Balagani, Kiran
21  results:
Search for persons X
?
1

We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack ..:

, In: Computer Security – ESORICS 2022; Lecture Notes in Computer Science,
 
?
2

Your PIN Sounds Good! Augmentation of PIN Guessing Strategi..:

, In: Computer Security – ESORICS 2020; Lecture Notes in Computer Science,
 
?
3

USB side-channel attack on Tor:

Yang, Qing ; Gasti, Paolo ; Balagani, Kiran..
Computer Networks.  141 (2018)  - p. 57-66 , 2018
 
?
4

Utilizing linguistically enhanced keystroke dynamics to pre..:

Brizan, David Guy ; Goodkind, Adam ; Koch, Patrick...
International Journal of Human-Computer Studies.  82 (2015)  - p. 57-68 , 2015
 
?
 
?
 
?
8

SILK-TV: Secret Information Leakage from Keystroke Timing V..:

, In: Computer Security; Lecture Notes in Computer Science,
Balagani, Kiran S. ; Conti, Mauro ; Gasti, Paolo... - p. 263-280 , 2018
 
?
9

A multimodal data set for evaluating continuous authenticat..:

, In: Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems,
Yang, Qing ; Peng, Ge ; Nguyen, David T.... - p. 358-359 , 2014
 
?
10

Privacy-preserving population-enhanced biometric key genera..:

, In: IEEE International Joint Conference on Biometrics,
 
?
 
?
12

On the Feature Selection Criterion Based on an Approximatio..:

Balagani, Kiran S ; Phoha, Vir V
IEEE Transactions on Pattern Analysis and Machine Intelligence.  32 (2010)  7 - p. 1342-1343 , 2010
 
?
13

On the Relationship Between Dependence Tree Classification ..:

Balagani, Kiran S. ; Phoha, Vir V.
IEEE Transactions on Pattern Analysis and Machine Intelligence.  29 (2007)  10 - p. 1866-1868 , 2007
 
?
14

K-Means+ID3: A Novel Method for Supervised Anomaly Detectio..:

Gaddam, Shekhar R. ; Phoha, Vir V. ; Balagani, Kiran S.
IEEE Transactions on Knowledge and Data Engineering.  19 (2007)  3 - p. 345-354 , 2007
 
1-15