Imtiaz Karim

According to our database1, Imtiaz Karim authored at least 11 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
FBSDetector: Fake Base Station and Multi Step Attack Detection in Cellular Networks using Machine Learning.
CoRR, 2024

2023
Segment-Based Formal Verification of WiFi Fragmentation and Power Save Mode.
CoRR, 2023

BLEDiff: Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

SPEC5G: A Dataset for 5G Cellular Network Protocol Analysis.
Proceedings of the Findings of the Association for Computational Linguistics: IJCNLP-AACL 2023, 2023

2022
VWAnalyzer: A Systematic Security Analysis Framework for the Voice over WiFi Protocol.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
AI-powered Network Security: Approaches and Research Directions.
Proceedings of the 8th NSysS 2021: 8th International Conference on Networking, Systems and Security, Cox's Bazar, Bangladesh, December 21, 2021

ProChecker: An Automated Security and Privacy Analysis Framework for 4G LTE Protocol Implementations.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2019
5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Maximizing heterogeneous coverage in over and under provisioned visual sensor networks.
J. Netw. Comput. Appl., 2018


  Loading...