Multitasking and monetary incentive in a realistic phishing study H Zhang, S Singh, X Li, A Dahbura, M Xie Proceedings of the 32nd International BCS Human Computer Interaction …, 2018 | 5 | 2018 |
User specific context construction for personalized multimedia retrieval S Singh, P Kumar Multimedia Tools and Applications, 1-28, 2017 | 3 | 2017 |
Detecting intelligent malware on dynamic Android analysis environments S Singh, B Mishra, S Singh 2015 10th International Conference for Internet Technology and Secured …, 2015 | 3 | 2015 |
Artificial user emulator to detect intelligent malware on android S Singh, S Singh, B Mishra International Journal of Intelligent Computing Research 6 (4), 640-646, 2015 | 2 | 2015 |
Ad hoc Test Generation Through Binary Rewriting A Saieva, S Singh, G Kaiser 20th IEEE International Working Conference on Source Code Analysis and …, 2020 | 1 | 2020 |
System and method for authenticating user based on path location DM Shila, SK Singh, EP Eyisi US Patent App. 16/416,613, 2020 | 1 | 2020 |
Learning context-content similarity for image retrieval S Singh, M Xie Proceedings of the 2017 ACM International Joint Conference on Pervasive and …, 2017 | 1 | 2017 |
Context based image retrieval framework for smartphones S Singh, P Kumar 2015 Fifth National Conference on Computer Vision, Pattern Recognition …, 2015 | 1 | 2015 |
A privacy enhanced security framework for android users SK Singh, B Mishra, P Gera 2015 5th International Conference on IT Convergence and Security (ICITCS), 1-6, 2015 | 1 | 2015 |
CFS performance improvement using Binomial Heap S Singh, P Kumar 2015 International Conference on Advances in Computing, Communications and …, 2015 | 1 | 2015 |
Side channel attack on smartphone sensors to infer gender of the user S Singh, DM Shila, G Kaiser Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 436-437, 2019 | | 2019 |