Shirish Singh
Shirish Singh
Verified email at - Homepage
Cited by
Cited by
Multitasking and monetary incentive in a realistic phishing study
H Zhang, S Singh, X Li, A Dahbura, M Xie
Proceedings of the 32nd International BCS Human Computer Interaction …, 2018
User specific context construction for personalized multimedia retrieval
S Singh, P Kumar
Multimedia Tools and Applications, 1-28, 2017
Detecting intelligent malware on dynamic Android analysis environments
S Singh, B Mishra, S Singh
2015 10th International Conference for Internet Technology and Secured …, 2015
Artificial user emulator to detect intelligent malware on android
S Singh, S Singh, B Mishra
International Journal of Intelligent Computing Research 6 (4), 640-646, 2015
Ad hoc Test Generation Through Binary Rewriting
A Saieva, S Singh, G Kaiser
20th IEEE International Working Conference on Source Code Analysis and …, 2020
System and method for authenticating user based on path location
DM Shila, SK Singh, EP Eyisi
US Patent App. 16/416,613, 2020
Learning context-content similarity for image retrieval
S Singh, M Xie
Proceedings of the 2017 ACM International Joint Conference on Pervasive and …, 2017
Context based image retrieval framework for smartphones
S Singh, P Kumar
2015 Fifth National Conference on Computer Vision, Pattern Recognition …, 2015
A privacy enhanced security framework for android users
SK Singh, B Mishra, P Gera
2015 5th International Conference on IT Convergence and Security (ICITCS), 1-6, 2015
CFS performance improvement using Binomial Heap
S Singh, P Kumar
2015 International Conference on Advances in Computing, Communications and …, 2015
Side channel attack on smartphone sensors to infer gender of the user
S Singh, DM Shila, G Kaiser
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 436-437, 2019
The system can't perform the operation now. Try again later.
Articles 1–11