default search action
Chuadhry Mujeeb Ahmed
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Yizhou Shen, Carlton Shepherd, Chuadhry Mujeeb Ahmed, Shigen Shen, Xiaoping Wu, Wenlong Ke, Shui Yu:
Game-theoretic analytics for privacy preservation in Internet of Things networks: A survey. Eng. Appl. Artif. Intell. 133: 108449 (2024) - [j8]Yizhou Shen, Carlton Shepherd, Chuadhry Mujeeb Ahmed, Shui Yu, Tingting Li:
Comparative DQN-Improved Algorithms for Stochastic Games-Based Automated Edge Intelligence-Enabled IoT Malware Spread-Suppression Strategies. IEEE Internet Things J. 11(12): 22550-22561 (2024) - [j7]Yizhou Shen, Carlton Shepherd, Chuadhry Mujeeb Ahmed, Shigen Shen, Shui Yu:
SGD3QN: Joint Stochastic Games and Dueling Double Deep Q-Networks for Defending Malware Propagation in Edge Intelligence-Enabled Internet of Things. IEEE Trans. Inf. Forensics Secur. 19: 6978-6990 (2024) - [c25]Ruilin Wang, Chuadhry Mujeeb Ahmed:
Differential Privacy with Selected Privacy Budget ε in a Cyber Physical System Using Machine Learning. ACNS Workshops (2) 2024: 101-116 - [c24]Chuadhry Mujeeb Ahmed, Nandha Kumar Kandasamy, Darren Ng Wei Hong, Jianying Zhou:
Device Fingerprinting in a Smart Grid CPS. ACNS Workshops (1) 2024: 215-234 - [i8]Chuadhry Mujeeb Ahmed, Matthew Calder, Sean Gunawan, Jay Prakash, Shishir Nagaraja, Jianying Zhou:
Time Constant: Actuator Fingerprinting using Transient Response of Device and Process in ICS. CoRR abs/2409.16536 (2024) - 2023
- [c23]Ali Hussain Khan, Naveed Ul Hassan, Chuadhry Mujeeb Ahmed, Zartash Afzal Uzmi, Chau Yuen:
Blockchain-Enabled Data Sharing in Connected Autonomous Vehicles for Heterogeneous Networks. ACNS Workshops 2023: 215-230 - [c22]Sim Siang Tze Victor, Chuadhry Mujeeb Ahmed, Koh Yoong Keat Kelvin, Jianying Zhou:
Safety Watermark: A Defense Tool for Real-Time Digital Forensic Incident Response in Industrial Control Systems. ACNS Workshops 2023: 299-320 - [c21]Carl Dickinson, Shishir Nagaraja, Chuadhry Mujeeb Ahmed, Richard Hyde:
AGRITRUST: A Testbed to Enable Trustworthy Smart AgriTech. TAS 2023: 22:1-22:13 - 2022
- [j6]Shaila Sharmeen, Shamsul Huda, Jemal H. Abawajy, Chuadhry Mujeeb Ahmed, Mohammad Mehedi Hassan, Giancarlo Fortino:
An Advanced Boundary Protection Control for the Smart Water Network Using Semisupervised and Deep Learning Approaches. IEEE Internet Things J. 9(10): 7298-7310 (2022) - [c20]Muhammad Omer Shahid, Chuadhry Mujeeb Ahmed, Venkata Reddy Palleti, Jianying Zhou:
Curse of System Complexity and Virtue of Operational Invariants: Machine Learning based System Modeling and Attack Detection in CPS. DSC 2022: 1-8 - [c19]Ali Hussain Khan, Humza Ikram, Chuadhry Mujeeb Ahmed, Naveed Ul Hassan, Zartash Afzal Uzmi:
Energy Level Spoofing Attacks and Countermeasures in Blockchain-enabled IoT. GLOBECOM 2022: 4322-4327 - [c18]Ali Hussain Khan, Chuadhry Mujeeb Ahmed, Naveed Ul Hassan, Zartash Afzal Uzmi:
Proof-of-Communication-Capability Based Authentication in Blockchain-enabled Wireless Autonomous Vehicular Networks. VTC Spring 2022: 1-5 - [c17]Ryan Shah, Chuadhry Mujeeb Ahmed, Shishir Nagaraja:
Can You Still See Me?: Identifying Robot Operations Over End-to-End Encrypted Channels. WISEC 2022: 298-300 - [i7]Ryan Shah, Chuadhry Mujeeb Ahmed, Shishir Nagaraja:
Can You Still See Me?: Reconstructing Robot Operations Over End-to-End Encrypted Channels. CoRR abs/2205.08426 (2022) - [i6]Ryan Shah, Chuadhry Mujeeb Ahmed, Shishir Nagaraja:
Reconstructing Robot Operations via Radio-Frequency Side-Channel. CoRR abs/2209.10179 (2022) - 2021
- [j5]M. R. Gauthama Raman, Chuadhry Mujeeb Ahmed, Aditya Mathur:
Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation. Cybersecur. 4(1): 27 (2021) - [j4]Venkata Reddy Palleti, Vishrut Kumar Mishra, Chuadhry Mujeeb Ahmed, Aditya Mathur:
Can Replay Attacks Designed to Steal Water from Water Distribution Systems Remain Undetected? ACM Trans. Cyber Phys. Syst. 5(1): 9:1-9:19 (2021) - [c16]Chuadhry Mujeeb Ahmed, Martín Ochoa, Jianying Zhou, Aditya Mathur:
Scanning the Cycle: Timing-based Authentication on PLCs. AsiaCCS 2021: 886-900 - [c15]Muhammad Azmi Umer, Chuadhry Mujeeb Ahmed, Muhammad Taha Jilani, Aditya P. Mathur:
Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine Learning. CPSIOTSEC@CCS 2021: 35-40 - [c14]Chuadhry Mujeeb Ahmed, Jianying Zhou:
Bank of Models: Sensor Attack Detection and Isolation in Industrial Control Systems. CRITIS 2021: 3-23 - [e2]Jianying Zhou, Chuadhry Mujeeb Ahmed, Lejla Batina, Sudipta Chattopadhyay, Olga Gadyatskaya, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Mihalis Maniatakos, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Masaki Shimaoka, Chunhua Su, Cong Wang:
Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings. Lecture Notes in Computer Science 12809, Springer 2021, ISBN 978-3-030-81644-5 [contents] - [i5]Chuadhry Mujeeb Ahmed, Martín Ochoa, Jianying Zhou, Aditya Mathur:
Scanning the Cycle: Timing-based Authentication on PLCs. CoRR abs/2102.08985 (2021) - [i4]Muhammad Azmi Umer, Chuadhry Mujeeb Ahmed, Muhammad Taha Jilani, Aditya P. Mathur:
Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine Learning. CoRR abs/2107.05127 (2021) - 2020
- [j3]Chuadhry Mujeeb Ahmed, Jianying Zhou:
Challenges and Opportunities in Cyberphysical Systems Security: A Physics-Based Perspective. IEEE Secur. Priv. 18(6): 14-22 (2020) - [j2]Chuadhry Mujeeb Ahmed, Aditya P. Mathur, Martín Ochoa:
NoiSense Print: Detecting Data Integrity Attacks on Sensor Measurements Using Hardware-based Fingerprints. ACM Trans. Priv. Secur. 24(1): 2:1-2:35 (2020) - [c13]Chuadhry Mujeeb Ahmed, M. R. Gauthama Raman, Aditya P. Mathur:
Challenges in Machine Learning based approaches for Real-Time Anomaly Detection in Industrial Control Systems. CPSS@AsiaCCS 2020: 23-29 - [c12]Alireza Tahsini, Noah Dunstatter, Mina Guirguis, Chuadhry Mujeeb Ahmed:
DeepBLOC: A Framework for Securing CPS through Deep Reinforcement Learning on Stochastic Games. CNS 2020: 1-9 - [c11]Chuadhry Mujeeb Ahmed, Nandha Kumar Kandasamy:
A Comprehensive Dataset from a Smart Grid Testbed for Machine Learning Based CPS Security Research. CPS4CIP 2020: 123-135 - [c10]Surabhi Athalye, Chuadhry Mujeeb Ahmed, Jianying Zhou:
A Tale of Two Testbeds: A Comparative Study of Attack Detection Techniques in CPS. CRITIS 2020: 17-30 - [c9]Chuadhry Mujeeb Ahmed, Jay Prakash, Rizwan Qadeer, Anand Agrawal, Jianying Zhou:
Process skew: fingerprinting the process for anomaly detection in industrial control systems. WISEC 2020: 219-230 - [e1]Jianying Zhou, Mauro Conti, Chuadhry Mujeeb Ahmed, Man Ho Au, Lejla Batina, Zhou Li, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Weizhi Meng, Martín Ochoa, Stjepan Picek, Georgios Portokalidis, Cong Wang, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings. Lecture Notes in Computer Science 12418, Springer 2020, ISBN 978-3-030-61637-3 [contents] - [i3]Chuadhry Mujeeb Ahmed, Jianying Zhou:
Challenges and Opportunities in CPS Security: A Physics-based Perspective. CoRR abs/2004.03178 (2020) - [i2]Chuadhry Mujeeb Ahmed, Jay Prakash, Jianying Zhou:
Revisiting Anomaly Detection in ICS: Aimed at Segregation of Attacks and Faults. CoRR abs/2005.00325 (2020)
2010 – 2019
- 2019
- [j1]Shaheryar Najam, Jameel Ahmed, Saad Masood, Chuadhry Mujeeb Ahmed:
Run-Time Resource Management Controller for Power Efficiency of GP-GPU Architecture. IEEE Access 7: 25493-25505 (2019) - 2018
- [c8]Chuadhry Mujeeb Ahmed, Jianying Zhou, Aditya P. Mathur:
Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS. ACSAC 2018: 566-581 - [c7]Chuadhry Mujeeb Ahmed, Martín Ochoa, Jianying Zhou, Aditya P. Mathur, Rizwan Qadeer, Carlos Murguia, Justin Ruths:
NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems. AsiaCCS 2018: 483-497 - [c6]Anand Agrawal, Chuadhry Mujeeb Ahmed, Ee-Chien Chang:
Poster: Physics-Based Attack Detection for an Insider Threat Model in a Cyber-Physical System. AsiaCCS 2018: 821-823 - 2017
- [c5]Chuadhry Mujeeb Ahmed, Carlos Murguia, Justin Ruths:
Model-based Attack Detection Scheme for Smart Water Distribution Networks. AsiaCCS 2017: 101-113 - [c4]Chuadhry Mujeeb Ahmed, Venkata Reddy Palleti, Aditya P. Mathur:
WADI: a water distribution testbed for research in the design of secure cyber physical systems. CySWATER@CPSWeek 2017: 25-28 - [c3]Rizwan Qadeer, Carlos Murguia, Chuadhry Mujeeb Ahmed, Justin Ruths:
Multistage Downstream Attack Detection in a Cyber Physical System. CyberICPS/SECPRE@ESORICS 2017: 177-185 - [c2]Jay Prakash, Chuadhry Mujeeb Ahmed:
Can You See Me On Performance of Wireless Fingerprinting in a Cyber Physical System. HASE 2017: 163-170 - [c1]Chuadhry Mujeeb Ahmed, Aditya P. Mathur:
Hardware Identification via Sensor Fingerprinting in a Cyber Physical System. QRS Companion 2017: 517-524 - [i1]Chuadhry Mujeeb Ahmed, Aditya Mathur, Martín Ochoa:
NoiSense: Detecting Data Integrity Attacks on Sensor Measurements using Hardware based Fingerprints. CoRR abs/1712.01598 (2017)
Coauthor Index
aka: Aditya Mathur
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 20:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint