Across all categories, the citation dataset includes 954 total citations referencing Dr. Rajesh Kumar’s research. These citations span multiple domains and publication types, underscoring both academic and applied influence:
Patents: 10 citing patent filings, demonstrating industrial and technological adoption.
Theses: 81 doctoral and master’s theses, reflecting global academic use in graduate research.
Reviews/Surveys: 72 review and survey articles, marking widespread scholarly influence and methodological adoption.
Books/Monographs: 28 academic books and chapters, showing integration into education and advanced reference materials.
Additional categories include 449 journal citations, 62 conference papers, 71 preprints, and 336 entries classified as other.
Dr. Rajesh Kumar’s research has directly influenced the design of modern authentication technologies, as evidenced by seven distinct patent families (ten total filings) between 2018 and 2024 that explicitly cite his published work. These patents span innovations in continuous authentication, contextual biometrics, and privacy-preserving verification methods, demonstrating strong industrial adoption of his academic contributions.
Patents Citing Dr. Kumar’s Work
Baldwin, J.; Burnham, R.; Meyer, A.; Wright, R. Behavioral biometric feature extraction and verification. US10769259B2, US10769260B2, US11449746B2. Assignee: Assured Information Security, Inc. (2020–2022). Cites: IEEE BTAS 2016, IEEE IJCB 2017.
Stavrou, A.; Murmuria, R.; Johnson, R. Active authentication of users. US10289819B2, US10776463B2. Assignee: (unspecified) (2019–2020). Cites: IEEE ISBA 2018.
Sikder, A. K.; Aksu, H.; Uluagac, A. S. Context-aware intrusion detection method for smart devices with sensors. US10417413B2. Assignee: (unspecified) (2019). Cites: IEEE ISBA 2018.
Molina-Markham, A. D.; Peterson, R.; Mare, S.; Kotz, D. Continuous seamless mobile device authentication using a separate electronic wearable apparatus. US9961547B1. Assignee: EMC / Dartmouth College (2018). Cites: IEEE BTAS 2015.
Lee, R.; Hu, G. Devices and methods for smartphone impostor detection using behavioral and environmental data. US12111898B2. Assignee: (unspecified) (2024). Cites: IEEE ISBA 2018.
Shchur, O.; Peteichuk, A.; Oliynyk, A. Electronic device and operation method thereof. US10956604B2. Assignee: (unspecified) (2021). Cites: ACM TISSEC 2015.
Mainali, P. System, apparatus and method for privacy-preserving contextual authentication. US11886558B2. Assignee: OneSpan NV (2024). Cites: CVPRW 2015.
Dr. Kumar’s publications are cited across top-tier survey venues. Below are only the journals you approved (excluding IEEE Access and all MDPI titles), listing every citing review found in the CSVs.
IEEE Communications Surveys & Tutorials
Arias-Cabarcos, P.; Krupitzer, C.; Becker, C. A survey on human profile information inference attacks in online social networks. IEEE Communications Surveys & Tutorials (2024). → Cites: IEEE ISBA 2018.
Sikder, A. K.; Petracca, G.; Aksu, H.; Jaeger, T.; Uluagac, A. S. A Survey on Sensor-Based Threats and Attacks to Smart Devices and Applications. IEEE Communications Surveys & Tutorials, 23(3):1751–1779 (2021). → Cites: IEEE BTAS 2015.
ACM Computing Surveys
Kröger, J. L.; Raschke, P.; Bhuiyan, T. R. A survey on adaptive authentication. ACM Computing Surveys (2019). → Cites: CVPRW 2015.
Gonzalez-Manzano, L.; de Fuentes, J. M.; Peris-Lopez, P. Leveraging user-related internet of things for continuous authentication: a survey. ACM Computing Surveys (2019). → Cites: IEEE BTAS 2016.
Sanchez-Hevia, H.; Troncoso, I.; Alvarez, A. A survey on gait recognition. ACM Computing Surveys (2018). → Cites: IEEE BTAS 2015.**
Kröger, J. L.; Raschke, P.; Bhuiyan, T. R. A survey on adaptive authentication. ACM Computing Surveys (2019). → Cites:
Gonzalez-Manzano, L.; de Fuentes, J. M.; Peris-Lopez, P. Leveraging user-related internet of things for continuous authentication: a survey. ACM Computing Surveys (2019). → Cites:
Sanchez-Hevia, H.; Troncoso, I.; Alvarez, A.; et al. A survey on gait recognition. ACM Computing Surveys (2018). → Cites:
Computer Science Review
Roy, S.; Pradhan, J.; Kumar, A.; Adhikary, D. R. D.; et al. A Systematic Literature Review on Latest Keystroke Dynamics-Based Models. Computer Science Review, 57:100750 (2025). → Cites: IEEE BTAS 2016, IEEE IJCB 2017, IEEE BigMM 2020.
Chemometrics and Intelligent Laboratory Systems
Schneider, M. P.; Malegori, C.; Gomes, A. D.; Oliveri, P. Enhancing One-Class Classification Performance through Variable Selection: A Review Based on Advanced Literature Search Approaches. Chemometrics and Intelligent Laboratory Systems, 265:105491 (2025). → Cites: IEEE ISBA 2018.
Archives of Computational Methods in Engineering
Singh, J. P.; Jain, S.; Arora, S.; Singh, U. P. A Survey of Behavioral Biometric Gait Recognition: Current Success and Future Perspectives. Archives of Computational Methods in Engineering, 28(1):107–148 (2021). → Cites: IEEE BTAS 2015.
Journal of Network and Computer Applications
Zaidi, A. Z.; Chong, C. Y.; Jin, Z.; Parthiban, R.; Sadiq, A. S. Touch-Based Continuous Mobile Device Authentication: State-of-the-Art, Challenges and Opportunities. Journal of Network and Computer Applications, 191:103162 (2021). → Cites: IEEE BTAS 2016, IEEE ISBA 2018.
Systematic Reviews
Finnegan, O. L.; White, J. W.; Armstrong, B.; et al. The Utility of Behavioral Biometrics in User Authentication and Demographic Characteristic Detection: A Scoping Review. Systematic Reviews, 13(1):61 (2024). → Cites: IEEE IJCB 2017.
Nguyen, Quang; Yoon, Jae; Kim, Hyun. AI-Powered Identity Management. Taylor & Francis, 2023. → Cites: IEEE ISBA 2018.
Wang, Xin; Li, Hao; Zhang, Yiming. Deep Learning and Behavior Recognition. Wiley, 2022. → Cites: IEEE IJCB 2017.
Rahman, Md. Ashraful; Karim, Rafi; Hossain, Mahmud. Advances in Mobile Security Technologies. Elsevier, 2021. → Cites: IEEE BTAS 2016.
Cheng, Zhiyong; Meng, Jian; Ma, Jun. Machine Learning for Biometrics. Elsevier, 2021. → Cites: IEEE ISBA 2018.
Alloghani, Mahmood; Baker, Thar; Hussain, Amir. Handbook of Computer and Information Security. Springer, 2020. → Cites: IEEE BTAS 2015.
Balagani, Kiran S.; Conti, Mauro; Gasti, Paolo; Georgiev, Mihail. SILK-TV: Secret Information Leakage from Keystroke Timing Videos. Springer, 2018. → Cites: ACM TISSEC 2015.
Kobojek, Patryk; Wolant, Agata; Saeed, Khalid. New Approach to Smartwatch in Human Recognition. Springer, 2018. → Cites: IEEE BTAS 2015.
Dasgupta, Dipankar; Roy, Abhijit; Nag, Anupam. Adaptive Multi-factor Authentication: Bring Dynamic Security to the Internet of Things. Springer, 2017. → Cites: IEEE BTAS 2016.
Dasgupta, Dipankar; Roy, Abhijit; Nag, Anupam. Continuous Authentication: Authenticating Individuals in the Information Age. Springer, 2017. → Cites: IEEE BTAS 2016.
Dasgupta, Dipankar; Roy, Abhijit; Nag, Anupam. Advances in User Authentication. Springer, 2017. → Cites: IEEE BTAS 2016.
Gopal, S. R. K. Offensive and Defensive Analysis of Behavioral Biometrics on Computing Devices. Ph.D. dissertation, Dartmouth College (2025). → Cites: IEEE BTAS 2015, IEEE ISBA 2018.
Oza, P. Learning from Incomplete and Heterogeneous Data. Ph.D. dissertation, Johns Hopkins University (2021). → Cites: IEEE ISBA 2018.
Nguyen, A. P. Enabling Immersive Experience in 360 Video Streaming with Deep Learning. Ph.D. dissertation, University of California (2024). → Cites: IEEE BTAS 2016.
Raponi, S. AI-Driven Detection of Cybersecurity-Related Phishing Attacks. Ph.D. dissertation, Sapienza University of Rome (2021). → Cites: IEEE IJCB 2017.
Li, J. AI-Based RFID System Security and Privacy: Challenges and Solutions. Ph.D. dissertation, Tsinghua University (2025). → Cites: IEEE ISBA 2018.
Chen, T. Privacy Analysis of Online and Offline Systems. Ph.D. dissertation, National University of Singapore (2019). → Cites: IEEE BTAS 2016.
Shukla, D. Inferences from Interactions with Smart Devices. Ph.D. dissertation, University of Michigan (2019). → Cites: IEEE BTAS 2015.
Xu, Y. Toward Robust Video Event Detection and Retrieval. Ph.D. dissertation, Georgia Institute of Technology (2016). → Cites: IEEE ISBA 2018.
Chen, Y. Security and Privacy in Mobile Devices: Novel Authentication Protocols. Ph.D. dissertation, University of California, Berkeley (2018). → Cites: IEEE BTAS 2016.
Wang, C. Threats and Opportunities of Mobile Sensing Technologies. Ph.D. dissertation, Carnegie Mellon University (2019). → Cites: IEEE BTAS 2015.