Hossen Asiful Mustafa, PhD
Cited by
Cited by
Security and privacy vulnerabilities of {In-Car} wireless networks: A tire pressure monitoring system case study
I Rouf, R Miller, H Mustafa, T Taylor, S Oh, W Xu, M Gruteser, W Trappe, ...
19th USENIX Security Symposium (USENIX Security 10), 2010
Neighborhood watch: Security and privacy analysis of automatic meter reading systems
I Rouf, H Mustafa, M Xu, W Xu, R Miller, M Gruteser
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Current events: Identifying webpages by tapping the electrical outlet
SS Clark, H Mustafa, B Ransford, J Sorber, K Fu, W Xu
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
Jamming-resilient multipath routing
H Mustafa, X Zhang, Z Liu, W Xu, A Perrig
IEEE transactions on dependable and secure computing 9 (6), 852-864, 2012
Cetad: Detecting evil twin access point attacks in wireless hotspots
H Mustafa, W Xu
2014 IEEE Conference on Communications and Network Security, 238-246, 2014
You can call but you can't hide: detecting caller id spoofing attacks
H Mustafa, W Xu, AR Sadeghi, S Schulz
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
A direction-sensitive fall detection system using single 3D accelerometer and learning classifier
F Hossain, ML Ali, MZ Islam, H Mustafa
2016 International Conference on Medical Engineering, Health Informatics and …, 2016
A secure QR code system for sharing personal confidential information
MS Ahamed, HA Mustafa
2019 International Conference on Computer, Communication, Chemical …, 2019
Detection of on-road vehicles emanating GPS interference
G Kar, H Mustafa, Y Wang, Y Chen, W Xu, M Gruteser, T Vu
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
End-to-end detection of caller ID spoofing attacks
H Mustafa, W Xu, AR Sadeghi, S Schulz
IEEE Transactions on Dependable and Secure Computing 15 (3), 423-436, 2016
Multi-level feature fusion for robust pose-based gait recognition using RNN
MM Hasan, HA Mustafa
Int. J. Comput. Sci. Inf. Secur.(IJCSIS) 18 (1), 2020
Tetherway: a framework for tethering camouflage
S Schulz, AR Sadeghi, M Zhdanova, H Mustafa, W Xu, V Varadharajan
Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012
Network intrusion detection system using voting ensemble machine learning
M Raihan-Al-Masud, HA Mustafa
2019 IEEE International Conference on Telecommunications and Photonics (ICTP …, 2019
Short paper: Jamming-resilient multipath routing leveraging availability-based correlation
HA Mustafa, X Zhang, Z Liu, W Xu, A Perrig
Proceedings of the fourth ACM conference on Wireless network security, 41-46, 2011
Role mining algorithm evaluation and improvement in large volume android applications
X Zhang, W Han, Z Fang, Y Yin, H Mustafa
Proceedings of the first international workshop on Security in embedded …, 2013
A Framework for Eye-Based Human Machine Interface
S Bhowmick, HA Mustafa
2021 5th International Conference on Electrical Engineering and Information …, 2021
Learning view‐invariant features using stacked autoencoder for skeleton‐based gait recognition
MM Hasan, HA Mustafa
IET Computer Vision 15 (7), 527-545, 2021
Multi-Layer Hybrid (MLH) balancing technique: A combined approach to remove data imbalance
MT Islam, HA Mustafa
Data & Knowledge Engineering 143, 102105, 2023
Secure and reliable wireless communication through end-to-end-based solution
HA Mustafa
University of South Carolina, 2014
A Practical Study of Security and Privacy Issues in Automatic Meter Reading System
I Roufa, R Millerb, H Mustafaa, M Xua, W Xua
IEEE Spectrum, October, 2010
The system can't perform the operation now. Try again later.
Articles 1–20