关注
Haroon Elahi
Haroon Elahi
在 umu.se 的电子邮件经过验证
标题
引用次数
引用次数
年份
Smartphone bloatware: an overlooked privacy problem
H Elahi, G Wang, X Li
International Conference on Security, Privacy and Anonymity in Computation …, 2017
122017
A human-centered artificial intelligence approach for privacy protection of elderly App users in smart cities
H Elahi, A Castiglione, G Wang, O Geman
Neurocomputing 444, 189-202, 2021
92021
On transparency and accountability of smart assistants in smart cities
H Elahi, G Wang, T Peng, J Chen
Applied Sciences 9 (24), 5344, 2019
82019
Assessing privacy behaviors of smartphone users in the context of data over-collection problem: An exploratory study
H Elahi, G Wang, D Xie
2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2017
82017
A malware detection approach using malware images and autoencoders
X Jin, X Xing, H Elahi, G Wang, H Jiang
2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems …, 2020
72020
Pleasure or pain? An evaluation of the costs and utilities of bloatware applications in android smartphones
H Elahi, G Wang, J Chen
Journal of Network and Computer Applications 157, 102578, 2020
72020
AI and its risks in android smartphones: A case of google smart assistant
H Elahi, G Wang, T Peng, J Chen
International Conference on Dependability in Sensor, Cloud, and Big Data …, 2019
72019
A personalized search query generating method for safety-enhanced vehicle-to-people networks
X Yan, J Zhang, H Elahi, M Jiang, H Gao
IEEE Transactions on Vehicular Technology 70 (6), 5296-5307, 2021
52021
A soft robotic glove for assistance and rehabilitation of stroke affected patients
MM Ullah, U Hafeez, MN Shehzad, MN Awais, H Elahi
2019 International Conference on Frontiers of Information Technology (FIT …, 2019
32019
A light-weight framework for pre-submission vetting of android applications in app stores
B Li, G Wang, H Elahi, G Duan
International Conference on Dependability in Sensor, Cloud, and Big Data …, 2019
32019
A botnets control strategy based on variable forgetting rate of control commands
S Wang, H Elahi, Y Hu, Y Zhang, J Wang
Concurrency and Computation: Practice and Experience 34 (7), e6118, 2022
12022
Recent Healthcare Information Breaches and Their Lessons
H Elahi, O Geman
Archives of Surgical Research 1 (4), 17-23, 2020
12020
A Participatory Privacy Protection Framework for Smart-Phone Application Default Settings
H Elahi, G Wang
International Symposium on Security in Computing and Communication, 168-182, 2018
12018
Portable non-invasive device for measuring saturated oxygen of the blood
O Geman, I Chiuchisan, V Balas, G Wang, M Arif, H Elahi, P Tao
International Workshop Soft Computing Applications, 457-462, 2018
12018
A Blockchain-based Model Migration Approach for Secure and Sustainable Federated Learning in IoT Systems
C Zhang, Y Xu, H Elahi, D Zhang, Y Tan, J Chen, Y Zhang
IEEE Internet of Things Journal, 2022
2022
A Malware Detection Approach Using Autoencoder in Deep Learning
X Xing, X Jin, H Elahi, H Jiang, G Wang
IEEE Access 10, 25696-25706, 2022
2022
Smart sensing and actuators for people with hand motion impairment: assessment and support
DR Izdrui, O Geman, OA Postolache, H Elahi, D Vicoveanu, S Curea
Biomedical Engineering Applications for People with Disabilities and the …, 2022
2022
On the Characterization and Risk Assessment of AI-Powered Mobile Cloud Applications
H Elahi, G Wang, Y Xu, A Castiglione, Q Yan, MN Shehzad
Computer Standards & Interfaces 78, 103538, 2021
2021
A Hybridly Optimized LSTM-Based Data Flow Prediction Model for Dependable Online Ticketing
C Fan, J Zhu, H Elahi, L Yang, B Li
Wireless Communications and Mobile Computing 2021, 2021
2021
A Function-Centric Risk Assessment Approach for Android Applications
M Li, H Elahi, T Peng, F Qi, G Wang
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
2020
系统目前无法执行此操作,请稍后再试。
文章 1–20