Publications

List of publications (Google Scholar| Citations: 439, h-index: 9, i-10 index: 9)

List of top venues (journals and conferences in biometrics)

List of top conferences in computer security

Published:

  1. R Kumar, C Isik, and VVPhoha, "Treadmill Assisted Gait Spoofing (TAGS): An Emerging Threat to Wearable Sensor-based Gait Authentication," in print with ACM Journal of Digital Threats: Research and Practice, 2020 [pdf]

  2. Vishaal Udandarao, Mohit Agrawal, R Kumar, RR Shah, "On the Inference of Soft Biometrics from Typing Patterns Collected in a Multi-device Environment", The Sixth IEEE International Conference on Multimedia Big Data , 2020 [pdf] [Code]

  3. S Rustagi and A Garg , PR Anand, R Kumar, Y Kumar, RR Shah, "Touchless Typing Using Head Movement-based Gestures", The Sixth IEEE International Conference on Multimedia Big Data , 2020 [pdf]

  4. R Kumar, PP Kundu, VV Phoha, "Continuous Authentication Using One-class Classifiers and their Fusion", IEEE ISBA, International Conference on Identity, Security and Behavior Analysis, 2018 [pdf]

  5. PK Bera, R Kumar, C Isik "Identification of Internal Faults in Indirect Symmetrical Phase Shift Transformers Using Ensemble Learning", IEEE ISSPIT, 18th IEEE International Symposium on Signal Processing and Information Technology, 2018 [pdf]

  6. R Kumar, PP Kundu, D Shukla, VV Phoha "Continuous User Authentication via Unlabeled Phone Movement Patterns", IEEE IJCB, International Joint Conference on Biometrics, 2017 [pdf]

  7. A Serwadda, VV Phoha, Z Wang, R Kumar, D Shukla, "Toward Robotic Robbery on the Touch Screen", ACM Transactions on Information and System Security (TISSEC), 2016; Impact Factor: 2.6, the top ACM transaction on privacy and security. [pdf]

  8. R Kumar, VV Phoha, R Raina"Authenticating Users Through Their Arm Movement Patterns", Computer Vision and Pattern Recognition (arxiv/cs.cv) 2016 [pdf]

  9. R Kumar, VV Phoha, A Serwadda, "Continuous Authentication of Smartphone Users by Fusing Typing, Swiping, and Phone Movement Patterns", IEEE BTAS, International Conference on Biometrics: Theory, Applications, and Systems, 2016 [pdf]

  10. R Kumar, VV Phoha, A Jain, "Treadmill Attack on Gait-based Authentication Systems", IEEE BTAS, International Conference on Biometrics: Theory, Applications, and Systems, 2015 [pdf]

  11. R Kumar, S Kumar, D Shukla, RS Raw, OP Kaiwartya, "Geometrical Localization Algorithm for Three Dimensional Wireless Sensor Networks", International Journal of Wireless Personal Communications, 2014 Impact Factor: 1.20 [pdf]

  12. A Primo, VV Phoha, R Kumar, A Serwadda, "Context-aware Active Authentication Using Smartphone Accelerometer Measurements", IEEE CVPR, Proceedings of Computer Vision and Pattern Recognition Workshops (CVPRW), 2014. This paper received *Highest Impact Paper* award at CVPR Workshop on Biometrics 2018 [pdf]

  13. D Shukla, R Kumar, A Serwadda, VV Phoha, "Beware, your hands reveal your secrets!", ACM CCS, Conference on Computer and Communications Security, 2014 [pdf]

Latech_AA_TA1b_Mobile_Demo_18May2014_21_28.mp4

Active Authentication based on Swiping, Typing, and Body Movements.

StealingPINFromVideos.mpeg

Demonstration of the process of inferring a PIN from a video recorded publicly in a library.

News coverage by WishTV on the paper Beware your hands reveal your secrets!