Vir V. Phoha

ORCID: 0000-0002-5390-8253
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • User Authentication and Security Systems
  • Biometric Identification and Security
  • Advanced Malware Detection Techniques
  • Energy Efficient Wireless Sensor Networks
  • Network Security and Intrusion Detection
  • Anomaly Detection Techniques and Applications
  • Gait Recognition and Analysis
  • Internet Traffic Analysis and Secure E-voting
  • Neural Networks and Applications
  • Context-Aware Activity Recognition Systems
  • Energy Harvesting in Wireless Networks
  • Distributed systems and fault tolerance
  • Interactive and Immersive Displays
  • Face and Expression Recognition
  • Emotion and Mood Recognition
  • Complex Network Analysis Techniques
  • Hand Gesture Recognition Systems
  • Data Management and Algorithms
  • Mobile Ad Hoc Networks
  • EEG and Brain-Computer Interfaces
  • IoT and Edge/Fog Computing
  • Spam and Phishing Detection
  • Modular Robots and Swarm Intelligence
  • Misinformation and Its Impacts
  • Security in Wireless Sensor Networks

Syracuse University
2015-2024

University at Buffalo, State University of New York
2019

Louisiana Tech University
2007-2018

Southeast University
2017

Louisiana State University
2005-2010

Indian Institute of Science Bangalore
2009

Institute of Electrical and Electronics Engineers
2007

Northeastern State University
1997-1999

Texas A&M University – Central Texas
1993-1996

Massive dissemination of fake news and its potential to erode democracy has increased the demand for accurate detection. Recent advancements in this area have proposed novel techniques that aim detect by exploring how it propagates on social networks. Nevertheless, at an early stage, i.e., when is published a outlet but not yet spread media, one cannot rely propagation information as does exist. Hence, there strong need develop approaches can focusing content. In article, theory-driven model...

10.1145/3377478 article EN Digital Threats Research and Practice 2020-06-11

In this paper, we present "k-means+ID3", a method to cascade k-means clustering and the ID3 decision tree learning methods for classifying anomalous normal activities in computer network, an active electronic circuit, mechanical mass-beam system. The first partitions training instances into k clusters using Euclidean distance similarity. On each cluster, representing density region of or anomaly instances, build tree. on cluster refines boundaries by subgroups within cluster. To obtain final...

10.1109/tkde.2007.44 article EN IEEE Transactions on Knowledge and Data Engineering 2007-02-09

A chipless RF identifiction (RFID) sensor system platform consisting of passive RFID tags and specialized reader has been developed for cyber centric monitoring applications. The are fabricated on a flexible substrate, the tag identification (ID) generation circuit consists microstrip transmission lines. Two configurations presented. first configuration (conf-I) an antenna integrated sensor. second (conf-II) antenna, ID circuit, system, analog section on-board computer communicates with...

10.1109/tmtt.2009.2017298 article EN IEEE Transactions on Microwave Theory and Techniques 2009-03-30

Research on attacks which exploit video-based side-channels to decode text typed a smartphone has traditionally assumed that the adversary is able leverage some information from screen display (say, reflection of or low resolution video content screen). This paper introduces new breed side-channel attack PIN entry process entirely relies spatio-temporal dynamics hands during typing text. Implemented dataset 200 videos an HTC One phone, we show, breaks average over 50% PINs first attempt and...

10.1145/2660267.2660360 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2014-11-03

While body movement patterns recorded by a smartphone accelerometer are now well understood to be discriminative enough separate users, little work has been done address the question of if or how position in which phone is held affects user authentication. In this work, we show through combination supervised learning methods and statistical tests, that there certain users for whom exploitation information drastically improves classification performance. We propose two-stage authentication...

10.1109/cvprw.2014.20 article EN 2014-06-01

Despite the tremendous need for evaluation of touch-based authentication as an extra security layer mobile devices, huge disparity in experimental methodology used by different researchers makes it hard to determine how much research this area has progressed. Critical variables such types features and they are pre-processed, training testing performance metrics, mention but a few, vary from one study next. Additionally, most datasets these evaluations not openly accessible, making impossible...

10.1109/btas.2013.6712758 article EN 2013-09-01

Smart wearable devices have recently become one of the major technological trends and been widely adopted by general public. Wireless earphones, in particular, seen a skyrocketing growth due to its great usability convenience. With goal seeking more unobtrusive authentication method that users can easily use conveniently access, this study we present EarEcho as novel, affordable, user-friendly biometric solution. takes advantages unique physical geometrical characteristics human ear canal...

10.1145/3351239 article EN Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 2019-09-09

10.1016/0952-1976(95)90014-4 article DA Engineering Applications of Artificial Intelligence 1995-10-01

Touch-based verification --- the use of touch gestures (e.g., swiping, zooming, etc.) to authenticate users screen devices has recently been widely evaluated for its potential serve as a second layer defense PIN lock mechanism. In all performance evaluations touch-based authentication systems however, researchers have assumed naive (zero-effort) forgeries in which attacker makes no effort mimic given gesture pattern.

10.1145/2508859.2516659 article EN 2013-01-01

We studied the fusion of three biometric authentication modalities, namely, swiping gestures, typing patterns and phone movement observed during or swiping. A web browser was customized to collect data generated from aforementioned modalities over four seven days in an unconstrained environment. Several features were extracted by using sliding window mechanism for each modality analyzed information gain, correlation, symmetric uncertainty. Finally, five windows continuous swipes, thirty...

10.1109/btas.2016.7791164 article EN 2016-09-01

3D printing, or additive manufacturing, is a key technology for future manufacturing systems. However, printing systems have unique vulnerabilities presented by the ability to affect infill without affecting exterior. In order detect malicious defects in process, this paper proposes following: 1) investigate 2) extract features based on simulated process images, and 3) an experiment of image classification with one group non-defect other defect training from process. The images are captured...

10.1115/imece2016-67641 article EN Volume 14: Emerging Technologies; Materials: Genetics to Structures; Safety Engineering and Risk Analysis 2016-11-11

We propose a Monte Carlo approach to attain sufficient training data, splitting method improve effectiveness, and system composed of parallel decision trees (DTs) authenticate users based on keystroke patterns. For each user, approximately 19 times as much simulated data was generated complement the 387 vectors raw data. The set, including is split into four subsets. subset, wavelet transforms are performed obtain total eight subsets for user. Eight DTs thus trained using A DT constructed...

10.1109/tsmcb.2005.846648 article EN IEEE Transactions on Systems Man and Cybernetics Part B (Cybernetics) 2005-07-19

Hidden Markov Model (HMM) based applications are common in various areas, but the incorporation of HMM's for anomaly detection is still its infancy. This paper aims at classifying TCP network traffic as an attack or normal using HMM. The paper's main objective to build system, a predictive model capable discriminating between and abnormal behavior traffic. In training phase, special attention given initialization selection issues, which makes phase particularly effective. For HMM, 12.195%...

10.1145/1167350.1167387 article EN 2005-03-18

We present a new attack called the snoop-forge-replay on keystroke-based continuous verification systems. The is sample-level forgery and not specific to any particular method or system. It can be launched with easily available keyloggers APIs for keystroke synthesis. Our results from 2640 experiments show that: 1) attacks achieve alarmingly high error rates compared zero-effort impostor attacks, which have been de facto standard evaluating systems; 2) four state-of-the-art methods, three...

10.1109/tifs.2013.2244091 article EN IEEE Transactions on Information Forensics and Security 2013-01-31

Research on keystroke-based authentication has traditionally assumed human impostors who generate forgeries by physically typing the keyboard. With bots now well understood to have capacity originate precisely timed keystroke sequences, this model of attack is likely underestimate threat facing a system in practice. In work, we investigate how would perform if it were subjected synthetic attacks designed mimic typical user. To implement attacks, rigorous statistical analysis biometrics data...

10.1145/2516960 article EN ACM Transactions on Information and System Security 2013-09-01

We derive the feature selection criterion presented in [CHECK END OF SENTENCE] and from multidimensional mutual information between features class. Our derivation: 1) specifies validates lower-order dependency assumptions of 2) mathematically justifies utility by relating it to Bayes classification error.

10.1109/tpami.2010.62 article EN IEEE Transactions on Pattern Analysis and Machine Intelligence 2010-03-19

In this paper, we demonstrate that gait patterns of an individual captured through a smartphone accelerometer can be imitated with the support digital treadmill. Furthermore, design attack for baseline based authentication system (GBAS) and rigorously test its performance over eighteen user data-set. By employing only two imitators using simple treadmill speed control functionality, increases average false acceptance rate (FAR) from 5.8% to 43.66% random forest, best performing classifier in...

10.1109/btas.2015.7358801 article EN 2015-09-01

Individuals can be misled by fake news and spread it unintentionally without knowing is false. This phenomenon has been frequently observed but not investigated. Our aim in this work to assess the intent of spreaders. To distinguish between intentional versus unintentional spreading, we study psychological explanations spreading. With foundation, then propose an influence graph, using which extensive experiments show that assessed help significantly differentiate Furthermore, estimated...

10.1145/3485447.3512264 article EN Proceedings of the ACM Web Conference 2022 2022-04-25

In this work, we present a novel approach to clustering Web site users into different groups and generating common user profiles. These profiles can be used make recommendations, personalize sites, for other uses such as targeting advertising. By using the concept of mass distribution in Dempster-Shafer's theory, belief function similarity measure our algorithm adds task ability capture uncertainty among user's navigation behavior. Our is relatively simple use gives comparable results...

10.1145/500737.500768 article EN 2001-10-22

The degree of personalization that a Web site offers in presenting its services to users is an important attribute contributing the site's popularity. server access logs contain substantial data about user patterns. One way solve this problem group on basis their interests and then organize structure according needs different groups. Two main difficulties inhibit approach: essentially infinite diversity change these with time. We have developed clustering algorithm groups based ART1 version...

10.1109/mc.2004.1297299 article EN Computer 2004-04-01
Coming Soon ...