Beware, your hands reveal your secrets! D Shukla, R Kumar, A Serwadda, VV Phoha Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 189 | 2014 |
Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms A Serwadda, VV Phoha, Z Wang 2013 IEEE sixth international conference on biometrics: theory, applications …, 2013 | 175 | 2013 |
Context-aware active authentication using smartphone accelerometer measurements A Primo, VV Phoha, R Kumar, A Serwadda Proceedings of the IEEE conference on computer vision and pattern …, 2014 | 172 | 2014 |
Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns R Kumar, VV Phoha, A Serwadda 2016 IEEE 8th international conference on biometrics theory, applications …, 2016 | 119 | 2016 |
When kids' toys breach mobile phone security A Serwadda, VV Phoha Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 116 | 2013 |
Unsure how to authenticate on your vr headset? come on, use your head! T Mustafa, R Matovu, A Serwadda, N Muirhead Proceedings of the Fourth ACM International Workshop on Security and Privacy …, 2018 | 83 | 2018 |
Examining a large keystroke biometrics dataset for statistical-attack openings A Serwadda, VV Phoha ACM Transactions on Information and System Security (TISSEC) 16 (2), 1-30, 2013 | 77 | 2013 |
Wireless Sensor Networks RR Selmic, VV Phoha, A Serwadda Springer International Publishing AG, 2016 | 55 | 2016 |
Toward robotic robbery on the touch screen A Serwadda, VV Phoha, Z Wang, R Kumar, D Shukla ACM Transactions on Information and System Security (TISSEC) 18 (4), 1-25, 2016 | 41 | 2016 |
Gearbox fault diagnostics using deep learning with simulated data O Gecgel, S Ekwaro-Osire, JP Dias, A Serwadda, FM Alemayehu, ... 2019 IEEE international conference on prognostics and health management …, 2019 | 38 | 2019 |
Handwriting watcher: A mechanism for smartwatch-driven handwriting authentication I Griswold-Steiner, R Matovu, A Serwadda 2017 IEEE International Joint Conference on Biometrics (IJCB), 216-224, 2017 | 36 | 2017 |
Transforming animals in a cyber-behavioral biometric menagerie with frog-boiling attacks Z Wang, A Serwadda, KS Balagani, VV Phoha 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications …, 2012 | 35 | 2012 |
Using global knowledge of users' typing traits to attack keystroke biometrics templates A Serwadda, VV Phoha, A Kiremire Proceedings of the thirteenth ACM multimedia workshop on Multimedia and …, 2011 | 28 | 2011 |
fNIRS: A new modality for brain activity-based biometric authentication A Serwadda, VV Phoha, S Poudel, LM Hirshfield, D Bandara, SE Bratt, ... 2015 IEEE 7th International Conference on Biometrics Theory, Applications …, 2015 | 27 | 2015 |
Wearables-driven freeform handwriting authentication I Griswold-Steiner, R Matovu, A Serwadda IEEE Transactions on Biometrics, Behavior, and Identity Science 1 (3), 152-164, 2019 | 23 | 2019 |
Scan-based evaluation of continuous keystroke authentication systems A Serwadda, Z Wang, P Koch, S Govindarajan, R Pokala, A Goodkind, ... IT Professional 15 (4), 20-23, 2013 | 22 | 2013 |
Machine learning in crack size estimation of a spur gear pair using simulated vibration data O Gecgel, S Ekwaro-Osire, JP Dias, A Nispel, FM Alemayehu, ... Proceedings of the 10th International Conference on Rotor Dynamics–IFToMM …, 2019 | 21 | 2019 |
Your substance abuse disorder is an open secret! Gleaning sensitive personal information from templates in an EEG-based authentication system R Matovu, A Serwadda 2016 IEEE 8th International Conference on Biometrics Theory, Applications …, 2016 | 21 | 2016 |
Professional development for rural stem teachers on data science and cybersecurity: A university and school districts' partnership F Maina, J Smit, A Serwadda Australian and International Journal of Rural Education 31 (1), 30-41, 2021 | 11 | 2021 |
Defensive charging: Mitigating power side-channel attacks on charging smartphones R Matovu, A Serwadda, AV Bilbao, I Griswold-Steiner Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020 | 9 | 2020 |