Beware, Your Hands Reveal Your Secrets! D Shukla, R Kumar, A Serwadda, VV Phoha ACM Conference on Computer and Communications (ACM CCS), 2014 | 181 | 2014 |
Context-aware Active Authentication Using Smartphone Accelerometer Measurements A Primo, VV Phoha, R Kumar, A Serwadda Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2014 | 166 | 2014 |
Continuous Authentication of Smartphone Users by Fusing Typing, Swiping, and Phone Movement Patterns R Kumar, VV Phoha, A Serwadda IEEE International Conference on Biometrics Theory, Applications and Systems …, 2016 | 108 | 2016 |
Treadmill Attack on Gait-based Authentication Systems R Kumar, VV Phoha, A Jain IEEE International Conference on Biometrics Theory, Applications and Systems …, 2015 | 54 | 2015 |
Authenticating Users Through Their Arm Movement Patterns R Kumar, VV Phoha, R Raina Preprint, Computer Vision and Pattern Recognition (arxiv/cs.cv), 2016 | 52 | 2016 |
Continuous Authentication Using One-class Classifiers and their Fusion R Kumar, PP Kundu, VV Phoha IEEE International Conference on Identity, Security, and Behavior Analysis …, 2018 | 50 | 2018 |
Toward Robotic Robbery on the Touch Screen A Serwadda, VV Phoha, Z Wang, R Kumar, D Shukla ACM Transactions on Information and System Security, 2016 | 39 | 2016 |
Continuous User Authentication via Unlabeled Phone Movement Patterns R Kumar, PP Kundu, D Shukla, VV Phoha IEEE International Joint Conference on Biometrics (IJCB), 2017 | 25 | 2017 |
Geometrical Localization Algorithm for Three Dimensional Wireless Sensor Networks R Kumar, S Kumar, D Shukla, R Raw S, O Kaiwartya Springer International Journal of Wireless Personal Communications, 2014 | 25 | 2014 |
IDeAuth: A Novel Behavioral Biometric-based Implicit DeAuthentication Scheme for Smartphones S Gupta, R Kumar, M Kacimi, B Crispo Pattern Recognition Letters, Elsevier, 2022 | 13 | 2022 |
Synthesizing Human Gaze Feedback for Improved NLP Performance V Khurana, Y Kumar, H Nora, R Kumar, B Krishnamurthy European Chapter of the Association for Computational Linguistics (EACL), 2023 | 12 | 2023 |
Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks M Agrawal, P Mehrotra, R Kumar, RR Shah IEEE International Joint Conference on Biometrics (IJCB), Shenzhen, China, 2021 | 11 | 2021 |
Treadmill Assisted Gait Spoofing (TAGS): An Emerging Threat to Wearable Sensor-based Gait Authentication R Kumar, C Isik, VV Phoha ACM Journal of Digital Threats: Research and Practice, 2021 | 11 | 2021 |
On the Inference of Soft Biometrics from Typing Patterns Collected in a Multi-device Environment V Udandarao, M Agrawal, R Kumar, RR Shah IEEE International Conference on Multimedia Big Data (BigMM), 2020 | 8 | 2020 |
Identification of Internal Faults in Indirect Symmetrical Phase Shift Transformers Using Ensemble Learning PK Bera, R Kumar, C Isik IEEE International Symposium on Signal Processing and Information Technology …, 2018 | 8 | 2018 |
GANTouch: An Attack-Resilient Framework for Touch-based Continuous Authentication System M Agrawal, P Mehrotra, R Kumar, RR Shah IEEE Transactions on Biometrics, Behavior, and Identity Science (T-BIOM), 2022 | 4 | 2022 |
Touchless Typing using Head Movement-based Gestures S Rustagi, A Garg, PR Anand, R Kumar, Y kumar, RR Shah IEEE International Conference on Multimedia Big Data (BigMM), 2020 | 4 | 2020 |
Treadmill Assisted Circumvention of Wearable Sensors-based Gait Authentication R Kumar PhD Dissertation, EECS, Syracuse University, NY, USA, 2021 | 2 | 2021 |
iCTGAN–An Attack Mitigation Technique for Random-vector Attack on Accelerometer-based Gait Authentication Systems J Mo, R Kumar IEEE International Joint Conference on Biometrics (IJCB), Abu Dhabi, United …, 2022 | 1 | 2022 |
Spotting Fake Profiles in Social Networks via Keystroke Dynamics A Kuruvilla, R Daley, R Kumar IEEE Consumer Communications & Networking Conference (CCNC 2024), 2024 | | 2024 |