Jagmohan Chauhan
Cited by
Cited by
BreathPrint: Breathing acoustics-based user authentication
J Chauhan, Y Hu, S Seneviratne, A Misra, A Seneviratne, Y Lee
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
Performance evaluation of Yahoo! S4: A first look
J Chauhan, SA Chowdhury, D Makaroff
2012 Seventh International Conference on P2P, Parallel, Grid, Cloud and …, 2012
Gesture-based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case
J Chauhan, HJ Asghar, MA Kaafar, A Mahanti
Applied Cryptography and Network Security 9696, 648-665, 2016
Characterization of early smartwatch apps
J Chauhan, S Seneviratne, MA Kaafar, A Mahanti, A Seneviratne
2016 IEEE International Conference on Pervasive Computing and Communication …, 2016
Breathing-based authentication on resource-constrained iot devices using recurrent neural networks
J Chauhan, S Seneviratne, Y Hu, A Misra, A Seneviratne, Y Lee
Computer 51 (5), 60-67, 2018
Towards the Era of Wearable Computing?
J Chauhan, A Mahanti, MA Kaafar
Proceedings of the 2014 CoNEXT on Student Workshop, 24-25, 2014
Performance characterization of deep learning models for breathing-based authentication on resource-constrained devices
J Chauhan, J Rajasegaran, S Seneviratne, A Misra, A Seneviratne, Y Lee
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018
Are wearables ready for https? on the potential of direct secure communication on wearables
H Kolamunna, J Chauhan, Y Hu, K Thilakarathna, D Perino, D Makaroff, ...
2017 IEEE 42nd Conference on Local Computer Networks (LCN), 321-329, 2017
The impact of capacity scheduler configuration settings on mapreduce jobs
J Chauhan, D Makaroff, W Grassmann
2012 Second International Conference on Cloud and Green Computing, 667-674, 2012
Are wearables ready for secure and direct internet communication?
H Kolamunna, J Chauhan, Y Hu, K Thilakarathna, D Perino, D Makaroff, ...
GetMobile: Mobile Computing and Communications 21 (3), 5-10, 2017
Performance evaluation of video-on-demand in virtualized environments: the client perspective
J Chauhan, D Makaroff
Proceedings of the 6th international workshop on Virtualization Technologies …, 2012
Simulation and Performance Evaluation of Hadoop Capacity Scheduler
J Chauhan, D Makaroff, W Grassmann
Proceedings of 24th Annual International Conference on Computer Science and …, 2014
Simulation and performance evaluation of Hadoop capacity scheduler
J Chauhan
University of Saskatchewan, 2013
VM clock synchronization measurements
J Chauhan, D Makaroff, A Arkles
30th IEEE International Performance Computing and Communications Conference, 1-2, 2011
Decentralized iot edge nanoservice architecture for future gadget-free computing
E Harjula, P Karhula, J Islam, T Leppänen, A Manzoor, M Liyanage, ...
IEEE Access 7, 119856-119872, 2019
Empath-d: Empathetic design for accessibility
KTW Choo, RK Balan, TK Wee, J Chauhan, A Misra, Y Lee
Proceedings of the 18th International Workshop on Mobile Computing Systems …, 2017
BehavioCog: An Observation Resistant Authentication Scheme
J Chauhan, BZH Zhao, HJ Asghar, J Chan, MA Kaafar
International Conference on Financial Cryptography and Data Security, 2017
Assessing the acceptability of a text messaging service and smartphone app to support patient adherence to medications prescribed for high blood pressure: a pilot study.
A Kassavou, J Chauhan, J Brimicombe, D Bhattacharya, F Naughton, ...
Exploring Automatic Diagnosis of COVID-19 from Crowdsourced Respiratory Sound Data
C Brown, J Chauhan, A Grammenos, J Han, A Hasthanasombat, ...
arXiv preprint arXiv:2006.05919, 2020
Authenticating a user
D Kaafar, H Asghar, J Chauhan, J Chan
US Patent App. 16/099,801, 2019
The system can't perform the operation now. Try again later.
Articles 1–20