Vir Phoha
American computer scientist
Vir Phoha's AcademicInfluence.com Rankings
Download Badge
Criminal Justice Computer Science
Why Is Vir Phoha Influential?
(Suggest an Edit or Addition)According to Wikipedia, Vir Virander Phoha is a professor of electrical engineering and computer science at Syracuse University College of Engineering and Computer Science. Phoha is known for developing practicable foundations of behavioral biometrics for active and continuous authentication. His research focuses on attack-averse authentication, spoof-resistance, anomaly detection, machine learning, optimized attack formulation, and spatial-temporal pattern detection and event recognition. Phoha's work also provides protection for many classified information systems and his inventions have resulted in the widespread commercial use of active authentication biometric methods.
Vir Phoha's Published Works
Published Works
- K-Means+ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning Methods (2007) (217)
- Viewpoint (1999) (187)
- A Chipless RFID Sensor System for Cyber Centric Monitoring Applications (2009) (146)
- Beware, Your Hands Reveal Your Secrets! (2014) (134)
- Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms (2013) (128)
- Fake News Early Detection: A Theory-driven Model (2019) (117)
- Context-Aware Active Authentication Using Smartphone Accelerometer Measurements (2014) (117)
- A parallel decision tree-based method for user authentication based on keystroke patterns (2005) (111)
- Investigating hidden Markov models capabilities in anomaly detection (2005) (104)
- Web user clustering from access log using belief function (2001) (92)
- When kids' toys breach mobile phone security (2013) (86)
- Foundations of Wavelet Networks and Applications (2002) (77)
- Adaptive neural network clustering of Web users (2004) (74)
- On the discriminability of keystroke feature vectors used in fixed text keystroke authentication (2011) (70)
- Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns (2016) (70)
- A Survey on Gait Recognition (2018) (69)
- EarEcho: Using Ear Canal Echo for Wearable Authentication (2019) (68)
- Dimension reduction using feature extraction methods for real-time misuse detection systems (2004) (64)
- Fake News Early Detection (2019) (63)
- On the Feature Selection Criterion Based on an Approximation of Multidimensional Mutual Information (2010) (59)
- Examining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings (2013) (56)
- Snoop-Forge-Replay Attacks on Continuous Verification With Keystrokes (2013) (53)
- Detecting Malicious Defects in 3D Printing Process Using Machine Learning and Image Classification (2016) (49)
- Curie: A method for protecting SVM Classifier from Poisoning Attack (2016) (43)
- Utilizing linguistically enhanced keystroke dynamics to predict typist cognition and demographics (2015) (41)
- An Adaptive Web Cache Access Predictor Using Neural Network (2002) (39)
- Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes (2011) (38)
- Authenticating users through their arm movement patterns (2016) (33)
- Treadmill attack on gait-based authentication systems (2015) (33)
- Continuous authentication using one-class classifiers and their fusion (2017) (32)
- Neural network-based reputation model in a distributed system (2004) (30)
- Toward Robotic Robbery on the Touch Screen (2016) (28)
- Fundamentals of Sensor Network Programming: Applications and Technology (2010) (27)
- An adaptive recommendation trust model in multiagent system (2004) (27)
- Faster Web Page Allocation with Neural Networks (2002) (26)
- Continuous authentication with cognition-centric text production and revision features (2014) (25)
- Supervisory control of software systems (2004) (24)
- Transforming animals in a cyber-behavioral biometric menagerie with Frog-Boiling attacks (2012) (24)
- Can a Course Be Taught Entirely Via Email? (1999) (23)
- An empirical evaluation of activities and classifiers for user identification on smartphones (2016) (23)
- Scan-Based Evaluation of Continuous Keystroke Authentication Systems (2013) (23)
- Modeling online social network users' profile attribute disclosure behavior from a game theoretic perspective (2014) (20)
- Web User Clustering and Its Application to Prefetching Using ART Neural Networks (2003) (20)
- Internet Security Dictionary (2002) (20)
- fNIRS: A new modality for brain activity-based biometric authentication (2015) (19)
- Transient Behavior of Fractional Queues and Related Processes (2013) (19)
- Using global knowledge of users' typing traits to attack keystroke biometrics templates (2011) (19)
- Wireless Sensor Networks: Security, Coverage, and Localization (2016) (18)
- Modeling privacy settings of an online social network from a game-theoretical perspective (2013) (18)
- Stealing Passwords by Observing Hands Movement (2019) (17)
- Intelligent compensation of actuator nonlinearities (2003) (16)
- Image recovery and segmentation using competitive learning in a layered network (1993) (16)
- Using network motifs to investigate the influence of network topology on PPM-based IP traceback schemes (2014) (15)
- Continuous user authentication via unlabeled phone movement patterns (2017) (15)
- New impostor score based rejection methods for continuous keystroke verification with weak templates (2012) (15)
- Genetic Algorithm Approach for Resource Allocation in Multi-User OFDM Systems (2007) (14)
- Quantitative Measure for Discrete Event Supervisory Control (2004) (14)
- A Standard for Software Documentation (1997) (13)
- Cyber-physical Systems Security (2014) (12)
- FARMS: Fusionable ambient renewable MACS (2009) (12)
- The HMM-based model for evaluating recommender's reputation (2004) (12)
- Computer User Authentication using Hidden Markov Model through Keystroke Dynamics (2006) (11)
- Enhanced free-text keystroke continuous authentication based on dynamics of wrist motion (2017) (11)
- Special topics in computing and ICT research: strengthening the role of ICT in development (2009) (10)
- Wireless Sensor Networks (2016) (9)
- Insights from BB-MAS - A Large Dataset for Typing, Gait and Swipes of the Same Person on Desktop, Tablet and Phone (2019) (9)
- A Weighted Metric Based Adaptive Algorithm for Web Server Load Balancing (2009) (8)
- Introduction to Contextual Processing: Theory and Applications (2010) (8)
- Topology-dependent performance of attack graph reconstruction in PPM-based IP traceback (2014) (8)
- “This is Fake! Shared it by Mistake”:Assessing the Intent of Fake News Spreaders (2022) (8)
- Distributed Source Coding for Sensor Data Model and Estimation of Cluster Head Errors Using Bayesian and K-Near Neighborhood Classifiers in Deployment of Dense Wireless Sensor Networks (2009) (8)
- Context-Aware Active Authentication using Touch Gestures, Typing Patterns and Body Movement (2016) (7)
- Design of Trust Metrics Based on Dempster-Shafer Theory (2000) (7)
- On Controlling Genuine Reject Rate in Multi-stage Biometric Verification (2013) (7)
- A prediction based approach to IP traceback (2012) (7)
- Entropic Brain-computer Interfaces - Using fNIRS and EEG to Measure Attentional States in a Bayesian Framework (2017) (7)
- Coverage and Connectivity (2016) (7)
- Fake News Early Detection: An Interdisciplinary Study (2019) (7)
- INSPIRE-DB: Intelligent Networks Sensor Processing of Information Using Resilient Encoded-Hash DataBase (2010) (7)
- CLIQUE clustering approach to detect denial-of-service attacks (2004) (7)
- A Game Theoretic Approach for Modeling Privacy Settings of an Online Social Network (2014) (7)
- Privacy-preserving population-enhanced biometric key generation from free-text keystroke dynamics (2014) (7)
- Classification of radio elements using mutual information: A tool for geological mapping (2008) (6)
- Competition between SOM Clusters to Model User Authentication System in Computer Networks (2007) (6)
- Multi-hop scheduling and local data link aggregation dependant Qos in modeling and simulation of power-aware wireless sensor networks (2009) (6)
- Image recovery and segmentation using competitive learning in a computational network (1992) (6)
- On Guo and Nixon's Criterion for Feature Subset Selection: Assumptions, Implications, and Alternative Options (2010) (6)
- Non-interactive Identity-Based Underwater Data Transmission With Anonymity and Zero Knowledge (2017) (6)
- Entropic Brain-computer Interfaces (2017) (5)
- IP-traceback based attacker tracking: a probabilistic technique for detecting Internet attacks using the concept of hidden Markov models (2004) (5)
- Physical Data Auditing for Attack Detection in Cyber-Manufacturing Systems: Blockchain for Machine Learning Process (2019) (5)
- Opinion Filtered Recommendation Trust Model in Peer-to-Peer Networks (2004) (5)
- Music and images as contexts in a context-aware touch-based authentication system (2015) (5)
- An interactive dynamic model for integrating knowledge management methods and knowledge sharing technology in a traditional classroom (2001) (5)
- Effectiveness of symmetric rejection for a secure and user convenient multistage biometric system (2020) (5)
- When Mice devour the Elephants: A DDoS attack against size-based scheduling schemes in the internet (2015) (5)
- Topology, Routing, and Modeling Tools (2016) (4)
- Network Identification and Authentication (2019) (4)
- Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds (2013) (4)
- Design of a smart biomarker for bioremediation: A machine learning approach (2011) (4)
- Wrist in Motion: A Seamless Context-Aware Continuous Authentication Framework Using Your Clickings and Typings (2020) (4)
- Web Farm-inspired Computational Cluster in the Cloud (2011) (4)
- Security models for contextual based global processing an architecture and overview (2009) (4)
- Tiny Operating System (TinyOS) (2011) (4)
- Fuzzy Evaluation of Agent-Based Semantic Match-Making Algorithm for Cyberspace (2010) (4)
- Hand in Motion: Enhanced Authentication Through Wrist and Mouse Movement (2018) (4)
- EarEcho (2019) (4)
- On the Relationship Between Dependence Tree Classification Error and Bayes Error Rate (2007) (4)
- Size-based scheduling: a recipe for DDOS? (2010) (4)
- Discriminative Power of Typing Features on Desktops, Tablets, and Phones for User Identification (2020) (4)
- Body-Taps: Authenticating Your Device Through Few Simple Taps (2018) (3)
- A Divergence-measure Based Classification Method for Detecting Anomalies in Network Traffic (2007) (3)
- A Non-Interactive Dual Channel Continuous Traffic Authentication Protocol (2014) (3)
- DoubleType: Authentication Using Relationship Between Typing Behavior on Multiple Devices (2020) (3)
- Securing dynamic microgrid partition in the smart grid (2017) (2)
- Contemporary Computing - Second International Conference, IC3 2009, Noida, India, August 17-19, 2009. Proceedings (2009) (2)
- Reduction of noise due to systematic uncertainties in 113mIn SPECT imaging using information theory (2009) (2)
- Enhancing performance and user convenience of multi-biometric verification systems (2021) (2)
- Treadmill Assisted Gait Spoofing (TAGS) (2020) (2)
- The DMCA Needs Fixing (2001) (2)
- Standards for Building Wireless Sensor Network Applications (2011) (2)
- Situation-Aware Software Engineering for Sensor Networks (2007) (2)
- Quality of Service (2016) (2)
- Defining A New Type of Global Information Architecture for Contextual Information Processing (2009) (2)
- Analysis of head and torso movements for authentication (2018) (2)
- Authentication by Mapping Keystrokes to Music: The Melody of Typing (2020) (2)
- Can a course be taught via e-mail? (1999) (2)
- Neural Networks and Regional Science Modeling: A Survey of Techniques for Complex Spatial Analysis (2002) (1)
- DEPSCOR FY 09) Obfuscation and Deobfuscation of Intent of Computer Programs (2012) (1)
- Risk Studies of Operational Variations for Onshore & Offshore Oil-Rigs (2016) (1)
- Temporal Analysis of Stress Classification Using QRS Complex of ECG Signals (2017) (1)
- Algorithms for Wireless Sensor Networks (2011) (1)
- Classification of Threat Level in Typing Activity Through Keystroke Dynamics (2020) (1)
- Looking Through Your Smartphone Screen to Steal Your Pin Using a 3D Camera (2018) (1)
- Cognitive Model Selections in Co-existing Operation of Wireless Sensor Networks (2010) (1)
- TR-MCN: light weight task recommendation for mobile crowdsourcing networks (2018) (1)
- Localization and Tracking in WSNs (2016) (1)
- Security in Sensor Networks (2011) (1)
- Graph-Based Identification and Authentication: A Stochastic Kronecker Approach (2022) (1)
- On the Feature Selection Criterion Proposed in ‘ Gait Feature Subset Selection by Mutual Information (2009) (1)
- A simple real time executive tinyexec as a teaching tool in an operating system class (2005) (1)
- Stochastic propagation modeling of self-replicating programs (2005) (1)
- A simple and efficient video image clustering algorithm for person specific query and image retrieval (2009) (1)
- Dynamical System Theory for the Detection of Anomalous Behavior in Computer Programs (2012) (1)
- Neural-Network Modeling for Labor-Force Migration: a Competitive-Learning Approach (1999) (1)
- Corrections to "Image Recovery and Segmentation Using Competitive Learning in a Layered Network (1996) (1)
- On humanoid robots imitating human touch gestures on the smart phone (2015) (1)
- INSPIRE: Innovation in Sensor Programming Implementation for RealTime Environment (2011) (1)
- Active Authentication of Keyboard Users: Performance Evaluation on 736 Subjects (2018) (1)
- Supervisory control of software systems for fault mitigation (2003) (1)
- The bipartite clique: a topological paradigm for WWWeb user search customization (2005) (1)
- Fast Web Page Allocation On a Server Using Self-Organizing Properties of Neural Networks (2002) (0)
- Resource Management for Uninterrupted Microgrid Operation (2019) (0)
- Using power-law properties of social groups for cloud defense and community detection (2013) (0)
- Press ${@}{\$}{@}{\$}$ to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing Gestures (2021) (0)
- Simulation of robust resonance parameters using information theory (2008) (0)
- Decision support and executive information systems : by Paul Gray (editor) (1994; Pages 469; Prentice Hall, Englewood Cliffs, NJ 07632, USA; ISBN 0-13-235789-5) (1995) (0)
- To WAP or not to WAP? [Letters] (2000) (0)
- Set-Based Data Management Models for Contextual Data and Ambiguity in Selection (2010) (0)
- OPTIMAL LEVEL AND SPACING OF REPLENISHMENT. (1983) (0)
- Hyperdistribution of Contextual Information (2010) (0)
- Gaitpoint: A Gait Recognition Network Based on Point Cloud Analysis (2022) (0)
- Formalizing PQRST Complex in Accelerometer-based Gait Cycle for Authentication (2022) (0)
- Thinking Unveiled (2020) (0)
- A Non-interactive Dual-channel Authentication Protocol for Assuring Pseudo-confidentiality (2013) (0)
- MATLAB Simulation of Airport BaggageHandling System (2011) (0)
- Data Structures for Sensor Computing (2011) (0)
- The Case for Contextually Driven Computation (2010) (0)
- Self-repair and adaptation in collective and parallel computational networks: a statistical approximation (1990) (0)
- Modeling Sensor Networks Through Design and Simulation (2011) (0)
- Information Mining for Contextual Data Sensing and Fusion (2010) (0)
- Security Modeling Using Contextual Data Cosmology and Brane Surfaces (2010) (0)
- Transient Behavior of Fractional Queues and Related Processes (2013) (0)
- Classroom guidelines on program documentation and formatting (1995) (0)
- Book reviewIntelligent hybrid systems: edited by Suran Goonatilake and Sukhdev Khebbal. John Wiley & Sons Ltd., U.K. (1995) 325pp. £29.95. ISBN: 0 471 94242 1. (1995) (0)
- A chipless sensor tag-based RFID technology for cyber-oriented environmental sensing applications (2009) (0)
- Early detection and propagation mitigation of worm programs (2005) (0)
- Stochastic propagation modeling and early detection of malicious mobile code (2006) (0)
- The bipartite clique: a topological paradigm for web user search customization and web site restructuring (2005) (0)
- Supervisory Control of Malicious Executables (2003) (0)
- Review of "Discrete Neural Networks: A Theoretical Foundation by Kai-Yeung Siu, Vwani Roychowdhury and Thomas Kailath", Prentice Hall PTR, 1995, ISBN 0-13-300708-1. (1998) (0)
- Programming in NesC (2011) (0)
- An immunological model for detecting bot activities (2009) (0)
- State University Faster Web Page Allocation with Neural Networks Exploiting the self (2002) (0)
- Combating False Data Injection Attacks on Human-Centric Sensing Applications (2022) (0)
- BB-MAS: A Very Large Dataset for Typing, Gait and Swipe of the Same Person on Desktop, Tablet and Phone (2019) (0)
- Supervisory Control of Malicious Executables in Software Processes (2005) (0)
- Defining the Transformation of Data to Contextual Knowledge (2010) (0)
- TR-MCN: light weight task recommendation for mobile crowdsourcing networks (2017) (0)
- Performance Analysis of PowerAware Algorithms (2011) (0)
- A New Efficient Edge Extraction Algorithm for Images Using Directional Tracing Techniques (2002) (0)
- Sensor Deployment Abstraction (2011) (0)
- Using a Parallel Decision Tree-Based Approach to Authenticate Users Based on Keystroke Patterns (2012) (0)
- Fuzzy logic and intelligent systems: edited by Hua Li and Madan M. Gupta. Kluwer Academic Publishers, Germany, 1995. 445 pp. £91.95. ISBN 0 7923 9575 1 (1996) (0)
- On the Complexity of Aggregating Information for Authentication and Profiling (2011) (0)
- Design of an Expert System for Mitigating Trace Element Toxicity in Cancer Risk Management (2013) (0)
- Stop monitoring legal internet traffic [2] (2008) (0)
- Game Theory based Cyber-Insurance to Cover Potential Loss from Mobile Malware Exploitation (2021) (0)
- Techniques for Protocol Programming (2011) (0)
- Adversarial Activity Detection Using Keystroke Acoustics (2021) (0)
- Security in WSNs (2016) (0)
- Embedded Soft Sensing for Anomaly Detection in Mobile Robotic Networks (2006) (0)
- Calculus for Reasoning about Contextual Information (2010) (0)
- Effectiveness of symmetric rejection for a secure and user convenient multistage biometric system (2020) (0)
This paper list is powered by the following services:
Other Resources About Vir Phoha
What Schools Are Affiliated With Vir Phoha?
Vir Phoha is affiliated with the following schools: