Name
Affiliation
Papers
NITESH SAXENA
Polytechnic Institute of New York University
145
Collaborators
Citations 
PageRank 
159
1204
82.45
Referers 
Referees 
References 
2026
2116
2064
Search Limit
1001000
Title
Citations
PageRank
Year
Continuous blood pressure monitoring using low-cost motion sensors on AR/VR headsets00.342022
Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting Techniques00.342022
Enabling Finger-Touch-Based Mobile User Authentication via Physical Vibrations on IoT Devices00.342022
Defending against Thru-barrier Stealthy Voice Attacks via Cross-Domain Sensing on Phoneme Sounds00.342022
Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication00.342022
SoK: assessing the threat potential of vibration-based attacks against live speech using mobile sensors00.342021
A hidden-password online password manager00.342021
Face-Mic: inferring live speech and speaker identity via subtle facial dynamics captured by AR/VR motion sensors00.342021
Press ${@}{\$}{@}{\$}$ to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing Gestures00.342021
EchoVib: Exploring Voice Authentication via Unique Non-Linear Vibrations of Short Replayed Speech20.382021
Countering Concurrent Login Attacks in “Just Tap” Push-based Authentication: A Redesign and Usability Evaluations00.342021
Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications10.372021
Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers10.352021
WearID - Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training.20.372020
Voicefox - Leveraging Inbuilt Transcription to Enhance the Security of Machine-Human Speaker Verification against Voice Synthesis Attacks.00.342020
IvoriWatch - Exploring Transparent Integrity Verification of Remote User Input Leveraging Wearables.00.342020
CREPE: A Privacy-Enhanced Crash Reporting System00.342020
Building and Studying a Password Store that Perfectly Hides Passwords from Itself00.342019
Noisy Vibrational Pairing of IoT Devices00.342019
Challenge-response behavioral mobile authentication: a comparative study of graphical patterns and cognitive games00.342019
Stethoscope: Crypto Phones with Transparent & Robust Fingerprint Comparisons using Inter Text-Speech Transformations00.342019
Compromising Speech Privacy under Continuous Masking in Personal Spaces00.342019
ZEMFA: Zero-Effort Multi-Factor Authentication based on Multi-Modal Gait Biometrics00.342019
Emerging-Image Motion CAPTCHAs: Vulnerabilities of Existing Designs, and Countermeasures10.482019
Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations20.372019
Sensor-Based Proximity Detection in the Face of Active Adversaries00.342019
The Crux of Voice (In)Security - A Brain Study of Speaker Legitimacy Detection.00.342019
Listening Watch: Wearable Two-Factor Authentication using Speech Signals Resilient to Near-Far Attacks.10.362018
Crashing Privacy: An Autopsy of a Web Browser's Leaked Crash Reports.00.342018
Short voice imitation man-in-the-middle attacks on Crypto Phones: Defeating humans and machines.00.342018
Speechless: Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors60.462018
VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration.70.422017
CCCP: Closed Caption Crypto Phones to Resist MITM Attacks, Human Errors and Click-Through.10.362017
Neural Underpinnings of Website Legitimacy and Familiarity Detection: An fNIRS Study.20.382017
On the security and usability of dynamic cognitive game CAPTCHAs.20.402017
On the Pitfalls of End-to-End Encrypted Communications: A Study of Remote Key-Fingerprint Verification.10.362017
PEEP: Passively Eavesdropping Private Input via Brainwave Signals.10.342017
Coresident evil: noisy vibrational pairing in the face of co-located acoustic eavesdropping10.362017
YELP: masking sound-based opportunistic attacks in zero-effort deauthentication.00.342017
SMASheD: Sniffing and Manipulating Android Sensor Data for Offensive Purposes.30.402017
Neural Markers of Cybersecurity: An fMRI Study of Phishing and Malware Warnings.20.362016
The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio.50.442016
SMASheD: Sniffing and Manipulating Android Sensor Data.30.382016
Theft-resilient mobile wallets: transparently authenticating NFC users with tapping gesture biometrics.20.362016
Gametrics: towards attack-resilient behavioral authentication with simple cognitive games.00.342016
Walk-Unlock: Zero-Interaction Authentication Protected with Multi-Modal Gait Biometrics.20.382016
Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks100.482016
Slogger: Smashing Motion-based Touchstroke Logging with Transparent System Noise.50.452016
Task-dependent Changes in Frontal-Parietal Activation and Connectivity during Visual Search.00.342016
A Multi-Modal Neuro-Physiological Study of Phishing Detection and Malware Warnings80.502015
  • 1
  • 2