• Publications
  • Influence
Deep Convolutional Neural Network on iOS Mobile Devices
Deep Convolutional Neural Network (CNN) draws significant attention in the computer vision community by facilitating machines with more intelligence in understanding visual signals, however, itsExpand
  • 10
  • 2
A multi-faceted approach to user authentication for mobile devices — Using human movement, usage, and location patterns
Mobile devices have now become indispensable and ubiquitous enablers for collaboration. Such a ubiquity increases concerns over the resilience of existing mobile authentication methods and theirExpand
  • 12
Argus: Smartphone-Enabled Human Cooperation via Multi-agent Reinforcement Learning for Disaster Situational Awareness
Argus exploits a Multi-Agent Reinforcement Learning (MARL) framework to create a 3D mapping of the disaster scene using agents present around the incident zone to facilitate the rescue operations.Expand
  • 13
  • PDF
At Your Fingertips: Considering Finger Distinctness in Continuous Touch-Based Authentication for Mobile Devices
Currently, the most prevalent approaches to authenticate smartphones involve either PINs, swipe patterns, or passwords. Few users enable these approaches. In order to encourage adoption, newExpand
  • 12
Argus: Smartphone-enabled human cooperation for disaster situational awareness via MARL
Argus exploits a Multi-Agent Reinforcement Learning (MARL) framework to create a 3D mapping of the disaster scene using agents present around the incident zone to facilitate the rescue operations.Expand
  • 10
CollabLoc: Privacy-Preserving Multi-Modal Localization via Collaborative Information Fusion
Mobile phones provide an excellent opportunity for building context-aware applications. In particular, location-based services are important context-aware services that are more and more used forExpand
  • 5
  • PDF
Targeted DoS on android: how to disable android in 10 seconds or less
we present the implementation and impact of a wide-range of novel targeted Denial of Service (DoS) attacks on Android devices that are persistent across all recent Android platform versions. The DoSExpand
  • 8
HCFContext: Smartphone Context Inference via Sequential History-based Collaborative Filtering
Mobile context determination is an important step for many context-aware services such as location-based services, enterprise policy enforcement, building/room occupancy detection for power/HVACExpand
  • 3
  • PDF
Neuromorphic and early warning behavior-based authentication for mobile devices
Finding the balance between security, privacy, and usability for mobile authentication has been an active area of research for the past several years. Many researchers have taken advantage of theExpand
  • 3