关注
Haroon Elahi
Haroon Elahi
在 umu.se 的电子邮件经过验证
标题
引用次数
引用次数
年份
A malware detection approach using autoencoder in deep learning
X Xing, X Jin, H Elahi, H Jiang, G Wang
IEEE Access 10, 25696-25706, 2022
342022
A human-centered artificial intelligence approach for privacy protection of elderly App users in smart cities
H Elahi, A Castiglione, G Wang, O Geman
Neurocomputing 444, 189-202, 2021
322021
A blockchain-based model migration approach for secure and sustainable federated learning in iot systems
C Zhang, Y Xu, H Elahi, D Zhang, Y Tan, J Chen, Y Zhang
IEEE Internet of Things Journal 10 (8), 6574-6585, 2022
262022
A blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social internet of vehicles
Z Liu, Y Xu, C Zhang, H Elahi, X Zhou
Digital Communications and Networks 8 (6), 976-983, 2022
212022
On transparency and accountability of smart assistants in smart cities
H Elahi, G Wang, T Peng, J Chen
Applied Sciences 9 (24), 5344, 2019
212019
A malware detection approach using malware images and autoencoders
X Jin, X Xing, H Elahi, G Wang, H Jiang
2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems …, 2020
202020
Smartphone bloatware: an overlooked privacy problem
H Elahi, G Wang, X Li
Security, Privacy, and Anonymity in Computation, Communication, and Storage …, 2017
162017
Pleasure or pain? An evaluation of the costs and utilities of bloatware applications in android smartphones
H Elahi, G Wang, J Chen
Journal of Network and Computer Applications 157, 102578, 2020
142020
On the characterization and risk assessment of ai-powered mobile cloud applications
H Elahi, G Wang, Y Xu, A Castiglione, Q Yan, MN Shehzad
Computer Standards & Interfaces 78, 103538, 2021
122021
A soft robotic glove for assistance and rehabilitation of stroke affected patients
MM Ullah, U Hafeez, MN Shehzad, MN Awais, H Elahi
2019 International Conference on Frontiers of Information Technology (FIT …, 2019
102019
Assessing privacy behaviors of smartphone users in the context of data over-collection problem: An exploratory study
H Elahi, G Wang, D Xie
2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2017
92017
A personalized search query generating method for safety-enhanced vehicle-to-people networks
X Yan, J Zhang, H Elahi, M Jiang, H Gao
IEEE Transactions on Vehicular Technology 70 (6), 5296-5307, 2021
82021
AI and its risks in android smartphones: A case of google smart assistant
H Elahi, G Wang, T Peng, J Chen
Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th …, 2019
82019
A light-weight framework for pre-submission vetting of android applications in app stores
B Li, G Wang, H Elahi, G Duan
Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th …, 2019
42019
Portable non-invasive device for measuring saturated oxygen of the blood
O Geman, I Chiuchisan, V Balas, G Wang, M Arif, H Elahi, P Tao
Soft Computing Applications: Proceedings of the 8th International Workshop …, 2021
32021
Recent Healthcare Information Breaches and their Lessons
H Elahi, O Geman
Archives of Surgical Research 1 (4), 17-23, 2020
32020
A hybridly optimized LSTM-based data flow prediction model for dependable online ticketing
C Fan, J Zhu, H Elahi, L Yang, B Li
Wireless Communications and Mobile Computing 2021, 1-13, 2021
22021
A participatory privacy protection framework for smart-phone application default settings
H Elahi, G Wang
Security in Computing and Communications: 6th International Symposium, SSCC …, 2019
22019
A botnets control strategy based on variable forgetting rate of control commands
S Wang, H Elahi, Y Hu, Y Zhang, J Wang
Concurrency and Computation: Practice and Experience 34 (7), e6118, 2022
12022
A Risk Analysis of Android Children’s Apps
M Li, H Elahi, S Chen
Web Information Systems and Applications: 17th International Conference …, 2020
12020
系统目前无法执行此操作,请稍后再试。
文章 1–20