Ahmed Mohamed Hussain

Orcid: 0000-0003-4732-9543

According to our database1, Ahmed Mohamed Hussain authored at least 14 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
AttentionGuard: Transformer-based Misbehavior Detection for Secure Vehicular Platoons.
CoRR, May, 2025

Prompt, Divide, and Conquer: Bypassing Large Language Model Safety Filters via Segmented and Distributed Prompt Processing.
CoRR, March, 2025

LLMs Have Rhythm: Fingerprinting Large Language Models Using Inter-Token Times and Network Traffic Analysis.
CoRR, February, 2025

CySecBench: Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models.
CoRR, January, 2025

Towards a Lightweight Edge AI-based Radio Frequency Fingerprinting.
Proceedings of the International Wireless Communications and Mobile Computing, 2025

2024
Edge AI-based Radio Frequency Fingerprinting for IoT Networks.
CoRR, 2024

Privacy-Preserving Secure Neighbor Discovery for Wireless Networks.
Proceedings of the 23rd IEEE International Conference on Trust, 2024

2022
Jammer Localization in the Internet of Vehicles: Scenarios, Experiments, and Evaluation.
Proceedings of the 12th International Conference on the Internet of Things, 2022

Jamming Detection in IoT Wireless Networks: An Edge-AI Based Approach.
Proceedings of the 12th International Conference on the Internet of Things, 2022

2021
A Testbed for Implementing Lightweight Physical Layer Security in an IoT-based Health Monitoring System.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

2020
The Dark (and Bright) Side of IoT: Attacks and Countermeasures to Identification of Smart Home Devices and Services.
CoRR, 2020

The Dark (and Bright) Side of IoT: Attacks and Countermeasures for Identifying Smart Home Devices and Services.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

2018
UAV-based Semi-Autonomous Data Acquisition and Classification.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Key is in the Air: Hacking Remote Keyless Entry Systems.
Proceedings of the Security and Safety Interplay of Intelligent Software Systems, 2018


  Loading...