Snoop-forge-replay Attacks on Continuous Verification with Keystrokes KA Rahman, KS Balagani, VV Phoha IEEE Transactions on Information Forensics and Security (TIFS), 2013 | 73 | 2013 |
Person to camera distance measurement based on eye-distance KA Rahman, MS Hossain, MAA Bhuiyan, T Zhang, M Hasanuzzaman, ... 2009 Third International Conference on Multimedia and Ubiquitous Engineering …, 2009 | 54 | 2009 |
Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes KA Rahman, KS Balagani, VV Phoha CVPR 2011 workshops, 31-38, 2011 | 40 | 2011 |
Continuous user verification via mouse activities KA Rahman, R Moormann, D Dierich, MS Hossain Multimedia Communications, Services and Security: 8th International …, 2015 | 13 | 2015 |
On enhancing serial fusion based multi-biometric verification system M Hossain, J Chen, K Rahman Applied Intelligence 48, 4824-4833, 2018 | 10 | 2018 |
Smartwatch dynamics: a novel modality and solution to attacks on cyber-behavioral biometrics for continuous verification? KA Rahman, N Alam, J Musarrat, A Madarapu, MS Hossain 2020 International Symposium on Networks, Computers and Communications …, 2020 | 9 | 2020 |
Facial expression analysis as a means for additional biometric security in recognition systems DJ Tubbs, KA Rahman Multimedia Communications, Services and Security: 8th International …, 2015 | 9 | 2015 |
Movement pattern based authentication for smart mobile devices KA Rahman, DJ Tubbs, MS Hossain 2018 17th IEEE International Conference on Machine Learning and Applications …, 2018 | 8 | 2018 |
Web user authentication using chosen word keystroke dynamics KA Rahman, D Neupane, A Zaiter, MS Hossain 2019 18th IEEE International Conference On Machine Learning And Applications …, 2019 | 7 | 2019 |
Performance study of LMS and NLMS adaptive algorithms in interference cancellation of speech signals A Kabir, KA Rahman, I Hussain Journal of State University of Bangladesh 1 (1), 57-65, 2007 | 7 | 2007 |
How discernible is user impromptu behavior when unlocking a touch screen? KA Rahman, JG Maes 2017 20th International Conference of Computer and Information Technology …, 2017 | 4 | 2017 |
An empirical study on verifier order selection in serial fusion based multi-biometric verification system MS Hossain, KA Rahman Advances in Artificial Intelligence: From Theory to Practice: 30th …, 2017 | 4 | 2017 |
User authentication based on mouse movement data using normalized features BA Anima, M Jasim, KA Rahman, M Hasanuzzaman 2016 19th International conference on computer and information technology …, 2016 | 4 | 2016 |
Video image clustering based on human face and shirt color MS Hossain, KA Rahman, MD Hasanuzzaman, MA Bhuyian, H Ueno International Journal of Image and Graphics 10 (01), 1-19, 2010 | 3 | 2010 |
DAAB: Deep authorship attribution in Bengali AK Dipongkor, MS Islam, H Kayesh, MS Hossain, A Anwar, KA Rahman, ... 2021 International Joint Conference on Neural Networks (IJCNN), 1-9, 2021 | 2 | 2021 |
Continuous Authentication Using Creative Writing MS Hossain, C Haberfeld, K Yuan, J Chen, KA Rahman, I Hussain 2020 International Symposium on Networks, Computers and Communications …, 2020 | 2 | 2020 |
Motion based unlocking method for electronic devices KA Rahman, DJ Tubbs US Patent App. 15/071,928, 2016 | 2 | 2016 |
User Authentication from Mouse Movement Data Using SVM Classifier BA Anima, M Jasim, KA Rahman, A Rulapaugh, M Hasanuzzaman Cryptology and Network Security: 15th International Conference, CANS 2016 …, 2016 | 2 | 2016 |
Optimized mask selection for person identification and camera distance measurement based on interocular distance KA Rahman, S Hossain, AA Bhuiyan, T Zhang, M Hasanuzzaman, ... J. Comput. Eng. Research 1 (2), 29-42, 2010 | 2 | 2010 |
Eye-Distance Based Mask Selection for Person Identification KA Rahman, MS Hossain, MAA Bhuiyan, T Zhang, M Hasanuzzaman, ... 2009 Third International Conference on Multimedia and Ubiquitous Engineering …, 2009 | 2 | 2009 |