Muhammad Usman

Orcid: 0000-0002-2528-464X

Affiliations:
  • University of South Wales, UK
  • University of Surrey, UK (former)
  • Griffith University, Australia (PhD)


According to our database1, Muhammad Usman authored at least 21 papers between 2009 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Guest Editorial: Computational Intelligence for Human-in-the-Loop Cyber Physical Systems.
IEEE Trans. Emerg. Top. Comput. Intell., 2022

A Cross-Layer Trust-Based Consensus Protocol for Peer-to-Peer Energy Trading Using Fuzzy Logic.
IEEE Internet Things J., 2022

Application Threats to Exploit Northbound Interface Vulnerabilities in Software Defined Networks.
ACM Comput. Surv., 2022

A blockchain-based secure data-sharing framework for Software Defined Wireless Body Area Networks.
Comput. Networks, 2022

2021
Fuzzy-in-the-Loop-Driven Low-Cost and Secure Biometric User Access to Server.
IEEE Trans. Reliab., 2021

Anomaly Detection in Automated Vehicles Using Multistage Attention-Based Convolutional Neural Network.
IEEE Trans. Intell. Transp. Syst., 2021

Closing the Loop in Feedback Driven Learning Environments Using Trust Decision Making and Utility Theory.
IEEE Trans. Emerg. Top. Comput. Intell., 2021

Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures.
ACM Comput. Surv., 2021

2020
Security & Privacy in IoT Using Machine Learning & Blockchain: Threats & Countermeasures.
CoRR, 2020

2015
Mobile agent-based cross-layer anomaly detection in smart home sensor networks using fuzzy logic.
IEEE Trans. Consumer Electron., 2015

Specification and Validation of Enhanced Mobile Agent-Enabled Anomaly Detection and Verification in Resource Constrained Networks.
J. Networks, 2015

2014
A Resource-Efficient System for Detection and Verification of Anomalies Using Mobile Agents in Wireless Sensor Networks.
J. Networks, 2014

Agent-enabled anomaly detection in resource constrained wireless sensor networks.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

2013
Formal verification of mobile agent based anomaly detection in Wireless Sensor Networks.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013, 2013

An energy efficient clique based clustering and routing mechanism in wireless sensor networks.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

2012
Wireless Smart Home Sensor Networks: Mobile Agent Based Anomaly Detection.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

Securing mobile agent based Wireless Sensor Network applications on middleware.
Proceedings of the International Symposium on Communications and Information Technologies, 2012

2010
Performance Evaluation Analysis of Group Mobility in Mobile Ad Hoc Networks.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010

Security Enhancement for Authentication of Nodes in MANET by Checking the CRL Status of Servers.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010

2009
Performance Evaluation of Authentication Certificate Based Seamless Vertical Handoff in GPRS-WLAN.
Proceedings of the High Performance Computing and Applications, 2009

Energy-Efficient Intrusion Detection System for Wireless Sensor Network Based on MUSK Architecture.
Proceedings of the High Performance Computing and Applications, 2009


  Loading...