Hawzhin Mohammed

According to our database1, Hawzhin Mohammed authored at least 16 papers between 2016 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Edge Intelligence in Mobile Nodes: Opportunistic Pipeline via 5G D2D for On-site Sensing.
Proceedings of the 96th Vehicular Technology Conference, 2022

2021
FeSHI: Feature Map-Based Stealthy Hardware Intrinsic Attack.
IEEE Access, 2021

Dynamic Distribution of Edge Intelligence at the Node Level for Internet of Things.
Proceedings of the 64th IEEE International Midwest Symposium on Circuits and Systems, 2021

InTrust-IoT: Intelligent Ecosystem based on Power Profiling of Trusted device(s) in IoT for Hardware Trojan Detection.
Proceedings of the HASP '21: Workshop on Hardware and Architectural Support for Security and Privacy, 2021

2020
Collaborative Pipeline Using Opportunistic Mobile Resources via D2D for Computation-Intensive Tasks.
CoRR, 2020

How Secure is Distributed Convolutional Neural Network on IoT Edge Devices?
CoRR, 2020

Fusion-On-Field Security and Privacy Preservation for IoT Edge Devices: Concurrent Defense Against Multiple Types of Hardware Trojan Attacks.
IEEE Access, 2020

Deployment of Object Detection Enhanced with Multi-label Multi-classification on Edge Device.
Proceedings of the 63rd IEEE International Midwest Symposium on Circuits and Systems, 2020

An Edge Intelligence Framework for Resource Constrained Community Area Network.
Proceedings of the 63rd IEEE International Midwest Symposium on Circuits and Systems, 2020

2019
EPIC: Efficient Privacy-Preserving Scheme With EtoE Data Integrity and Authenticity for AMI Networks.
IEEE Internet Things J., 2019

A Stealthy Hardware Trojan Exploiting the Architectural Vulnerability of Deep Learning Architectures: Input Interception Attack (IIA).
CoRR, 2019

(HIADIoT): Hardware Intrinsic Attack Detection in Internet of Things; Leveraging Power Profiling.
Proceedings of the 62nd IEEE International Midwest Symposium on Circuits and Systems, 2019

2018
EPIC: Efficient Privacy-Preserving Scheme with E2E Data Integrity and Authenticity for AMI Networks.
CoRR, 2018

Load Control and Privacy-Preserving Scheme for Data Collection in AMI Networks.
CoRR, 2018

Hardware Trojan Based Security Issues in Home Area Network: A Testbed Setup.
Proceedings of the IEEE 61st International Midwest Symposium on Circuits and Systems, 2018

2016
Efficient Privacy-Preserving Data Collection Scheme for Smart Grid AMI Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016


  Loading...