default search action
Sayanton V. Dibbo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Sudip Vhaduri, Sayanton V. Dibbo, Alexa Muratyan, William Cheung:
mWIoTAuth: Multi-wearable data-driven implicit IoT authentication. Future Gener. Comput. Syst. 159: 230-242 (2024) - [j4]Sudip Vhaduri, William Cheung, Sayanton V. Dibbo:
Bag of On-Phone ANNs to Secure IoT Objects Using Wearable and Smartphone Biometrics. IEEE Trans. Dependable Secur. Comput. 21(3): 1127-1138 (2024) - [c13]Sayanton V. Dibbo:
Novel Privacy Attacks and Defenses Against Neural Networks. CCS 2024: 5113-5115 - [c12]Sayanton V. Dibbo, Adam Breuer, Juston Moore, Michael A. Teti:
Improving Robustness to Model Inversion Attacks via Sparse Coding Architectures. ECCV (80) 2024: 117-136 - [c11]Sayanton V. Dibbo, Juston S. Moore, Garrett T. Kenyon, Michael A. Teti:
LCANets++: Robust Audio Classification Using Multi-Layer Neural Networks with Lateral Competition. ICASSP Workshops 2024: 129-133 - [i4]Sayanton V. Dibbo, Adam Breuer, Juston Moore, Michael A. Teti:
Improving Robustness to Model Inversion Attacks via Sparse Coding Architectures. CoRR abs/2403.14772 (2024) - 2023
- [j3]Sudip Vhaduri, Sayanton V. Dibbo, William Cheung:
Implicit IoT authentication using on-phone ANN models and breathing data. Internet Things 24: 101003 (2023) - [c10]Sayanton V. Dibbo:
SoK: Model Inversion Attack Landscape: Taxonomy, Challenges, and Future Roadmap. CSF 2023: 439-456 - [c9]Sayanton V. Dibbo, Dae Lim Chung, Shagufta Mehnaz:
Model Inversion Attack with Least Information and an In-depth Analysis of its Disparate Vulnerability. SaTML 2023: 119-135 - [i3]Sayanton V. Dibbo, Juston S. Moore, Garrett T. Kenyon, Michael A. Teti:
LCANets++: Robust Audio Classification using Multi-layer Neural Networks with Lateral Competition. CoRR abs/2308.12882 (2023) - 2022
- [c8]Sudip Vhaduri, Sayanton V. Dibbo, Chih-You Chen:
Predicting A User's Demographic Identity from Leaked Samples of Health-Tracking Wearables and Understanding Associated Risks. ICHI 2022: 309-318 - [c7]Shagufta Mehnaz, Sayanton V. Dibbo, Ehsanul Kabir, Ninghui Li, Elisa Bertino:
Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models. USENIX Security Symposium 2022: 4579-4596 - [i2]Shagufta Mehnaz, Sayanton V. Dibbo, Ehsanul Kabir, Ninghui Li, Elisa Bertino:
Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models. CoRR abs/2201.09370 (2022) - 2021
- [j2]Sudip Vhaduri, Sayanton Vhaduri Dibbo, Yugyeong Kim:
Deriving College Students' Phone Call Patterns to Improve Student Life. IEEE Access 9: 96453-96465 (2021) - [j1]Sudip Vhaduri, Sayanton Vhaduri Dibbo, William Cheung:
HIAuth: A Hierarchical Implicit Authentication System for IoT Wearables Using Multiple Biometrics. IEEE Access 9: 116395-116406 (2021) - [c6]Sayanton V. Dibbo, Yugyeong Kim, Sudip Vhaduri:
Effect of Noise on Generic Cough Models. BSN 2021: 1-4 - [c5]Sudip Vhaduri, Sayanton V. Dibbo, Chih-You Chen, Christian Poellabauer:
Predicting Next Call Duration: A Future Direction to Promote Mental Health in the Age of Lockdown. COMPSAC 2021: 804-811 - [c4]Sayanton V. Dibbo, Yugyeong Kim, Sudip Vhaduri, Christian Poellabauer:
Visualizing College Students' Geo-Temporal Context-Varying Significant Phone Call Patterns. ICHI 2021: 381-385 - [i1]Alexa Muratyan, William Cheung, Sayanton V. Dibbo, Sudip Vhaduri:
Opportunistic Implicit User Authentication for Health-Tracking IoT Wearables. CoRR abs/2109.13705 (2021) - 2020
- [c3]Samuel Morton, Rui Li, Sayanton V. Dibbo, Temiloluwa Prioleau:
Data-Driven Insights on Behavioral Factors that Affect Diabetes Management. EMBC 2020: 5557-5562
2010 – 2019
- 2017
- [c2]Hafiz Md. Hasan Babu, Lafifa Jamal, Sayanton Vhaduri Dibbo, Ashis Kumer Biswas:
Area and Delay Efficient Design of a Quantum Bit String Comparator. ISVLSI 2017: 51-56 - 2016
- [c1]Sayanton Vhaduri Dibbo, Hafiz Md. Hasan Babu, Lafifa Jamal:
An efficient design technique of a quantum divider circuit. ISCAS 2016: 2102-2105
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 21:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint