Muhammad Jawad Hussain

Orcid: 0000-0002-2798-4375

According to our database1, Muhammad Jawad Hussain authored at least 19 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Cross-Layer RF Distance Bounding Scheme for Passive and Semi-passive Ubiquitous Computing Systems.
Comput. Secur., February, 2024

2023
Evaluating semantic similarity and relatedness between concepts by combining taxonomic and non-taxonomic semantic features of WordNet and Wikipedia.
Inf. Sci., May, 2023

Wikipedia bi-linear link (WBLM) model: A new approach for measuring semantic similarity and relatedness between linguistic concepts using Wikipedia link structure.
Inf. Process. Manag., 2023

2021
Generalized fuzzy automata with semantic computing.
Soft Comput., 2021

2020
I Sense You by Breath: Speaker Recognition via Breath Biometrics.
IEEE Trans. Dependable Secur. Comput., 2020

An approach for measuring semantic similarity between Wikipedia concepts using multiple inheritances.
Inf. Process. Manag., 2020

Assessing semantic similarity between concepts: A weighted-feature-based approach.
Concurr. Comput. Pract. Exp., 2020

Similarity Evaluation with Wikipedia Features.
Proceedings of the Intelligent Information Processing X, 2020

2019
Sentinel: Breaking the Bottleneck of Energy Utilization Efficiency in RF-Powered Devices.
IEEE Internet Things J., 2019

2018
<i>R</i><sup>3</sup>: Reliable Over-the-Air Reprogramming on Computational RFIDs.
ACM Trans. Embed. Comput. Syst., 2018

2017
An RFID Based Smartphone Proximity Absence Alert System.
IEEE Trans. Mob. Comput., 2017

Detecting Clocking Attack in Contactless Access Control Systems.
Proceedings of the Fifth International Conference on Advanced Cloud and Big Data, 2017

2016
A FMCW-Based Cross Layer RF Distance Bounding Scheme.
IEEE Trans. Wirel. Commun., 2016

R2: Over-the-air reprogramming on computational RFIDs.
Proceedings of the 2016 IEEE International Conference on RFID, 2016

2015
TIGHT: A Cross-Layer RF Distance Bounding Realization for Passive Wireless Devices.
IEEE Trans. Wirel. Commun., 2015

Pworm: Passive and Real-Time Wormhole Detection Scheme for WSNs.
Int. J. Distributed Sens. Networks, 2015

WiGen: Breaking the Privacy and Security Barriers for Group Management in RFID Systems.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Wireless firmware execution control in computational RFID systems.
Proceedings of the 2015 IEEE International Conference on RFID, 2015

2014
Real-time and passive wormhole detection for wireless sensor networks.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014


  Loading...