default search action
Miguel Vargas Martin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c65]Amit Maraj, Miguel Vargas Martin, Masoud Makrehchi:
Coherence Graphs: Bridging the Gap in Text Segmentation with Unsupervised Learning. NLDB (2) 2024: 139-149 - 2023
- [c64]Fangyi Yu, Miguel Vargas Martin:
Honey, I Chunked the Passwords: Generating Semantic Honeywords Resistant to Targeted Attacks Using Pre-trained Language Models. DIMVA 2023: 89-108 - 2022
- [j12]Ritvik Nimmagadda, Kritika Arora, Miguel Vargas Martin:
Emotion recognition models for companion robots. J. Supercomput. 78(11): 13710-13727 (2022) - [c63]Fangyi Yu, Miguel Vargas Martin:
GNPassGAN: Improved Generative Adversarial Networks For Trawling Offline Password Guessing. EuroS&P Workshops 2022: 10-18 - [c62]Fangyi Yu, Miguel Vargas Martin:
HoneyGAN: Creating Indistinguishable Honeywords with Improved Generative Adversarial Networks. STM 2022: 189-198 - [i3]Fangyi Yu, Miguel Vargas Martin:
GNPassGAN: Improved Generative Adversarial Networks For Trawling Offline Password Guessing. CoRR abs/2208.06943 (2022) - [i2]Fangyi Yu, Miguel Vargas Martin:
Targeted Honeyword Generation with Language Models. CoRR abs/2208.06946 (2022) - 2021
- [c61]Farimasadat Miri, Alireza A. Namanloo, Richard W. Pazzi, Miguel Vargas Martin:
A Novel Short-term Post-accident Traffic Prediction Model. DCOSS 2021: 189-196 - [c60]Amit Maraj, Miguel Vargas Martin, Masoud Makrehchi:
A More Effective Sentence-Wise Text Segmentation Approach Using BERT. ICDAR (4) 2021: 236-250 - [c59]Rahul Dubey, Miguel Vargas Martin:
Fool Me Once: A Study of Password Selection Evolution over the Past Decade. PST 2021: 1-7 - [c58]Ganyu Wang, Miguel Vargas Martin:
SegmentPerturb: Effective Black-Box Hidden Voice Attack on Commercial ASR Systems via Selective Deletion. PST 2021: 1-12 - [i1]Noopa Jagadeesh, Miguel Vargas Martin:
Alice in Passphraseland: Assessing the Memorability of Familiar Vocabularies for System-Assigned Passphrases. CoRR abs/2112.03359 (2021) - 2020
- [c57]Miguel Vargas Martin, Eduardo Pérez Valle, Sheri Horsburgh:
Artificial Empathy for Clinical Companion Robots with Privacy-By-Design. MobiHealth 2020: 351-361
2010 – 2019
- 2019
- [j11]Zeinab Joudaki, Julie Thorpe, Miguel Vargas Martin:
Enhanced Tacit Secrets: System-assigned passwords you can't write down, but don't need to. Int. J. Inf. Sec. 18(2): 239-255 (2019) - [j10]Ruba AlOmari, Miguel Vargas Martin, Shane MacDonald, Amit Maraj, Ramiro Liscano, Christopher Bellman:
Inside out - A study of users' perceptions of password memorability and recall. J. Inf. Secur. Appl. 47: 223-234 (2019) - [c56]Ruba AlOmari, Miguel Vargas Martin, Shane MacDonald, Christopher Bellman:
Using EEG to Predict and Analyze Password Memorability. ICCC 2019: 42-49 - [c55]Ganyu Wang, Miguel Vargas Martin, Patrick Hung, Shane MacDonald:
Towards Classifying Motor Imagery Using a Consumer-Grade Brain-Computer Interface. ICCC 2019: 67-69 - [c54]Amit Maraj, Miguel Vargas Martin, Matthew Shane, Mohammad Mannan:
On the null relationship between personality types and passwords. PST 2019: 1-7 - 2018
- [j9]Christopher Bellman, Miguel Vargas Martin, Shane MacDonald, Ruba AlOmari, Ramiro Liscano:
Have We Met Before? Using Consumer-Grade Brain-Computer Interfaces to Detect Unaware Facial Recognition. Comput. Entertain. 16(2): 7:1-7:17 (2018) - [j8]Amin Ibrahim, Shahryar Rahnamayan, Miguel Vargas Martin, Kalyanmoy Deb:
3D-RadVis Antenna: Visualization and performance measure for many-objective optimization. Swarm Evol. Comput. 39: 157-176 (2018) - [c53]Zeinab Joudaki, Julie Thorpe, Miguel Vargas Martin:
Reinforcing System-Assigned Passphrases Through Implicit Learning. CCS 2018: 1533-1548 - [c52]Jayshiro Tashiro, Patrick C. K. Hung, Miguel Vargas Martin:
Can an Evidence-Based Blended Learning Model Serve Healthcare Patients and Adult Education Students? ICBL 2018: 17-42 - [c51]Ruba AlOmari, Miguel Vargas Martin:
Classification of EEG Signals Using Neural Networks to Predict Password Memorability. ICMLA 2018: 791-796 - [c50]Christopher Bellman, Miguel Vargas Martin, Shane MacDonald:
(WKSP) On the Potential of Data Extraction by Detecting Unaware Facial Recognition with Brain-Computer Interfaces. ICCC 2018: 99-105 - [c49]David Zhao, Shane MacDonald, Thomas Gaudi, Alvaro Uribe-Quevedo, Miguel Vargas Martin, Bill Kapralos:
Facial Expression Detection Employing a Brain Computer Interface. IISA 2018: 1-2 - [c48]Amin Ibrahim, Shahryar Rahnamayan, Miguel Vargas Martin, Kalyanmoy Deb:
Enhanced Correlation Matrix Based Visualization for Multi- and Many-objective optimization. SSCI 2018: 2345-2352 - 2017
- [c47]Amin Ibrahim, Miguel Vargas Martin, Shahryar Rahnamayan, Kalyanmoy Deb:
Fusion-based hybrid many-objective optimization algorithm. CEC 2017: 2372-2381 - [c46]Amin Ibrahim, Shahryar Rahnamayan, Miguel Vargas Martin, Kalyanmoy Deb:
Fusion of Many-Objective Non-dominated Solutions Using Reference Points. EMO 2017: 314-328 - [c45]Christopher Bellman, Miguel Vargas Martin, Ramiro Liscano, Ruba AlOmari, Shane MacDonald:
Excuse Me, Do I Know You From Somewhere? Unaware Facial Recognition Using Brain-Computer Interfaces. HICSS 2017: 1-9 - [c44]Christopher Bellman, Miguel Vargas Martin:
Use of Machine Learning for Detection of Unaware Facial Recognition Without Individual Training. ICMLA 2017: 950-954 - [c43]Diana Moreno, Mohammed Melaisi, Shane MacDonald, Alvaro Uribe-Quevedo, Bill Kapralos, Miguel Vargas Martin:
A brain-computer interface to examine the effects of sound on a haptic-based virtual drilling task. IISA 2017: 1-4 - [c42]Ruba AlOmari, Miguel Vargas Martin, Shane MacDonald, Christopher Bellman, Ramiro Liscano, Amit Maraj:
What Your Brain Says About Your Password: Using Brain-Computer Interfaces to Predict Password Memorability. PST 2017: 127-136 - [c41]Zeinab Joudaki, Julie Thorpe, Miguel Vargas Martin:
System-Assigned Passwords You Can't Write Down, But Don't Need To. PST 2017: 137-146 - 2016
- [j7]Huizilopoztli Luna-García, Ricardo Mendoza González, Miguel Vargas Martin, Jaime Muñoz Arteaga, Francisco Álvarez Rodríguez, Laura C. Rodríguez-Martínez:
Validating Design Patterns for Mobile Groupware Applications by Expert Users: a USAER Case. Computación y Sistemas 20(2) (2016) - [j6]Miguel Vargas Martin, Victor Cho, Gabriel Aversano:
Detection of Subconscious Face Recognition Using Consumer-Grade Brain-Computer Interfaces. ACM Trans. Appl. Percept. 14(1): 7:1-7:20 (2016) - [c40]Visal Chea, Miguel Vargas Martin, Ramiro Liscano:
Evaluating Hamming Distance as a CRC-based Side-channel Detection Measure in Wi-Fi Networks. ANT/SEIT 2016: 425-432 - [c39]Brent Moore, Miguel Vargas Martin, Ramiro Liscano:
Evaluating Hamming Distance as a Metric for the Detection of CRC-based Side-channel Communications in MANETs. ANT/SEIT 2016: 433-440 - [c38]Christopher Bellman, Ruba AlOmari, Albert Fung, Miguel Vargas Martin, Ramiro Liscano:
Challenges in the Effectiveness of Image Tagging Using Consumer-Grade Brain-Computer Interfaces. AVR (2) 2016: 55-64 - [c37]Amin Ibrahim, Shahryar Rahnamayan, Miguel Vargas Martin, Kalyanmoy Deb:
3D-RadVis: Visualization of Pareto front in many-objective optimization. CEC 2016: 736-745 - [c36]Amin Ibrahim, Shahryar Rahnamayan, Miguel Vargas Martin, Kalyanmoy Deb:
EliteNSGA-III: An improved evolutionary many-objective optimization algorithm. CEC 2016: 973-982 - [c35]David Rojas, Miguel Vargas Martin, Bill Kapralos:
Evaluating a sound-enhanced intrusion detection system to identify network congestion. MED 2016: 1325-1330 - 2015
- [c34]Visal Chea, Miguel Vargas Martin, Ramiro Liscano:
Hamming distance as a metric for the detection of CRC-based side-channel communications in 802.11 wireless networks. CNS 2015: 218-226 - [c33]Jayshiro Tashiro, Patrick C. K. Hung, Miguel Vargas Martin, Robert R. Tashiro:
What Really Works in Hybrid Learning: A Cognitive Perspective. ICHL 2015: 15-35 - [c32]Claudio A. Ardagna, Meiko Jensen, Miguel Vargas Martin:
IEEE Services Visionary Track on Security and Privacy Engineering (SPE 2015). SERVICES 2015: 151 - 2014
- [c31]Miguel Vargas Martin:
Automatic Hotlink Insertion in Live Production Websites. IEEE SCC 2014: 782-788 - [c30]Amin Ibrahim, Shahryar Rahnamayan, Miguel Vargas Martin:
Simulated Raindrop algorithm for global optimization. CCECE 2014: 1-8 - [c29]N. Madtha, Miguel Vargas Martin, Ramiro Liscano, Brent Moore, Mazda Salmanian, Ming Li, Peter C. Mason:
Detection of side-channel communication in ad hoc networks using request to send (RTS) messages. CCECE 2014: 1-6 - [c28]Jayshiro Tashiro, Fred Hurst, Alison Brown, Patrick C. K. Hung, Miguel Vargas Martin:
Personalized-Adaptive Learning - A Model for CIT Curricula. ICHL 2014: 266-277 - [c27]Huizilopoztli Luna-García, Ricardo Mendoza González, Miguel Vargas Martin, Jaime Muñoz Arteaga, Francisco Javier Álvarez Rodríguez, Laura C. Rodríguez-Martínez:
A Classification of Design Patterns to Support Mobile Groupware Systems. MexIHC 2014: 46-52 - [c26]Ricardo Rodriguez Garcia, Julie Thorpe, Miguel Vargas Martin:
Crypto-assistant: Towards facilitating developer's encryption of sensitive data. PST 2014: 342-346 - [c25]Amin Ibrahim, Shahryar Rahnamayan, Miguel Vargas Martin:
MDE: Differential evolution with merit-based mutation strategy. SDE 2014: 41-48 - 2013
- [c24]Miguel Vargas Martin:
Navdriver: Adaptive Websites via SaaS. IEEE SCC 2013: 699-704 - [c23]Jayshiro Tashiro, Miguel Vargas Martin, Patrick C. K. Hung:
MISSED - Studying Students' Development of Misconceptions in Hybrid Courses. ICHL 2013: 364-376 - 2011
- [c22]Jayshiro Tashiro, Patrick C. K. Hung, Miguel Vargas Martin:
Evidence-Based Educational Practices and a Theoretical Framework for Hybrid Learning. ICHL 2011: 51-72 - [c21]Ali Najafizadeh, Ramiro Liscano, Miguel Vargas Martin, Peter C. Mason, Mazda Salmanian:
Challenges in the Implementation and Simulation for Wireless Side-Channel based on Intentionally Corrupted FCS. ANT/MobiWIS 2011: 165-172 - 2010
- [c20]Shahram Heydari, Miguel Vargas Martin, Walid Rjaibi, Xiaodong Lin:
Emerging trends in network forensics. CASCON 2010: 389-390 - [c19]Miguel Vargas Martin, Kamilla R. Johannsdottir, Gerardo B. Reynaga, Jayshiro Tashiro, Miguel Ángel García-Ruíz:
Unconscious mind: Authenticating with something you don't know? Or just an infallible liveness test? CCECE 2010: 1-6 - [c18]Ulises Ibarra Hernandez, Miguel Vargas Martin, Francisco Álvarez Rodríguez, Ricardo Mendoza González, Fabio A. Garcia Toribio:
A requirements taxonomy and rating model for secure and usable B2C/C2C e-commerce websites. ICDIM 2010: 367-372 - [c17]Jayshiro Tashiro, Patrick C. K. Hung, Miguel Vargas Martin:
ROAD-MAP for Educational Simulations and Serious Games. ICHL 2010: 186-204
2000 – 2009
- 2009
- [j5]Jaime Muñoz Arteaga, Ricardo Mendoza González, Miguel Vargas Martin, Jean Vanderdonckt, Francisco Álvarez Rodríguez:
A methodology for designing information security feedback based on User Interface Patterns. Adv. Eng. Softw. 40(12): 1231-1241 (2009) - [j4]Ricardo Mendoza González, Miguel Vargas Martin, Jaime Muñoz Arteaga, Francisco Álvarez Rodríguez, Carlos Alberto Ochoa Ortíz Zezzatti:
Web Service-Security Specification based on Usability Criteria and Pattern Approach. J. Comput. 4(8): 705-712 (2009) - [c16]Khalil El-Khatib, Walid Rjaibi, Shahram Heydari, Miguel Vargas Martin:
Workshop on cybersecurity: security and privacy in the 21st century. CASCON 2009: 366 - [c15]Ricardo Mendoza González, Miguel Vargas Martin, Jaime Muñoz Arteaga, Francisco Álvarez Rodríguez, Miguel Ángel García-Ruíz:
A measurement model for secure and usable e-commerce websites. CCECE 2009: 77-82 - [c14]Ricardo Mendoza González, Jaime Muñoz Arteaga, Miguel Vargas Martin, Francisco Álvarez Rodríguez, Juan Manuel González-Calleros:
A Pattern Methodology to Specify Usable Security in Websites. DEXA Workshops 2009: 155-159 - [c13]Amin Ibrahim, Miguel Vargas Martin:
Detecting and Preventing the Electronic Transmission of Illicit Images and Its Network Performance. ICDF2C 2009: 139-150 - [c12]Marvin Odor, Babak Nasri, Mazda Salmanian, Peter C. Mason, Miguel Vargas Martin, Ramiro Liscano:
A frame handler module for a side-channel in mobile ad hoc networks. LCN 2009: 930-936 - 2008
- [j3]Miguel Ángel García-Ruíz, Arthur Edwards Block, Miguel Vargas Martin, Samir ElSeoud:
Auditory Display as a Tool for Teaching Network Intrusion Detection. Int. J. Emerg. Technol. Learn. 3(2): 59-62 (2008) - [c11]Jaime Muñoz Arteaga, Ricardo Mendoza González, Miguel Vargas Martin, Jean Vanderdonckt, Francisco Álvarez Rodríguez, Juan Manuel González-Calleros:
A Method to Design Information Security Feedback Using Patterns and HCI-Security Criteria. CADUI 2008: 283-294 - 2007
- [j2]Jurek Czyzowicz, Evangelos Kranakis, Danny Krizanc, Andrzej Pelc, Miguel Vargas Martin:
Assigning Bookmarks in Perfect Binary Trees. Ars Comb. 82 (2007) - [c10]Patrick C. K. Hung, Jude Andrade, Yongming Chen, Ranny Huang, Miguel Vargas Martin, Yi Zheng:
Research Issues of Privacy Access Control Model for Mobile Ad Hoc Healthcare Applications with XACML. AINA Workshops (2) 2007: 582-587 - [c9]Ricardo Mendoza González, Jaime Muñoz Arteaga, Francisco Álvarez Rodríguez, Miguel Vargas Martin:
Monitoreo del Desempeño de los Factores de Seguridad de una Transacción Web a través de la Interfaz de Usuario. JIISIC 2007: 275-282 - [c8]Lei Qi, Miguel Vargas Martin, Bill Kapralos, Mark Green, Miguel Ángel García-Ruíz:
Toward Sound-Assisted Intrusion Detection Systems. OTM Conferences (2) 2007: 1634-1645 - [c7]Asaf Shupo, Bill Kapralos, Miguel Vargas Martin:
Statiscal-based skin classifier for omni-directional images. VISAPP (Special Sessions) 2007: 11-17 - 2006
- [j1]Paul C. van Oorschot, Jean-Marc Robert, Miguel Vargas Martin:
A monitoring system for detecting repeated packets with applications to computer worms. Int. J. Inf. Sec. 5(3): 186-199 (2006) - [c6]Munish Chopra, Miguel Vargas Martin, Luis Rueda, Patrick C. K. Hung:
Toward New Paradigms to Combating Internet Child Pornography. CCECE 2006: 1012-1015 - [c5]Patrick C. K. Hung, Miguel Vargas Martin:
Security Issues in VOIP Applications. CCECE 2006: 2361-2364 - [c4]Jaime Muñoz Arteaga, Ricardo Mendoza González, Francisco J. Álvarez, Miguel Vargas Martin:
A classification of security patterns for the transactions between a requester, an intermediary, and a web-service. Communication, Network, and Information Security 2006: 132-137 - 2003
- [c3]Evangelos Kranakis, Danny Krizanc, Miguel Vargas Martin:
Optimizing Web Server's Data Transfer with Hotlinks. ICWI 2003: 341-346 - 2002
- [c2]Evangelos Kranakis, Danny Krizanc, Miguel Vargas Martin:
The Hotlink Optimizer. International Conference on Internet Computing 2002: 87-94 - 2000
- [c1]Prosenjit Bose, Evangelos Kranakis, Danny Krizanc, Miguel Vargas Martin, Jurek Czyzowicz, Andrzej Pelc, Leszek Gasieniec:
Strategies for Hotlink Assignments. ISAAC 2000: 23-34
Coauthor Index
aka: Francisco Javier Álvarez Rodríguez
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 21:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint