Fake news early detection: A theory-driven model X Zhou, A Jain, VV Phoha, R Zafarani Digital Threats: Research and Practice 1 (2), 1-25, 2020 | 331 | 2020 |
A survey on gait recognition C Wan, L Wang, VV Phoha ACM Computing Surveys (CSUR) 51 (5), 1-35, 2018 | 306 | 2018 |
K-Means+ ID3: A novel method for supervised anomaly detection by cascading K-Means clustering and ID3 decision tree learning methods SR Gaddam, VV Phoha, KS Balagani IEEE transactions on knowledge and data engineering 19 (3), 345-354, 2007 | 277 | 2007 |
Beware, your hands reveal your secrets! D Shukla, R Kumar, A Serwadda, VV Phoha Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 182 | 2014 |
Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms A Serwadda, VV Phoha, Z Wang 2013 IEEE sixth international conference on biometrics: theory, applications …, 2013 | 171 | 2013 |
Context-aware active authentication using smartphone accelerometer measurements A Primo, VV Phoha, R Kumar, A Serwadda Proceedings of the IEEE conference on computer vision and pattern …, 2014 | 169 | 2014 |
A chipless RFID sensor system for cyber centric monitoring applications S Shrestha, M Balachandran, M Agarwal, VV Phoha, K Varahramyan IEEE Transactions on Microwave Theory and Techniques 57 (5), 1303-1309, 2009 | 169 | 2009 |
Investigating hidden Markov models capabilities in anomaly detection SS Joshi, VV Phoha Proceedings of the 43rd annual Southeast regional conference-Volume 1, 98-103, 2005 | 156 | 2005 |
A parallel decision tree-based method for user authentication based on keystroke patterns Y Sheng, VV Phoha, SM Rovnyak IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 35 …, 2005 | 147 | 2005 |
Foundations of wavelet networks and applications SS Iyengar, VV Phoha Chapman and Hall/CRC, 2018 | 132 | 2018 |
EarEcho: Using ear canal echo for wearable authentication Y Gao, W Wang, VV Phoha, W Sun, Z Jin Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2019 | 126 | 2019 |
Web user clustering from access log using belief function Y Xie, VV Phoha Proceedings of the 1st international conference on Knowledge capture, 202-208, 2001 | 118 | 2001 |
When kids' toys breach mobile phone security A Serwadda, VV Phoha Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 113 | 2013 |
Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns R Kumar, VV Phoha, A Serwadda 2016 IEEE 8th international conference on biometrics theory, applications …, 2016 | 111 | 2016 |
On the discriminability of keystroke feature vectors used in fixed text keystroke authentication KS Balagani, VV Phoha, A Ray, S Phoha Pattern Recognition Letters 32 (7), 1070-1080, 2011 | 110 | 2011 |
Detecting malicious defects in 3D printing process using machine learning and image classification M Wu, VV Phoha, YB Moon, AK Belman ASME international mechanical engineering congress and exposition 50688 …, 2016 | 96 | 2016 |
Wireless Sensor Networks RR Selmic, VV Phoha, A Serwadda Springer International Publishing AG, 2016 | 77* | 2016 |
Examining a large keystroke biometrics dataset for statistical-attack openings A Serwadda, VV Phoha ACM Transactions on Information and System Security (TISSEC) 16 (2), 1-30, 2013 | 75 | 2013 |
Adaptive neural network clustering of Web users SK Rangarajan, VV Phoha, KS Balagani, RR Selmic, SS Iyengar Computer 37 (4), 34-40, 2004 | 75 | 2004 |
Snoop-forge-replay attacks on continuous verification with keystrokes KA Rahman, KS Balagani, VV Phoha IEEE Transactions on information forensics and security 8 (3), 528-541, 2013 | 74 | 2013 |