Muhammad Naveed Aman

Orcid: 0000-0002-4629-7589

According to our database1, Muhammad Naveed Aman authored at least 52 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Securing Synchrophasors Using Data Provenance in the Quantum Era.
IEEE Open J. Commun. Soc., 2024

Beyond Bits: A Review of Quantum Embedding Techniques for Efficient Information Processing.
IEEE Access, 2024

2023
Dynamic Resource Optimization for Energy-Efficient 6G-IoT Ecosystems.
Sensors, 2023

A Light-Weight Technique to Detect GPS Spoofing Using Attenuated Signal Envelopes.
IEEE Open J. Comput. Soc., 2023

Co-Existence With IEEE 802.11 Networks in the ISM Band Without Channel Estimation.
IEEE Open J. Comput. Soc., 2023

Representation Learning based Time Synchronization Attack Detection for Synchrophasors.
Proceedings of the IEEE International Conference on Communications, 2023

Hardware Fingerprinting of Phasor Measurement Units for Data Provenance.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2023

Machine Learning based Time Synchronization Attack Detection for Synchrophasors.
Proceedings of the IEEE Global Communications Conference, 2023

SRAM and Generative Network-based Physical Fingerprinting for Trust Management in the Internet of Things.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023

Exploiting Hardware Imperfections for GPS Spoofing Detection using Clock Variations.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023

2022
IoT-Proctor: A Secure and Lightweight Device Patching Framework for Mitigating Malware Spread in IoT Networks.
IEEE Syst. J., 2022

PRoM: Passive Remote Attestation Against Roving Malware in Multicore IoT Devices.
IEEE Syst. J., 2022

Security, Trust and Privacy for Cloud, Fog and Internet of Things.
Secur. Commun. Networks, 2022

Machine-Learning-Based Attestation for the Internet of Things Using Memory Traces.
IEEE Internet Things J., 2022

DRiVe: Detecting Malicious Roadside Units in the Internet of Vehicles With Low Latency Data Integrity.
IEEE Internet Things J., 2022

PIC: Preserving Data Integrity in UAV Assisted Communication.
Proceedings of the IEEE INFOCOM 2022, 2022

MaDe: Malicious Aerial Vehicle Detection using Generalized Likelihood Ratio Test.
Proceedings of the IEEE International Conference on Communications, 2022

Blockchain based Secure Group Data Collaboration in Cloud with Differentially Private Synthetic Data and Trusted Execution Environment.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
A Lightweight Protocol for Secure Data Provenance in the Internet of Things Using Wireless Fingerprints.
IEEE Syst. J., 2021

A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles.
IEEE Internet Things J., 2021

Security Function Virtualization for IoT Applications in 6G Networks.
IEEE Commun. Stand. Mag., 2021

Autonomous mobility of a fleet of vehicles for precision pesticide application.
Comput. Electron. Agric., 2021

A greedy approach to improve pesticide application for precision agriculture using model predictive control.
Comput. Electron. Agric., 2021

A model predictive controller for precision irrigation using discrete lagurre networks.
Comput. Electron. Agric., 2021

AI Based Algorithm-Hardware Separation for IoV Security.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

2020
A Graph-Theoretic Approach to Capacity Benefit Margin Calculation for Large Multiarea Power Systems.
IEEE Syst. J., 2020

A Scalable Protocol for Driving Trust Management in Internet of Vehicles With Blockchain.
IEEE Internet Things J., 2020

HAtt: Hybrid Remote Attestation for the Internet of Things With High Availability.
IEEE Internet Things J., 2020

Defining trust in IoT environments via distributed remote attestation using blockchain.
Proceedings of the Mobihoc '20: The Twenty-first ACM International Symposium on Theory, 2020

2019
Predicting Down syndrome and neural tube defects using basic risk factors.
Medical Biol. Eng. Comput., 2019

Token-Based Security for the Internet of Things With Dynamic Energy-Quality Tradeoff.
IEEE Internet Things J., 2019

Data Provenance for IoT With Light Weight Authentication and Privacy Preservation.
IEEE Internet Things J., 2019

Two-Factor Authentication for IoT With Location Information.
IEEE Internet Things J., 2019

DrivMan: Driving Trust Management and Data Sharing in VANETs with Blockchain and Smart Contracts.
Proceedings of the 89th IEEE Vehicular Technology Conference, 2019

Data Provenance for IoT using Wireless Channel Characteristics and Physically Unclonable Functions.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Low Power Data Integrity in IoT Systems.
IEEE Internet Things J., 2018

ATT-Auth: A Hybrid Protocol for Industrial IoT Attestation With Authentication.
IEEE Internet Things J., 2018

BlockPro: Blockchain based Data Provenance and Integrity for Secure IoT Environments.
Proceedings of the 1st Workshop on Blockchain-enabled Networked Sensor Systems, 2018

Mitigating loT Device based DDoS Attacks using Blockchain.
Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, 2018

2017
Mutual Authentication in IoT Systems Using Physical Unclonable Functions.
IEEE Internet Things J., 2017

A Light-Weight Mutual Authentication Protocol for IoT Systems.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Physically secure mutual authentication for IoT.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

Secure Data Provenance for the Internet of Things.
Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, 2017

2016
Detecting data tampering attacks in synchrophasor networks using time hopping.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference Europe, 2016

Position Paper: Physical Unclonable Functions for IoT Security.
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, 2016

2015
Design, implementation, and thermal modeling of embedded reconfigurable magnetorquer system for nanosatellites.
IEEE Trans. Aerosp. Electron. Syst., 2015

2014
Efficient packet recovery in wireless networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

A wireless MAC protocol with efficient packet recovery.
Proceedings of the 20th IEEE International Workshop on Local & Metropolitan Area Networks, 2014

2012
A CART based mechanism for collision detection in IEEE 802.11.
Proceedings of the IEEE Latin-America Conference on Communications, 2012

Collision detection in IEEE 802.11 networks by error vector magnitude analysis.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Distinguishing between channel errors and collisions in IEEE 802.11.
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012

2009
Scalable Peer-to-Peer Video Streaming in WiMAX Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009


  Loading...