Follow
Hossen Asiful Mustafa, PhD
Title
Cited by
Cited by
Year
Security and Privacy Vulnerabilities of {In-Car} Wireless Networks: A Tire Pressure Monitoring System Case Study
I Rouf, R Miller, H Mustafa, T Taylor, S Oh, W Xu, M Gruteser, W Trappe, ...
19th USENIX Security Symposium (USENIX Security 10), 2010
5242010
Neighborhood watch: Security and privacy analysis of automatic meter reading systems
I Rouf, H Mustafa, M Xu, W Xu, R Miller, M Gruteser
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1372012
Current events: Identifying webpages by tapping the electrical outlet
SS Clark, H Mustafa, B Ransford, J Sorber, K Fu, W Xu
European Symposium on Research in Computer Security, 700-717, 2013
702013
Jamming-resilient multipath routing
H Mustafa, X Zhang, Z Liu, W Xu, A Perrig
IEEE transactions on dependable and secure computing 9 (6), 852-864, 2012
512012
Cetad: Detecting evil twin access point attacks in wireless hotspots
H Mustafa, W Xu
2014 IEEE Conference on Communications and Network Security, 238-246, 2014
412014
You can call but you can't hide: detecting caller id spoofing attacks
H Mustafa, W Xu, AR Sadeghi, S Schulz
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
372014
A direction-sensitive fall detection system using single 3D accelerometer and learning classifier
F Hossain, ML Ali, MZ Islam, H Mustafa
2016 International Conference on Medical Engineering, Health Informatics and …, 2016
292016
Detection of on-road vehicles emanating GPS interference
G Kar, H Mustafa, Y Wang, Y Chen, W Xu, M Gruteser, T Vu
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
232014
Tetherway: a framework for tethering camouflage
S Schulz, AR Sadeghi, M Zhdanova, H Mustafa, W Xu, V Varadharajan
Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012
172012
End-to-end detection of caller ID spoofing attacks
H Mustafa, W Xu, AR Sadeghi, S Schulz
IEEE Transactions on Dependable and Secure Computing 15 (3), 423-436, 2016
162016
A secure QR code system for sharing personal confidential information
MS Ahamed, HA Mustafa
2019 International Conference on Computer, Communication, Chemical …, 2019
152019
Multi-level feature fusion for robust pose-based gait recognition using RNN
MM Hasan, HA Mustafa
Int. J. Comput. Sci. Inf. Secur.(IJCSIS) 18 (1), 2020
142020
Network intrusion detection system using voting ensemble machine learning
M Raihan-Al-Masud, HA Mustafa
2019 IEEE International Conference on Telecommunications and Photonics (ICTP …, 2019
102019
Short paper: Jamming-resilient multipath routing leveraging availability-based correlation
HA Mustafa, X Zhang, Z Liu, W Xu, A Perrig
Proceedings of the fourth ACM conference on Wireless network security, 41-46, 2011
102011
Role mining algorithm evaluation and improvement in large volume android applications
X Zhang, W Han, Z Fang, Y Yin, H Mustafa
Proceedings of the first international workshop on Security in embedded …, 2013
62013
Secure and reliable wireless communication through end-to-end-based solution
HA Mustafa
University of South Carolina, 2014
12014
A Practical Study of Security and Privacy Issues in Automatic Meter Reading System
I Roufa, R Millerb, H Mustafaa, M Xua, W Xua
IEEE Spectrum, October, 2010
12010
Learning view‐invariant features using stacked autoencoder for skeleton‐based gait recognition
MM Hasan, HA Mustafa
IET Computer Vision 15 (7), 527-545, 2021
2021
A Multi-Channel Clustering based Anti-Jamming Technique for Wireless Sensor Networks by Localizing Jammer
MHH Mustafa
In the Proceedings of the International Conference on Applications and …, 2019
2019
Design and Analysis of a Secure Three Factor User Authentication Scheme Using Biometric and Smart Card
HA Mustafa, HM Kafi
arXiv preprint arXiv:1711.01198, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–20