--892},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2506542},
  doi          = {10.1109/TIFS.2015.2506542},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SitovaSYPZGB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GastiS0ZB16,
  author       = {Paolo Gasti and
                  Jaroslav Sedenka and
                  Qing Yang and
                  Gang Zhou and
                  Kiran S. Balagani},
  title        = {Secure, Fast, and Energy-Efficient Outsourced Authentication for Smartphones},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {11},
  pages        = {2556--2571},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2585093},
  doi          = {10.1109/TIFS.2016.2585093},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GastiS0ZB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmms/BrizanGKBPR15,
  author       = {David Guy Brizan and
                  Adam Goodkind and
                  Patrick Koch and
                  Kiran S. Balagani and
                  Vir V. Phoha and
                  Andrew Rosenberg},
  title        = {Utilizing linguistically enhanced keystroke dynamics to predict typist
                  cognition and demographics},
  journal      = {Int. J. Hum. Comput. Stud.},
  volume       = {82},
  pages        = {57--68},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijhcs.2015.04.005},
  doi          = {10.1016/J.IJHCS.2015.04.005},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmms/BrizanGKBPR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/sedenkaGGB15,
  author       = {Jaroslav Sedenka and
                  Sathya Govindarajan and
                  Paolo Gasti and
                  Kiran S. Balagani},
  title        = {Secure Outsourced Biometric Authentication With Performance Evaluation
                  on Smartphones},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {2},
  pages        = {384--396},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2375571},
  doi          = {10.1109/TIFS.2014.2375571},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/sedenkaGGB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SitovaSYPZGB15,
  author       = {Zdenka Sitova and
                  Jaroslav Sedenka and
                  Qing Yang and
                  Ge Peng and
                  Gang Zhou and
                  Paolo Gasti and
                  Kiran S. Balagani},
  title        = {{HMOG:} {A} New Biometric Modality for Continuous Authentication of
                  Smartphone Users},
  journal      = {CoRR},
  volume       = {abs/1501.01199},
  year         = {2015},
  url          = {http://arxiv.org/abs/1501.01199},
  eprinttype    = {arXiv},
  eprint       = {1501.01199},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SitovaSYPZGB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/embc/WangSJHAGBF14,
  author       = {Rui Wang and
                  Zdenka Sitova and
                  Xiaoqing Jia and
                  Xiang He and
                  Tobi Abramson and
                  Paolo Gasti and
                  Kiran S. Balagani and
                  Aydin Farajidavar},
  title        = {Automatic identification of solid-phase medication intake using wireless
                  wearable accelerometers},
  booktitle    = {36th Annual International Conference of the {IEEE} Engineering in
                  Medicine and Biology Society, {EMBC} 2014, Chicago, IL, USA, August
                  26-30, 2014},
  pages        = {4168--4171},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/EMBC.2014.6944542},
  doi          = {10.1109/EMBC.2014.6944542},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/embc/WangSJHAGBF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icb/LocklearGSGBRPGB14,
  author       = {Hilbert Locklear and
                  Sathya Govindarajan and
                  Zdenka Sitova and
                  Adam Goodkind and
                  David Guy Brizan and
                  Andrew Rosenberg and
                  Vir V. Phoha and
                  Paolo Gasti and
                  Kiran S. Balagani},
  title        = {Continuous authentication with cognition-centric text production and
                  revision features},
  booktitle    = {{IEEE} International Joint Conference on Biometrics, Clearwater, {IJCB}
                  2014, FL, USA, September 29 - October 2, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/BTAS.2014.6996227},
  doi          = {10.1109/BTAS.2014.6996227},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icb/LocklearGSGBRPGB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icb/SedenkaBPG14,
  author       = {Jaroslav Sedenka and
                  Kiran S. Balagani and
                  Vir V. Phoha and
                  Paolo Gasti},
  title        = {Privacy-preserving population-enhanced biometric key generation from
                  free-text keystroke dynamics},
  booktitle    = {{IEEE} International Joint Conference on Biometrics, Clearwater, {IJCB}
                  2014, FL, USA, September 29 - October 2, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/BTAS.2014.6996244},
  doi          = {10.1109/BTAS.2014.6996244},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icb/SedenkaBPG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sensys/YangPNQZSGB14,
  author       = {Qing Yang and
                  Ge Peng and
                  David T. Nguyen and
                  Xin Qi and
                  Gang Zhou and
                  Zdenka Sitova and
                  Paolo Gasti and
                  Kiran S. Balagani},
  editor       = {{\'{A}}kos L{\'{e}}deczi and
                  Prabal Dutta and
                  Chenyang Lu},
  title        = {A multimodal data set for evaluating continuous authentication performance
                  in smartphones},
  booktitle    = {Proceedings of the 12th {ACM} Conference on Embedded Network Sensor
                  Systems, SenSys '14, Memphis, Tennessee, USA, November 3-6, 2014},
  pages        = {358--359},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2668332.2668366},
  doi          = {10.1145/2668332.2668366},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sensys/YangPNQZSGB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SedenkaBPG14,
  author       = {Jaroslav Sedenka and
                  Kiran S. Balagani and
                  Vir V. Phoha and
                  Paolo Gasti},
  title        = {Privacy-Preserving Population-Enhanced Biometric Key Generation from
                  Free-Text Keystroke Dynamics},
  journal      = {CoRR},
  volume       = {abs/1407.4179},
  year         = {2014},
  url          = {http://arxiv.org/abs/1407.4179},
  eprinttype    = {arXiv},
  eprint       = {1407.4179},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SedenkaBPG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/SerwaddaWKGPGBRPB13,
  author       = {Abdul Serwadda and
                  Zibo Wang and
                  Patrick Koch and
                  Sathya Govindarajan and
                  Raviteja Pokala and
                  Adam Goodkind and
                  David Guy Brizan and
                  Andrew Rosenberg and
                  Vir V. Phoha and
                  Kiran S. Balagani},
  title        = {Scan-Based Evaluation of Continuous Keystroke Authentication Systems},
  journal      = {{IT} Prof.},
  volume       = {15},
  number       = {4},
  pages        = {20--23},
  year         = {2013},
  url          = {https://doi.org/10.1109/MITP.2013.51},
  doi          = {10.1109/MITP.2013.51},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itpro/SerwaddaWKGPGBRPB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RahmanBP13,
  author       = {Khandaker Abir Rahman and
                  Kiran S. Balagani and
                  Vir V. Phoha},
  title        = {Snoop-Forge-Replay Attacks on Continuous Verification With Keystrokes},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {8},
  number       = {3},
  pages        = {528--541},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIFS.2013.2244091},
  doi          = {10.1109/TIFS.2013.2244091},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RahmanBP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/btas/GovindarajanGB13,
  author       = {Sathya Govindarajan and
                  Paolo Gasti and
                  Kiran S. Balagani},
  title        = {Secure privacy-preserving protocols for outsourcing continuous authentication
                  of smartphone users with touch data},
  booktitle    = {{IEEE} Sixth International Conference on Biometrics: Theory, Applications
                  and Systems, {BTAS} 2013, Arlington, VA, USA, September 29 - October
                  2, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/BTAS.2013.6712742},
  doi          = {10.1109/BTAS.2013.6712742},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/btas/GovindarajanGB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/HossainBP13,
  author       = {Md. Shafaeat Hossain and
                  Kiran S. Balagani and
                  Vir V. Phoha},
  title        = {On Controlling Genuine Reject Rate in Multi-stage Biometric Verification},
  booktitle    = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR}
                  Workshops 2013, Portland, OR, USA, June 23-28, 2013},
  pages        = {194--199},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CVPRW.2013.36},
  doi          = {10.1109/CVPRW.2013.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cvpr/HossainBP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/btas/HossainBP12,
  author       = {Md. Shafaeat Hossain and
                  Kiran S. Balagani and
                  Vir V. Phoha},
  title        = {New impostor score based rejection methods for continuous keystroke
                  verification with weak templates},
  booktitle    = {{IEEE} Fifth International Conference on Biometrics: Theory, Applications
                  and Systems, {BTAS} 2012, Arlington, VA, USA, September 23-27, 2012},
  pages        = {251--258},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/BTAS.2012.6374585},
  doi          = {10.1109/BTAS.2012.6374585},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/btas/HossainBP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/btas/WangSBP12,
  author       = {Zibo Wang and
                  Abdul Serwadda and
                  Kiran S. Balagani and
                  Vir V. Phoha},
  title        = {Transforming animals in a cyber-behavioral biometric menagerie with
                  Frog-Boiling attacks},
  booktitle    = {{IEEE} Fifth International Conference on Biometrics: Theory, Applications
                  and Systems, {BTAS} 2012, Arlington, VA, USA, September 23-27, 2012},
  pages        = {289--296},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/BTAS.2012.6374591},
  doi          = {10.1109/BTAS.2012.6374591},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/btas/WangSBP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/prl/BalaganiPRP11,
  author       = {Kiran S. Balagani and
                  Vir V. Phoha and
                  Asok Ray and
                  Shashi Phoha},
  title        = {On the discriminability of keystroke feature vectors used in fixed
                  text keystroke authentication},
  journal      = {Pattern Recognit. Lett.},
  volume       = {32},
  number       = {7},
  pages        = {1070--1080},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.patrec.2011.02.014},
  doi          = {10.1016/J.PATREC.2011.02.014},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/prl/BalaganiPRP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/RahmanBP11,
  author       = {Khandaker Abir Rahman and
                  Kiran S. Balagani and
                  Vir V. Phoha},
  title        = {Making impostor pass rates meaningless: {A} case of snoop-forge-replay
                  attack on continuous cyber-behavioral verification with keystrokes},
  booktitle    = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR}
                  Workshops 2011, Colorado Springs, CO, USA, 20-25 June, 2011},
  pages        = {31--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CVPRW.2011.5981729},
  doi          = {10.1109/CVPRW.2011.5981729},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cvpr/RahmanBP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pami/BalaganiP10,
  author       = {Kiran S. Balagani and
                  Vir V. Phoha},
  title        = {On the Feature Selection Criterion Based on an Approximation of Multidimensional
                  Mutual Information},
  journal      = {{IEEE} Trans. Pattern Anal. Mach. Intell.},
  volume       = {32},
  number       = {7},
  pages        = {1342--1343},
  year         = {2010},
  url          = {https://doi.org/10.1109/TPAMI.2010.62},
  doi          = {10.1109/TPAMI.2010.62},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pami/BalaganiP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/BalaganiPIB10,
  author       = {Kiran S. Balagani and
                  Vir V. Phoha and
                  S. Sitharama Iyengar and
                  N. Balakrishnan},
  title        = {On Guo and Nixon's Criterion for Feature Subset Selection: Assumptions,
                  Implications, and Alternative Options},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Part {A}},
  volume       = {40},
  number       = {3},
  pages        = {651--655},
  year         = {2010},
  url          = {https://doi.org/10.1109/TSMCA.2009.2036935},
  doi          = {10.1109/TSMCA.2009.2036935},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/BalaganiPIB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pami/BalaganiP07,
  author       = {Kiran S. Balagani and
                  Vir V. Phoha},
  title        = {On the Relationship Between Dependence Tree Classification Error and
                  Bayes Error Rate},
  journal      = {{IEEE} Trans. Pattern Anal. Mach. Intell.},
  volume       = {29},
  number       = {10},
  pages        = {1866--1868},
  year         = {2007},
  url          = {https://doi.org/10.1109/TPAMI.2007.1184},
  doi          = {10.1109/TPAMI.2007.1184},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pami/BalaganiP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/GaddamPB07,
  author       = {Shekhar R. Gaddam and
                  Vir V. Phoha and
                  Kiran S. Balagani},
  title        = {K-Means+ID3: {A} Novel Method for Supervised Anomaly Detection by
                  Cascading K-Means Clustering and {ID3} Decision Tree Learning Methods},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {19},
  number       = {3},
  pages        = {345--354},
  year         = {2007},
  url          = {https://doi.org/10.1109/TKDE.2007.44},
  doi          = {10.1109/TKDE.2007.44},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/GaddamPB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnsc/BalaganiPK07,
  author       = {Kiran S. Balagani and
                  Vir V. Phoha and
                  Gopi K. Kuchimanchi},
  title        = {A Divergence-measure Based Classification Method for Detecting Anomalies
                  in Network Traffic},
  booktitle    = {Proceedings of the {IEEE} International Conference on Networking,
                  Sensing and Control, {ICNSC} 2007, London, UK, 15-17 April 2007},
  pages        = {374--379},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICNSC.2007.372808},
  doi          = {10.1109/ICNSC.2007.372808},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icnsc/BalaganiPK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/RangarajanPBSI04,
  author       = {Santosh K. Rangarajan and
                  Vir V. Phoha and
                  Kiran S. Balagani and
                  Rastko R. Selmic and
                  S. Sitharama Iyengar},
  title        = {Adaptive Neural Network Clustering of Web Users},
  journal      = {Computer},
  volume       = {37},
  number       = {4},
  pages        = {34--40},
  year         = {2004},
  url          = {https://doi.org/10.1109/MC.2004.1297299},
  doi          = {10.1109/MC.2004.1297299},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/RangarajanPBSI04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}