Hossen Asiful Mustafa

Orcid: 0000-0002-4020-4927

According to our database1, Hossen Asiful Mustafa authored at least 15 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Towards evaluating robustness of violence detection in videos using cross-domain transferability.
J. Inf. Secur. Appl., September, 2023

Multi-Layer Hybrid (MLH) balancing technique: A combined approach to remove data imbalance.
Data Knowl. Eng., 2023

2021
Learning view-invariant features using stacked autoencoder for skeleton-based gait recognition.
IET Comput. Vis., 2021

2018
End-to-End Detection of Caller ID Spoofing Attacks.
IEEE Trans. Dependable Secur. Comput., 2018

2017
Design and Analysis of a Secure Three Factor User Authentication Scheme Using Biometric and Smart Card.
CoRR, 2017

2014
You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

CETAD: Detecting evil twin access point attacks in wireless hotspots.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Detection of On-Road Vehicles Emanating GPS Interference.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Current Events: Identifying Webpages by Tapping the Electrical Outlet.
Proceedings of the Computer Security - ESORICS 2013, 2013

Role mining algorithm evaluation and improvement in large volume android applications.
Proceedings of the first international workshop on Security in embedded systems and smartphones, 2013

2012
Jamming-Resilient Multipath Routing.
IEEE Trans. Dependable Secur. Comput., 2012

Tetherway: a framework for tethering camouflage.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Neighborhood watch: security and privacy analysis of automatic meter reading systems.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Short paper: Jamming-resilient multipath routing leveraging availability-based correlation.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

2010
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study.
Proceedings of the 19th USENIX Security Symposium, 2010


  Loading...