List of publications (Google Scholar| Citations: 950+, h-index: 13, i-10 index: 15)
Aditya Sharma, Vinti Agarwal, Rajesh Kumar, "G-Loss: Graph-Guided Fine-Tuning of Language Models", Learning on Graphs (LoG) Conference, 2025.
Rebira Jemma and Rajesh Kumar. How well do LLMs imitate human writing style? Paper presented at the IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON 2025), New York, NY, United States. [pdf]
DH Roh and R Kumar, "Active Authentication via Korean Keystrokes Under Varying LLM Assistance and Cognitive Contexts", 24th IEEE International Conference on Machine Learning and Applications (ICMLA), [Full regular paper accept rate 25%] [pdf]
D Roh, R Kumar, A Ngo, "LLM-Assisted Cheating Detection in Korean Language via Keystrokes", The IEEE International Joint Conference on Biometrics (IJCB 2025) [pdf] [Accept rate: ~39%]
Apoorva Gulati, Rajesh Kumar, Vinti Agarwal, Aditya Sharma, "Weak Links in LinkedIn: Enhancing Fake Profile Detection in the Age of LLMs", The 17th International Conference on Advances in Social Networks Analysis, 2025 [Accept Rate: 25%]. First-ever paper for Apoorva and Aditya. [webpage] [pdf] [code]
S Gupta, R Kumar, KB Raja, B Crispo, C Maple, "Evaluating Robustness of a Bimodal User Verification System against Synthetic Data Attacks", 22nd International Conference on Security and Cryptography, 2025 [pdf]
D Kundu, A Mehta, R Kumar, N Lal, A Anand, A Singh, RR Shah, "Keystroke Dynamics Against Academic Dishonesty in the Age of LLMs," The IEEE International Joint Conference on Biometrics (IJCB), 2024 [pdf][code] [ppt] [Accept rate: 32.2%] Received The Best Paper Award of IJCB 2024
A Ngo, R Kumar, P Cao, "Deep Generative Attacks and Countermeasures for Data-Driven Offline Signature Verification," The IEEE International Joint Conference on Biometrics (IJCB), 2024, [pdf][code] [Accept rate: 32.2%]
A Kuruvilla, R Daley, R Kumar, "Spotting Fake Profiles in Social Networks via Keystroke Dynamics," to appear in IEEE Consumer Communications & Networking Conference (CCNC 2024) Average accept rate--24.4% [pdf] [code and dataset] [presentation video]
R Kumar, C Isik, CK Mohan, "Dictionary Attack on IMU-based Gait Authentication," Artificial Intelligence and Security co-located with (ACM CCS 2023), Copenhagen [pdf] [code and dataset]
V Khurana, Y Kumar, H Nora, R Kumar, B Krishnamurthy, "Synthesizing Human Gaze Feedback for Improved NLP Performance," to appear in the 17th Conference of the European Chapter of the Association for Computational Linguistics (EACL 2023) [pdf] [video]
M Agrawal, P Mehrotra, R Kumar, and R R Shah, "GANTouch: An Attack-Resilient Framework for Touch-based Continuous Authentication System," IEEE Transactions on Biometrics, Behavior, and Identity Science, 2022 [pdf]
Jun H. Mo and Rajesh Kumar, "iCTGAN--An Attack Mitigation Technique for Random-vector Attack on Accelerometer-based Gait Authentication Systems," featured among the best-reviewed papers at IEEE International Joint Conference on Biometrics (IJCB), 2022 [pdf]
S Gupta, R Kumar, M Kacimi, B Crispo, "IDeAuth: A Novel Behavioral Biometric-based Implicit Deauthentication Scheme for Smartphones," Pattern Recognition Letters, Elsevier, 2022 [pdf] [dataset]
P Mehrotra, M Agrawal, R Kumar, R Shah, "Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks", featured among the best-reviewed papers at IEEE International Joint Conference on Biometrics (IJCB), [pdf]
R Kumar, C Isik, and VVPhoha, "Treadmill Assisted Gait Spoofing (TAGS): An Emerging Threat to Wearable Sensor-based Gait Authentication," ACM Journal of Digital Threats: Research and Practice, 2021 [pdf]
Vishaal Udandarao, Mohit Agrawal, R Kumar, RR Shah, "On the Inference of Soft Biometrics from Typing Patterns Collected in a Multi-device Environment", The Sixth IEEE International Conference on Multimedia Big Data, 2020 [pdf] [Code]
*S Rustagi and *A Garg, PR Anand, R Kumar, Y Kumar, RR Shah, "Touchless Typing Using Head Movement-based Gestures", The Sixth IEEE International Conference on Multimedia Big Data, 2020 [pdf] (*Authors contributed equally)
R Kumar, PP Kundu, VV Phoha, "Continuous Authentication Using One-class Classifiers and their Fusion", IEEE ISBA, International Conference on Identity, Security and Behavior Analysis, 2018, supported in part by National Science Foundation Award SaTC #1527795 [pdf]
PK Bera, R Kumar, C Isik "Identification of Internal Faults in Indirect Symmetrical Phase Shift Transformers Using Ensemble Learning", IEEE ISSPIT, 18th IEEE International Symposium on Signal Processing and Information Technology, 2018 [pdf]
R Kumar, PP Kundu, D Shukla, VV Phoha "Continuous User Authentication via Unlabeled Phone Movement Patterns", IEEE IJCB, International Joint Conference on Biometrics, 2017, supported in part by DARPA Active Authentication contract FA #8750-13-2-0274 and by National Science Foundation Award SaTC #1527795. [pdf]
A Serwadda, VV Phoha, Z Wang, R Kumar, D Shukla, "Toward Robotic Robbery on the Touch Screen", ACM Transactions on Information and System Security (TISSEC), 2016; Impact Factor: 4.8, the top ACM Transactions on Privacy and Security. Supported in part by DARPA Active Authentication contract: FA 8750-13-2-0274 and by National Science Foundation Award Number: 1527795. Impact: Altmetric – Toward Robotic Robbery on the Touch Screen [pdf].
R Kumar, VV Phoha, R Raina, "Authenticating Users Through Their Arm Movement Patterns," Computer Vision and Pattern Recognition (arxiv/cs.cv) 2016 [pdf]
R Kumar, VV Phoha, A Serwadda, "Continuous Authentication of Smartphone Users by Fusing Typing, Swiping, and Phone Movement Patterns," IEEE BTAS, International Conference on Biometrics: Theory, Applications, and Systems, 2016. Supported in part by the DARPA Active Authentication contract (FA 8750-13-2-0274) and the National Science Foundation Award (SA Te Number: 1527795). [pdf]
R Kumar, VV Phoha, A Jain, "Treadmill Attack on Gait-based Authentication Systems," IEEE BTAS, International Conference on Biometrics: Theory, Applications, and Systems, 2015. Partly supported by the DARPA Active Authentication grant FA8750-13-2-0274. [pdf]
R Kumar, S Kumar, D Shukla, RS Raw, OP Kaiwartya, "Geometrical Localization Algorithm for Three Dimensional Wireless Sensor Networks," International Journal of Wireless Personal Communications, 2014 Impact Factor: 2.2 [pdf]
A Primo, VV Phoha, R Kumar, A Serwadda, "Context-aware Active Authentication Using Smartphone Accelerometer Measurements," IEEE CVPR, Proceedings of Computer Vision and Pattern Recognition Workshops (CVPRW), 2014. This paper received the *Highest-Impact Paper* award at the CVPR Workshop on Biometrics 2018 [pdf]
D Shukla, R Kumar, A Serwadda, VV Phoha, "Beware, your hands reveal your secrets!", ACM CCS, Conference on Computer and Communications Security, 2014. Partly supported by the DARPA Active Authentication grant FA8750-13-2-0274. [pdf] Impact: Altmetric – Beware, Your Hands Reveal Your Secrets!
Active Authentication based on Swiping, Typing, and Body Movements.
Demonstration of the process of inferring a PIN from a video recorded publicly in a library.