Follow
Hossen Asiful Mustafa, PhD
Title
Cited by
Cited by
Year
Security and privacy vulnerabilities of {In-Car} wireless networks: A tire pressure monitoring system case study
I Rouf, R Miller, H Mustafa, T Taylor, S Oh, W Xu, M Gruteser, W Trappe, ...
19th USENIX Security Symposium (USENIX Security 10), 2010
6082010
Neighborhood watch: Security and privacy analysis of automatic meter reading systems
I Rouf, H Mustafa, M Xu, W Xu, R Miller, M Gruteser
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1452012
Current events: Identifying webpages by tapping the electrical outlet
SS Clark, H Mustafa, B Ransford, J Sorber, K Fu, W Xu
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
842013
Jamming-resilient multipath routing
H Mustafa, X Zhang, Z Liu, W Xu, A Perrig
IEEE transactions on dependable and secure computing 9 (6), 852-864, 2012
572012
Cetad: Detecting evil twin access point attacks in wireless hotspots
H Mustafa, W Xu
2014 IEEE Conference on Communications and Network Security, 238-246, 2014
482014
You can call but you can't hide: detecting caller id spoofing attacks
H Mustafa, W Xu, AR Sadeghi, S Schulz
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
482014
A direction-sensitive fall detection system using single 3D accelerometer and learning classifier
F Hossain, ML Ali, MZ Islam, H Mustafa
2016 International Conference on Medical Engineering, Health Informatics and …, 2016
372016
A secure QR code system for sharing personal confidential information
MS Ahamed, HA Mustafa
2019 International Conference on Computer, Communication, Chemical …, 2019
362019
Detection of on-road vehicles emanating GPS interference
G Kar, H Mustafa, Y Wang, Y Chen, W Xu, M Gruteser, T Vu
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
302014
End-to-end detection of caller ID spoofing attacks
H Mustafa, W Xu, AR Sadeghi, S Schulz
IEEE Transactions on Dependable and Secure Computing 15 (3), 423-436, 2016
292016
Multi-level feature fusion for robust pose-based gait recognition using RNN
MM Hasan, HA Mustafa
Int. J. Comput. Sci. Inf. Secur.(IJCSIS) 18 (1), 2020
252020
Tetherway: a framework for tethering camouflage
S Schulz, AR Sadeghi, M Zhdanova, H Mustafa, W Xu, V Varadharajan
Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012
202012
Network intrusion detection system using voting ensemble machine learning
M Raihan-Al-Masud, HA Mustafa
2019 IEEE International Conference on Telecommunications and Photonics (ICTP …, 2019
172019
Short paper: Jamming-resilient multipath routing leveraging availability-based correlation
HA Mustafa, X Zhang, Z Liu, W Xu, A Perrig
Proceedings of the fourth ACM conference on Wireless network security, 41-46, 2011
102011
Role mining algorithm evaluation and improvement in large volume android applications
X Zhang, W Han, Z Fang, Y Yin, H Mustafa
Proceedings of the first international workshop on Security in embedded …, 2013
62013
A Framework for Eye-Based Human Machine Interface
S Bhowmick, HA Mustafa
2021 5th International Conference on Electrical Engineering and Information …, 2021
52021
Learning view‐invariant features using stacked autoencoder for skeleton‐based gait recognition
MM Hasan, HA Mustafa
IET Computer Vision 15 (7), 527-545, 2021
52021
Multi-Layer Hybrid (MLH) balancing technique: A combined approach to remove data imbalance
MT Islam, HA Mustafa
Data & Knowledge Engineering 143, 102105, 2023
32023
Towards evaluating robustness of violence detection in videos using cross-domain transferability
MB Rahman, HA Mustafa, MD Hossain
Journal of Information Security and Applications 77, 103583, 2023
12023
Secure and reliable wireless communication through end-to-end-based solution
HA Mustafa
University of South Carolina, 2014
12014
The system can't perform the operation now. Try again later.
Articles 1–20