Follow
Payas Gupta
Payas Gupta
Director of Research at Pindrop
Verified email at pindrop.com - Homepage
Title
Cited by
Cited by
Year
I can be you: Questioning the use of keystroke dynamics as biometrics.(2013)
CM Tey, P Gupta, D Gao
Annual Network and Distributed System Security Symposium 20th NDSS 2013, 24 …, 2013
105*2013
Mind your SMSes: Mitigating Social Engineering in Second Factor Authentication
H Siadati, T Nguyen, P Gupta, M Jakobsson, N Memon
Computers & Security, 2016
1032016
Phoneypot: Data-driven Understanding of Telephony Threats
P Gupta, B Srinivasan, V Balasubramaniyan, M Ahamad
Proceedings of the 20th Annual Network & Distributed System Security …, 2015
882015
SoK: Fraud in Telephony Networks
M Sahin, A Francillon, P Gupta, M Ahamad
Security and Privacy (EuroS&P), 2017 IEEE European Symposium on, 235-250, 2017
822017
Call authentication using call forwarding
P GUPTA, D Dewey
US Patent App. 10/375,248, 2019
51*2019
MobiPot: Understanding Mobile Telephony Threats with Honeycards
M Balduzzi, P Gupta, L Gu, D Gao, M Ahamad
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
412016
Zero-knowledge multiparty secure sharing of voiceprints
P Gupta, T Nelms
US Patent 10,873,461, 2020
322020
Fighting coercion attacks in key generation using skin conductance
P Gupta, D Gao
Proceedings of the 19th USENIX conference on Security, 30-30, 2010
302010
Your love is public now: questioning the use of personal information in authentication
P Gupta, S Gottipati, J Jiang, D Gao
Proceedings of the 8th ACM symposium on Information, computer and …, 2013
292013
Towards Measuring the Role of Phone Numbers in Twitter-Advertised Spam
P Gupta, R Perdisci, M Ahamad
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
262018
Towards Measuring the Effectiveness of Telephony Blacklists
S Pandit, R Perdisci, M Ahamad, P Gupta
25*
Fortifying Android Patterns using Persuasive Security Framework
H Siadati, P Gupta, S Smith, N Memon, M Ahamad
UBICOMM 2015, 81, 2015
182015
HuMan: Creating Memorable Fingerprints of Mobile Users
P Gupta, TK Wee, N Ramasubbu, D Lo, D Gao, RK Balan
182012
Understanding cross-channel abuse with sms-spam support infrastructure attribution
B Srinivasan, P Gupta, M Antonakakis, M Ahamad
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
162016
Under the Shadow of Sunshine: Characterizing Spam Campaigns Abusing Phone Numbers Across Online Social Networks
S Gupta, D Kuchhal, P Gupta, M Ahamad, M Gupta, P Kumaraguru
Proceedings of the 10th ACM Conference on Web Science, 67-76, 2018
152018
Exploiting Phone Numbers and Cross-Application Features in Targeted Mobile Attacks
S Gupta, P Gupta, M Ahamad, P Kumaraguru
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and …, 2016
152016
Abusing Phone Numbers and Cross-Application Features for Crafting Targeted Attacks
S Gupta, P Gupta, M Ahamad, P Kumaraguru
arXiv preprint arXiv:1512.07330, 2015
132015
OTO: Online Trust Oracle for User-Centric Trust Establishment.
THJ KIM, P GUPTA, J HAN, E Owusu, J Hong, A Perrig, D GAO
Proceedings of the 19th ACM Conference on Computer and Communications …, 2012
132012
Leveraging multiple audio channels for authentication
P GUPTA, IIT NELMS
US Patent 10,665,244, 2020
122020
Authentication using DTMF tones
P Gupta
US Patent 10,397,398, 2019
122019
The system can't perform the operation now. Try again later.
Articles 1–20