Kiran S Balagani
Kiran S Balagani
nyit.eduÀÇ À̸ÞÀÏ È®ÀεÊ
Á¦¸ñ
Àοë
Àοë
¿¬µµ
HMOG: New behavioral biometric features for continuous authentication of smartphone users
Z Sitová, J Šeděnka, Q Yang, G Peng, G Zhou, P Gasti, KS Balagani
IEEE Transactions on Information Forensics and Security 11 (5), 877-892, 2015
2442015
K-Means+ ID3: A novel method for supervised anomaly detection by cascading K-Means clustering and ID3 decision tree learning methods
SR Gaddam, VV Phoha, KS Balagani
IEEE transactions on knowledge and data engineering 19 (3), 345-354, 2007
2132007
On the discriminability of keystroke feature vectors used in fixed text keystroke authentication
KS Balagani, VV Phoha, A Ray, S Phoha
Pattern Recognition Letters 32 (7), 1070-1080, 2011
842011
Dimension reduction using feature extraction methods for Real-time misuse detection systems
GK Kuchimanchi, VV Phoha, KS Balagani, SR Gaddam
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop ¡¦, 2004
712004
Adaptive neural network clustering of web users
SK Rangarajan, VV Phoha, KS Balagani, RR Selmic, SS Iyengar
Computer 37 (4), 34-40, 2004
702004
On the feature selection criterion based on an approximation of multidimensional mutual information
KS Balagani, VV Phoha
IEEE Transactions on pattern analysis and machine intelligence 32 (7), 1342-1343, 2010
612010
Snoop-forge-replay attacks on continuous verification with keystrokes
KA Rahman, KS Balagani, VV Phoha
IEEE Transactions on information forensics and security 8 (3), 528-541, 2013
522013
A weighted metric based adaptive algorithm for web server load balancing
DC Shadrach, KS Balagani, VV Phoha
2009 Third International Symposium on Intelligent Information Technology ¡¦, 2009
482009
Utilizing linguistically enhanced keystroke dynamics to predict typist cognition and demographics
DG Brizan, A Goodkind, P Koch, K Balagani, VV Phoha, A Rosenberg
International Journal of Human-Computer Studies 82, 57-68, 2015
402015
Method to indentify anomalous data using cascaded K-Means clustering and an ID3 decision tree
VV Phoha, KS Balagani
US Patent 7,792,770, 2010
392010
Secure outsourced biometric authentication with performance evaluation on smartphones
J Šeděnka, S Govindarajan, P Gasti, KS Balagani
IEEE Transactions on Information Forensics and Security 10 (2), 384-396, 2014
382014
On inferring browsing activity on smartphones via USB power analysis side-channel
Q Yang, P Gasti, G Zhou, A Farajidavar, KS Balagani
IEEE Transactions on Information Forensics and Security 12 (5), 1056-1066, 2016
352016
An enhanced WLAN security system with FPGA implementation for multimedia applications
T Hayajneh, S Ullah, BJ Mohd, KS Balagani
IEEE Systems Journal 11 (4), 2536-2545, 2015
322015
Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes
KA Rahman, KS Balagani, VV Phoha
CVPR 2011 workshops, 31-38, 2011
322011
Continuous authentication with cognition-centric text production and revision features
H Locklear, S Govindarajan, Z Sitová, A Goodkind, DG Brizan, ...
IEEE International Joint Conference on Biometrics, 1-8, 2014
292014
Secure, fast, and energy-efficient outsourced authentication for smartphones
P Gasti, J Šeděnka, Q Yang, G Zhou, KS Balagani
IEEE Transactions on Information Forensics and Security 11 (11), 2556-2571, 2016
242016
A multimodal data set for evaluating continuous authentication performance in smartphones
Q Yang, G Peng, DT Nguyen, X Qi, G Zhou, Z Sitová, P Gasti, KS Balagani
Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems ¡¦, 2014
242014
Transforming animals in a cyber-behavioral biometric menagerie with frog-boiling attacks
Z Wang, A Serwadda, KS Balagani, VV Phoha
2012 IEEE Fifth International Conference on Biometrics: Theory, Applications ¡¦, 2012
242012
Secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users with touch data
S Govindarajan, P Gasti, KS Balagani
2013 IEEE Sixth International Conference on Biometrics: Theory, Applications ¡¦, 2013
232013
Web user clustering and its application to prefetching using ART neural networks
SK Rangarajan, VV Phoha, K Balagani, RR Selmic, SS Iyengar
IEEE Computer, 45-62, 2004
232004
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20