Follow
Abdul Serwadda
Abdul Serwadda
Associate Professor, Computer Science, Texas Tech University
Verified email at ttu.edu
Title
Cited by
Cited by
Year
Beware, your hands reveal your secrets!
D Shukla, R Kumar, A Serwadda, VV Phoha
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1802014
Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms
A Serwadda, VV Phoha, Z Wang
2013 IEEE sixth international conference on biometrics: theory, applications …, 2013
1702013
Context-aware active authentication using smartphone accelerometer measurements
A Primo, VV Phoha, R Kumar, A Serwadda
Proceedings of the IEEE conference on computer vision and pattern …, 2014
1662014
When kids' toys breach mobile phone security
A Serwadda, VV Phoha
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1112013
Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns
R Kumar, VV Phoha, A Serwadda
2016 IEEE 8th international conference on biometrics theory, applications …, 2016
1082016
Examining a large keystroke biometrics dataset for statistical-attack openings
A Serwadda, VV Phoha
ACM Transactions on Information and System Security (TISSEC) 16 (2), 1-30, 2013
752013
Unsure how to authenticate on your vr headset? come on, use your head!
T Mustafa, R Matovu, A Serwadda, N Muirhead
Proceedings of the Fourth ACM International Workshop on Security and Privacy …, 2018
662018
Wireless Sensor Networks
RR Selmic, VV Phoha, A Serwadda
Springer International Publishing AG, 2016
492016
Toward robotic robbery on the touch screen
A Serwadda, VV Phoha, Z Wang, R Kumar, D Shukla
ACM Transactions on Information and System Security (TISSEC) 18 (4), 1-25, 2016
382016
Transforming animals in a cyber-behavioral biometric menagerie with frog-boiling attacks
Z Wang, A Serwadda, KS Balagani, VV Phoha
2012 IEEE Fifth International Conference on Biometrics: Theory, Applications …, 2012
372012
Handwriting watcher: A mechanism for smartwatch-driven handwriting authentication
I Griswold-Steiner, R Matovu, A Serwadda
2017 IEEE International Joint Conference on Biometrics (IJCB), 216-224, 2017
332017
Gearbox fault diagnostics using deep learning with simulated data
O Gecgel, S Ekwaro-Osire, JP Dias, A Serwadda, FM Alemayehu, ...
2019 IEEE international conference on prognostics and health management …, 2019
322019
Using global knowledge of users' typing traits to attack keystroke biometrics templates
A Serwadda, VV Phoha, A Kiremire
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and …, 2011
282011
fNIRS: A new modality for brain activity-based biometric authentication
A Serwadda, VV Phoha, S Poudel, LM Hirshfield, D Bandara, SE Bratt, ...
2015 IEEE 7th International Conference on Biometrics Theory, Applications …, 2015
262015
Scan-based evaluation of continuous keystroke authentication systems
A Serwadda, Z Wang, P Koch, S Govindarajan, R Pokala, A Goodkind, ...
IT Professional 15 (4), 20-23, 2013
222013
Your substance abuse disorder is an open secret! Gleaning sensitive personal information from templates in an EEG-based authentication system
R Matovu, A Serwadda
2016 IEEE 8th international conference on biometrics theory, applications …, 2016
212016
Wearables-driven freeform handwriting authentication
I Griswold-Steiner, R Matovu, A Serwadda
IEEE Transactions on Biometrics, Behavior, and Identity Science 1 (3), 152-164, 2019
202019
Machine learning in crack size estimation of a spur gear pair using simulated vibration data
O Gecgel, S Ekwaro-Osire, JP Dias, A Nispel, FM Alemayehu, ...
Proceedings of the 10th International Conference on Rotor Dynamics–IFToMM …, 2019
202019
Professional development for rural stem teachers on data science and cybersecurity: A university and school districts' partnership
F Maina, J Smit, A Serwadda
Australian and International Journal of Rural Education 31 (1), 30-41, 2021
92021
Defensive charging: Mitigating power side-channel attacks on charging smartphones
R Matovu, A Serwadda, AV Bilbao, I Griswold-Steiner
Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020
82020
The system can't perform the operation now. Try again later.
Articles 1–20