default search action
Ajaya Neupane
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j6]Fikirte Ayalke Demmese, Ajaya Neupane, Sajad Khorsandroo, May Wang, Kaushik Roy, Yu Fu:
Machine learning based fileless malware traffic classification using image visualization. Cybersecur. 6(1): 32 (2023) - 2022
- [j5]Abdulrahman Fahim, Ajaya Neupane, Evangelos E. Papalexakis, Lance M. Kaplan, Srikanth V. Krishnamurthy, Tarek F. Abdelzaher:
BigEye: Detection and Summarization of Key Global Events From Distributed Crowdsensed Data. IEEE Internet Things J. 9(12): 9749-9765 (2022) - 2021
- [j4]Hoda Naghibijouybari, Ajaya Neupane, Zhiyun Qian, Nael B. Abu-Ghazaleh:
Beyond the CPU: Side-Channel Attacks on GPUs. IEEE Des. Test 38(3): 15-21 (2021) - [j3]Hoda Naghibijouybari, Ajaya Neupane, Zhiyun Qian, Nael B. Abu-Ghazaleh:
Side Channel Attacks on GPUs. IEEE Trans. Dependable Secur. Comput. 18(4): 1950-1961 (2021) - 2016
- [j2]Jose Omar Maximo, Ajaya Neupane, Nitesh Saxena, Robert M. Joseph, Rajesh K. Kana:
Task-Dependent Changes in Frontal-Parietal Activation and Connectivity During Visual Search. Brain Connect. 6(4): 335-344 (2016) - [j1]Ajaya Neupane, Nitesh Saxena, Jose Omar Maximo, Rajesh K. Kana:
Neural Markers of Cybersecurity: An fMRI Study of Phishing and Malware Warnings. IEEE Trans. Inf. Forensics Secur. 11(9): 1970-1983 (2016)
Conference and Workshop Papers
- 2023
- [c15]Md. Lutfor Rahman, Daniel Timko, Hamid Wali, Ajaya Neupane:
Users Really Do Respond To Smishing. CODASPY 2023: 49-60 - 2019
- [c14]Abdelrahman Fahim, Ajaya Neupane, Evangelos E. Papalexakis, Lance M. Kaplan, Srikanth V. Krishnamurthy, Tarek F. Abdelzaher:
Edge-Assisted Detection and Summarization of Key Global Events from Distributed Crowd-Sensed Data. IC2E 2019: 76-85 - [c13]Prakash Shrestha, Nitesh Saxena, Ajaya Neupane, Kiavash Satvat:
CATCHA: When Cats Track Your Movements Online. ISPEC 2019: 172-193 - [c12]Shasha Li, Ajaya Neupane, Sujoy Paul, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, Ananthram Swami:
Stealthy Adversarial Perturbations Against Real-Time Video Classification Systems. NDSS 2019 - [c11]Ajaya Neupane, Nitesh Saxena, Leanne M. Hirshfield, Sarah E. Bratt:
The Crux of Voice (In)Security: A Brain Study of Speaker Legitimacy Detection. NDSS 2019 - [c10]Daimeng Wang, Ajaya Neupane, Zhiyun Qian, Nael B. Abu-Ghazaleh, Srikanth V. Krishnamurthy, Edward J. M. Colbert, Paul L. Yu:
Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries. NDSS 2019 - [c9]Ajaya Neupane, Kiavash Satvat, Mahshid Hosseini, Nitesh Saxena:
Brain Hemorrhage: When Brainwaves Leak Sensitive Medical Conditions and Personal Information. PST 2019: 1-10 - 2018
- [c8]Ajaya Neupane, Kiavash Satvat, Nitesh Saxena, Despina Stavrinos, Haley Johnson Bishop:
Do Social Disorders Facilitate Social Engineering?: A Case Study of Autism and Phishing Attacks. ACSAC 2018: 467-477 - [c7]Md. Lutfor Rahman, Ajaya Neupane, Chengyu Song:
IAC: On the Feasibility of Utilizing Neural Signals for Access Control. ACSAC 2018: 641-652 - [c6]Hoda Naghibijouybari, Ajaya Neupane, Zhiyun Qian, Nael B. Abu-Ghazaleh:
Rendered Insecure: GPU Side Channel Attacks are Practical. CCS 2018: 2139-2153 - [c5]Md. Lutfor Rahman, Sharmistha Bardhan, Ajaya Neupane, Evangelos E. Papalexakis, Chengyu Song:
Learning Tensor-Based Representations from Brain-Computer Interface Data for Cybersecurity. ECML/PKDD (3) 2018: 389-404 - 2017
- [c4]Ajaya Neupane, Md. Lutfor Rahman, Nitesh Saxena:
PEEP: Passively Eavesdropping Private Input via Brainwave Signals. Financial Cryptography 2017: 227-246 - [c3]Ajaya Neupane, Nitesh Saxena, Leanne M. Hirshfield:
Neural Underpinnings of Website Legitimacy and Familiarity Detection: An fNIRS Study. WWW 2017: 1571-1580 - 2015
- [c2]Ajaya Neupane, Md. Lutfor Rahman, Nitesh Saxena, Leanne M. Hirshfield:
A Multi-Modal Neuro-Physiological Study of Phishing Detection and Malware Warnings. CCS 2015: 479-491 - 2014
- [c1]Ajaya Neupane, Nitesh Saxena, Keya Kuruvilla, Michael Georgescu, Rajesh K. Kana:
Neural Signatures of User-Centered Security: An fMRI Study of Phishing, and Malware Warnings. NDSS 2014
Informal and Other Publications
- 2022
- [i2]Muhammad Lutfor Rahman, Daniel Timko, Hamid Wali, Ajaya Neupane:
Users really do respond to smishing. CoRR abs/2212.13312 (2022) - 2018
- [i1]Shasha Li, Ajaya Neupane, Sujoy Paul, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, Ananthram Swami:
Adversarial Perturbations Against Real-Time Video Classification Systems. CoRR abs/1807.00458 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint