Skip to main content

Showing 1–4 of 4 results for author: Isik, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2309.11766  [pdf, other

    cs.CR cs.CV cs.LG eess.SP

    Dictionary Attack on IMU-based Gait Authentication

    Authors: Rajesh Kumar, Can Isik, Chilukuri K. Mohan

    Abstract: We present a novel adversarial model for authentication systems that use gait patterns recorded by the inertial measurement unit (IMU) built into smartphones. The attack idea is inspired by and named after the concept of a dictionary attack on knowledge (PIN or password) based authentication systems. In particular, this work investigates whether it is possible to build a dictionary of IMUGait patt… ▽ More

    Submitted 31 December, 2023; v1 submitted 21 September, 2023; originally announced September 2023.

    Comments: 12 pages, 9 figures, accepted at AISec23 colocated with ACM CCS, November 30, 2023, Copenhagen, Denmark

    ACM Class: K.6.5

  2. arXiv:2012.09950  [pdf, other

    cs.CR cs.CV cs.HC

    Treadmill Assisted Gait Spoofing (TAGS): An Emerging Threat to wearable Sensor-based Gait Authentication

    Authors: Rajesh Kumar, Can Isik, Vir V Phoha

    Abstract: In this work, we examine the impact of Treadmill Assisted Gait Spoofing (TAGS) on Wearable Sensor-based Gait Authentication (WSGait). We consider more realistic implementation and deployment scenarios than the previous study, which focused only on the accelerometer sensor and a fixed set of features. Specifically, we consider the situations in which the implementation of WSGait could be using one… ▽ More

    Submitted 17 December, 2020; originally announced December 2020.

    Comments: 17 pages

    ACM Class: K.6.5

    Journal ref: ACM Journal of Digital Threats: Research and Practice, June 2021

  3. Intelligent Protection & Classification of Transients in Two-Core Symmetric Phase Angle Regulating Transformers

    Authors: Pallav Kumar Bera, Can Isik

    Abstract: This paper investigates the applicability of time and time-frequency features based classifiers to distinguish internal faults and other transients - magnetizing inrush, sympathetic inrush, external faults with current transformer saturation, and overexcitation - for Indirect Symmetrical Phase Angle Regulating Transformers (ISPAR). Then the faulty transformer unit (series/exciting) of the ISPAR is… ▽ More

    Submitted 17 June, 2020; originally announced June 2020.

    Journal ref: IEEE Access, vol. 9, pp. 72937-72948, 2021

  4. Identification of Internal Faults in Indirect Symmetrical Phase Shift Transformers Using Ensemble Learning

    Authors: Pallav Kumar Bera, Rajesh Kumar, Can Isik

    Abstract: This paper proposes methods to identify 40 different types of internal faults in an Indirect Symmetrical Phase Shift Transformer (ISPST). The ISPST was modeled using Power System Computer Aided Design (PSCAD)/ Electromagnetic Transients including DC (EMTDC). The internal faults were simulated by varying the transformer tap**, backward and forward phase shifts, loading, and percentage of winding… ▽ More

    Submitted 11 November, 2018; originally announced November 2018.

    Comments: 18th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2018

    Journal ref: IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2018, pp. 1-6,