Vir V Phoha
Syracuse University
H-index: 38
North America-United States
Top articles of Vir V Phoha
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
SSPRA: A Robust Approach to Continuous Authentication Amidst Real-World Adversarial Challenges | IEEE Transactions on Biometrics, Behavior, and Identity Science | Frank Chen Jingyu Xin Vir V Phoha | 2024/2/27 |
Learn-to-respond: Sequence-predictive recovery from sensor attacks in cyber-physical systems | Mengyu Liu Lin Zhang Vir V Phoha Fanxin Kong | 2023/12/5 | |
IEEE Transactions on Computational Social Systems | FEIYUE WANG H ABBASS D BILAR D CAO K CARLEY | ||
Combating False Data Injection Attacks on Human-Centric Sensing Applications | Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies | Jingyu Xin Vir V Phoha Asif Salekin | 2022/7/7 |
Formalizing PQRST Complex in Accelerometer-based Gait Cycle for Authentication | arXiv preprint arXiv:2205.07108 | Frank Sicong Chen Amith K Belman Vir V Phoha | 2022/5/14 |
“This is fake! shared it by mistake”: Assessing the intent of fake news spreaders | Xinyi Zhou Kai Shu Vir V Phoha Huan Liu Reza Zafarani | 2022/4/25 | |
Gaitpoint: A Gait Recognition Network Based on Point Cloud Analysis | Jiajing Chen Huantao Ren Frank Sicong Chen Senem Velipasalar Vir V Phoha | 2022/10/16 | |
Game Theory based Cyber-Insurance to Cover Potential Loss from Mobile Malware Exploitation | Digital Threats: Research and Practice | Li Wang S Sitharama Iyengar Amith K Belman Paweł Śniatała Vir V Phoha | 2021/4/20 |
Inroduction on recent trends and perspectives in fake news research | Reza Zafarani Huan Liu Vir V Phoha Javad Azimi | 2021/3/26 | |
Effectiveness of symmetric rejection for a secure and user convenient multistage biometric system | Pattern Analysis and Applications | Md S Hossain Kiran S Balagani Vir V Phoha | 2021/2 |
Enhancing performance and user convenience of multi-biometric verification systems | Pattern Analysis and Applications | Md S Hossain Vir V Phoha | 2021/11 |
Adversarial activity detection using keystroke acoustics | Amin Fallahi Vir V Phoha | 2021 | |
Press ${@}{\$}{@}{\$} $ to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing Gestures | Prakash Shrestha Nitesh Saxena Diksha Shukla Vir V Phoha | 2021/9/6 | |
Treadmill assisted gait spoofing (TAGS) an emerging threat to wearable sensor-based gait authentication | Digital Threats: Research and Practice | Rajesh Kumar Can Isik Vir V Phoha | 2021/6/8 |
Classification of threat level in typing activity through keystroke dynamics | Amith K Belman Swathi Sridhara Vir V Phoha | 2020/1/10 | |
Discriminative power of typing features on desktops, tablets, and phones for user identification | ACM Transactions on Privacy and Security (TOPS) | Amith K Belman Vir V Phoha | 2020/2/5 |
Fake news early detection: A theory-driven model | Digital Threats: Research and Practice | Xinyi Zhou Atishay Jain Vir V. Phoha Reza Zafarani | 2020 |
DoubleType: Authentication using relationship between typing behavior on multiple devices | Amith K Belman Vir V Phoha | 2020/1/10 | |
Thinking unveiled: An inference and correlation model to attack eeg biometrics | Digital Threats: Research and Practice | Diksha Shukla Partha Pratim Kundu Ravichandra Malapati Sujit Poudel Zhanpeng Jin | 2020/5 |
Entropic Brain-computer Interfaces | Samuel W Hincks Sarah Bratt Sujit Poudel Vir V Phoha Robert JK Jacob | 2020 |