Balagani, Kiran S.
25  results:
Search for persons X
?
 
?
 
?
3

SILK-TV: Secret Information Leakage from Keystroke Timing V..:

, In: Computer Security; Lecture Notes in Computer Science,
Balagani, Kiran S. ; Conti, Mauro ; Gasti, Paolo... - p. 263-280 , 2018
 
?
4

A multimodal data set for evaluating continuous authenticat..:

, In: Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems,
Yang, Qing ; Peng, Ge ; Nguyen, David T.... - p. 358-359 , 2014
 
?
5

Privacy-preserving population-enhanced biometric key genera..:

, In: IEEE International Joint Conference on Biometrics,
 
?
 
?
7

On the Feature Selection Criterion Based on an Approximatio..:

Balagani, Kiran S ; Phoha, Vir V
IEEE Transactions on Pattern Analysis and Machine Intelligence.  32 (2010)  7 - p. 1342-1343 , 2010
 
?
8

On the Relationship Between Dependence Tree Classification ..:

Balagani, Kiran S. ; Phoha, Vir V.
IEEE Transactions on Pattern Analysis and Machine Intelligence.  29 (2007)  10 - p. 1866-1868 , 2007
 
?
9

K-Means+ID3: A Novel Method for Supervised Anomaly Detectio..:

Gaddam, Shekhar R. ; Phoha, Vir V. ; Balagani, Kiran S.
IEEE Transactions on Knowledge and Data Engineering.  19 (2007)  3 - p. 345-354 , 2007
 
?
11

K-Means+ID3 and dependence tree methods for supervised anom..:

Balagani, Kiran S
https://digitalcommons.latech.edu/dissertations/508.  , 2008
 
?
12

DISPERSE: A Decentralized Architecture for Content Replicat..:

Mike O'Neal ; Mauro Conti ; Ding Ding...
url:https://www.openaccessrepository.it/communities/itmirror.  , 2020
 
?
14

We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack ..:

, In: Computer Security – ESORICS 2022; Lecture Notes in Computer Science,
 
?
15

Your PIN Sounds Good! Augmentation of PIN Guessing Strategi..:

, In: Computer Security – ESORICS 2020; Lecture Notes in Computer Science,
 
1-15