Follow
Hossen Asiful Mustafa, PhD
Title
Cited by
Cited by
Year
Security and privacy vulnerabilities of {In-Car} wireless networks: A tire pressure monitoring system case study
I Rouf, R Miller, H Mustafa, T Taylor, S Oh, W Xu, M Gruteser, W Trappe, ...
19th USENIX Security Symposium (USENIX Security 10), 2010
5912010
Neighborhood watch: Security and privacy analysis of automatic meter reading systems
I Rouf, H Mustafa, M Xu, W Xu, R Miller, M Gruteser
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1442012
Current events: Identifying webpages by tapping the electrical outlet
SS Clark, H Mustafa, B Ransford, J Sorber, K Fu, W Xu
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
812013
Jamming-resilient multipath routing
H Mustafa, X Zhang, Z Liu, W Xu, A Perrig
IEEE transactions on dependable and secure computing 9 (6), 852-864, 2012
552012
Cetad: Detecting evil twin access point attacks in wireless hotspots
H Mustafa, W Xu
2014 IEEE Conference on Communications and Network Security, 238-246, 2014
482014
You can call but you can't hide: detecting caller id spoofing attacks
H Mustafa, W Xu, AR Sadeghi, S Schulz
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
382014
A direction-sensitive fall detection system using single 3D accelerometer and learning classifier
F Hossain, ML Ali, MZ Islam, H Mustafa
2016 International Conference on Medical Engineering, Health Informatics and …, 2016
352016
A secure QR code system for sharing personal confidential information
MS Ahamed, HA Mustafa
2019 International Conference on Computer, Communication, Chemical …, 2019
342019
Detection of on-road vehicles emanating GPS interference
G Kar, H Mustafa, Y Wang, Y Chen, W Xu, M Gruteser, T Vu
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
292014
End-to-end detection of caller ID spoofing attacks
H Mustafa, W Xu, AR Sadeghi, S Schulz
IEEE Transactions on Dependable and Secure Computing 15 (3), 423-436, 2016
262016
Multi-level feature fusion for robust pose-based gait recognition using RNN
MM Hasan, HA Mustafa
Int. J. Comput. Sci. Inf. Secur.(IJCSIS) 18 (1), 2020
242020
Tetherway: a framework for tethering camouflage
S Schulz, AR Sadeghi, M Zhdanova, H Mustafa, W Xu, V Varadharajan
Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012
202012
Network intrusion detection system using voting ensemble machine learning
M Raihan-Al-Masud, HA Mustafa
2019 IEEE International Conference on Telecommunications and Photonics (ICTP …, 2019
172019
Short paper: Jamming-resilient multipath routing leveraging availability-based correlation
HA Mustafa, X Zhang, Z Liu, W Xu, A Perrig
Proceedings of the fourth ACM conference on Wireless network security, 41-46, 2011
102011
Role mining algorithm evaluation and improvement in large volume android applications
X Zhang, W Han, Z Fang, Y Yin, H Mustafa
Proceedings of the first international workshop on Security in embedded …, 2013
62013
A Framework for Eye-Based Human Machine Interface
S Bhowmick, HA Mustafa
2021 5th International Conference on Electrical Engineering and Information …, 2021
32021
Learning view‐invariant features using stacked autoencoder for skeleton‐based gait recognition
MM Hasan, HA Mustafa
IET Computer Vision 15 (7), 527-545, 2021
32021
Multi-Layer Hybrid (MLH) balancing technique: A combined approach to remove data imbalance
MT Islam, HA Mustafa
Data & Knowledge Engineering 143, 102105, 2023
22023
Secure and reliable wireless communication through end-to-end-based solution
HA Mustafa
University of South Carolina, 2014
12014
A Practical Study of Security and Privacy Issues in Automatic Meter Reading System
I Roufa, R Millerb, H Mustafaa, M Xua, W Xua
IEEE Spectrum, October, 2010
12010
The system can't perform the operation now. Try again later.
Articles 1–20