Security and privacy vulnerabilities of {In-Car} wireless networks: A tire pressure monitoring system case study I Rouf, R Miller, H Mustafa, T Taylor, S Oh, W Xu, M Gruteser, W Trappe, ... 19th USENIX Security Symposium (USENIX Security 10), 2010 | 616 | 2010 |
Neighborhood watch: Security and privacy analysis of automatic meter reading systems I Rouf, H Mustafa, M Xu, W Xu, R Miller, M Gruteser Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 145 | 2012 |
Current events: Identifying webpages by tapping the electrical outlet SS Clark, H Mustafa, B Ransford, J Sorber, K Fu, W Xu Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 84 | 2013 |
Jamming-resilient multipath routing H Mustafa, X Zhang, Z Liu, W Xu, A Perrig IEEE transactions on dependable and secure computing 9 (6), 852-864, 2012 | 57 | 2012 |
Cetad: Detecting evil twin access point attacks in wireless hotspots H Mustafa, W Xu 2014 IEEE Conference on Communications and Network Security, 238-246, 2014 | 49 | 2014 |
You can call but you can't hide: detecting caller id spoofing attacks H Mustafa, W Xu, AR Sadeghi, S Schulz 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014 | 48 | 2014 |
A direction-sensitive fall detection system using single 3D accelerometer and learning classifier F Hossain, ML Ali, MZ Islam, H Mustafa 2016 International Conference on Medical Engineering, Health Informatics and …, 2016 | 37 | 2016 |
A secure QR code system for sharing personal confidential information MS Ahamed, HA Mustafa 2019 International Conference on Computer, Communication, Chemical …, 2019 | 36 | 2019 |
End-to-end detection of caller ID spoofing attacks H Mustafa, W Xu, AR Sadeghi, S Schulz IEEE Transactions on Dependable and Secure Computing 15 (3), 423-436, 2016 | 33 | 2016 |
Detection of on-road vehicles emanating GPS interference G Kar, H Mustafa, Y Wang, Y Chen, W Xu, M Gruteser, T Vu Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014 | 30 | 2014 |
Multi-level feature fusion for robust pose-based gait recognition using RNN MM Hasan, HA Mustafa Int. J. Comput. Sci. Inf. Secur.(IJCSIS) 18 (1), 2020 | 25 | 2020 |
Tetherway: a framework for tethering camouflage S Schulz, AR Sadeghi, M Zhdanova, H Mustafa, W Xu, V Varadharajan Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012 | 20 | 2012 |
Network intrusion detection system using voting ensemble machine learning M Raihan-Al-Masud, HA Mustafa 2019 IEEE International Conference on Telecommunications and Photonics (ICTP …, 2019 | 18 | 2019 |
Short paper: Jamming-resilient multipath routing leveraging availability-based correlation HA Mustafa, X Zhang, Z Liu, W Xu, A Perrig Proceedings of the fourth ACM conference on Wireless network security, 41-46, 2011 | 10 | 2011 |
Learning view‐invariant features using stacked autoencoder for skeleton‐based gait recognition MM Hasan, HA Mustafa IET Computer Vision 15 (7), 527-545, 2021 | 6 | 2021 |
Role mining algorithm evaluation and improvement in large volume android applications X Zhang, W Han, Z Fang, Y Yin, H Mustafa Proceedings of the first international workshop on Security in embedded …, 2013 | 6 | 2013 |
A Framework for Eye-Based Human Machine Interface S Bhowmick, HA Mustafa 2021 5th International Conference on Electrical Engineering and Information …, 2021 | 5 | 2021 |
Multi-Layer Hybrid (MLH) balancing technique: A combined approach to remove data imbalance MT Islam, HA Mustafa Data & Knowledge Engineering 143, 102105, 2023 | 3 | 2023 |
Towards evaluating robustness of violence detection in videos using cross-domain transferability MB Rahman, HA Mustafa, MD Hossain Journal of Information Security and Applications 77, 103583, 2023 | 2 | 2023 |
Secure and reliable wireless communication through end-to-end-based solution HA Mustafa University of South Carolina, 2014 | 2 | 2014 |