Beware, Your Hands Reveal Your Secrets! D Shukla, R Kumar, A Serwadda, V Phoha 21st ACM Conference on Computer and Communication Security (CCS), 2014 | 180 | 2014 |
Towards Robotic Robbery on the Touch Screen A Serwadda, V Phoha, Z Wang, R Kumar, D Shukla ACM Transactions on Information And System Security, 2016 | 39 | 2016 |
Stealing passwords by observing hands movement D Shukla, VV Phoha IEEE Transactions on Information Forensics and Security 14 (12), 3086-3101, 2019 | 34 | 2019 |
Continuous user authentication via unlabeled phone movement patterns R Kumar, PP Kundu, D Shukla, VV Phoha 2017 IEEE International Joint Conference on Biometrics (IJCB), 177-184, 2017 | 25 | 2017 |
Geometrical Localization Algorithm for Three Dimensional Wireless Sensor Networks R Kumar, S Kumar, D Shukla, RS Raw, O Kaiwartya Wireless Personal Communications, 1-16, 2014 | 25 | 2014 |
Thinking Unveiled: An Inference and Correlation Model to Attack EEG Biometrics D Shukla, PP Kundu, R Malapati, S Poudel, Z Jin, V Phoha Digital Threats: Research and Practice, 2020 | 12 | 2020 |
Physical Data Auditing for Attack Detection in Cyber-Manufacturing Systems: Blockchain for Machine Learning Process J Song, D Shukla, M Wu, VV Phoha, YB Moon ASME 2019 International Mechanical Engineering Congress and Exposition, 2020 | 12 | 2020 |
Covid-19 Fake News Infodemic Research Dataset (CoVID19-FNIR Dataset) JA Saenz, SR Kalathur Gopal, D Shukla IEEE Dataport, 2021 | 10 | 2021 |
Body-Taps: Authenticating Your Device Through Few Simple Taps D Shukla, G Wei, D Xue, Z Jin, VV Phoha 9th IEEE International Conference on Biometrics: Theory, Applications, and …, 2018 | 7 | 2018 |
Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual World are Visible to All! SRK Gopal, D Shukla, JD Wheelock, N Saxena | 5 | 2023 |
Concealable biometric-based continuous user authentication system an eeg induced deep learning model SRK Gopal, D Shukla 2021 IEEE International Joint Conference on Biometrics (IJCB), 1-8, 2021 | 4 | 2021 |
Continuous Authentication Using Gait Patterns AJ Nair, B Premjith, D Shukla, KP Soman International Conference on Signal & Data Processing, 447-459, 2022 | 2 | 2022 |
A temporal memory-based continuous authentication system SRK Gopal, D Shukla 2021 IEEE International Joint Conference on Biometrics (IJCB), 1-7, 2021 | 2 | 2021 |
Feature Engineering and Selection for the Identification of Fake News in Social Media R Vinay, B Premjith, D Shukla, KP Soman International Conference on Signal & Data Processing, 291-301, 2022 | 1 | 2022 |
Looking Through Your Smartphone Screen to Steal Your Pin Using a 3D Camera D Shukla, VV Phoha, S Prakash Science and Information Conference, 1010-1020, 2018 | 1 | 2018 |
Revisiting face detection: Supercharging Viola-Jones with particle swarm optimization for enhanced performance M Mohana, P Subashini, D Shukla Journal of Intelligent & Fuzzy Systems, 1-15, 2024 | | 2024 |
Press ${@}{\$}{@}{\$} $ to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing Gestures P Shrestha, N Saxena, D Shukla, VV Phoha 2021 IEEE European Symposium on Security and Privacy (EuroS&P), 71-87, 2021 | | 2021 |
Brain Signals and the Corresponding Hand Movement Signals Dataset (BS-HMS-Dataset) D Shukla, S Chen, Y Lu, PP Kundu, R Malapati, S Poudel, Z Jin, V Phoha IEEE Dataport, 2019 | | 2019 |
Inferences from Interactions with Smart Devices: Security Leaks and Defenses D Shukla | | 2019 |
A Closer Look at Video Based Side Channel Attacks on the Smartphone User’s Pin D Shukla, VV Phoha SDPS 2017, 2017 | | 2017 |