Adnan Anwar
Orcid: 0000-0003-3916-1381
According to our database1,
Adnan Anwar
authored at least 86 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
AI-Driven EEC for Healthcare IoT: Security Challenges and Future Research Directions.
IEEE Consumer Electron. Mag., January, 2024
Veh. Commun., 2024
IEEE Trans. Smart Grid, 2024
Empathic Responding for Digital Interpersonal Emotion Regulation via Content Recommendation.
CoRR, 2024
Enhancing Cognitive Workload Classification Using Integrated LSTM Layers and CNNs for fNIRS Data Analysis.
CoRR, 2024
CoRR, 2024
Anomaly detection for space information networks: A survey of challenges, techniques, and future directions.
Comput. Secur., 2024
Proceedings of the Information Security Applications - 25th International Conference, 2024
DEMO: Adaptive Fuzz Testing for Automotive ECUs: A Modular Testbed Approach for Enhanced Vulnerability Detection.
Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos, 2024
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Proceedings of the Advanced Information Networking and Applications, 2024
2023
HiCoOB: Hierarchical Concurrent Optimistic Blockchain Consensus Protocol for Peer-to-Peer Energy Trading Systems.
IEEE Trans. Smart Grid, September, 2023
Dependable Intrusion Detection System for IoT: A Deep Transfer Learning Based Approach.
IEEE Trans. Ind. Informatics, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Future Gener. Comput. Syst., 2023
ACM Comput. Surv., 2023
FedDiSC: A Computation-efficient Federated Learning Framework for Power Systems Disturbance and Cyber Attack Discrimination.
CoRR, 2023
Encouraging Emotion Regulation in Social Media Conversations through Self-Reflection.
CoRR, 2023
Cybersecurity for Industrial IoT (IIoT): Threats, countermeasures, challenges and future directions.
Comput. Commun., 2023
A Bayesian Deep Learning Approach With Convolutional Feature Engineering to Discriminate Cyber-Physical Intrusions in Smart Grid Systems.
IEEE Access, 2023
DoS Attacks, Human Factors, and Evidence Extraction for the Industrial Internet of Things (IIoT) Paradigm.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, ASE 2023, 2023
FeDiSa: A Semi-asynchronous Federated Learning Framework for Power System Fault and Cyberattack Discrimination.
Proceedings of the IEEE INFOCOM 2023, 2023
Misbehaviour Detection for Smart Grids using a Privacy-centric and Computationally Efficient Federated Learning Approach.
Proceedings of the IEEE Global Communications Conference, 2023
Blockchain-Based and Fuzzy Logic-Enabled False Data Discovery for the Intelligent Autonomous Vehicular System.
Proceedings of the Third International Symposium on Advanced Security on Software and Systems, 2023
POSTER: A Semi-asynchronous Federated Intrusion Detection Framework for Power Systems.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
Towards Robust Misbehavior Detection in Power Control Systems: A Gradient Quantization Approach.
Proceedings of the 2023 Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks, 2023
2022
IEEE Trans. Intell. Transp. Syst., 2022
Sensors, 2022
Int. J. Sens. Networks, 2022
Owner Identity Verification in the Internet of Connected Vehicles: Zero Trust Based Solution.
IACR Cryptol. ePrint Arch., 2022
Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home.
IACR Cryptol. ePrint Arch., 2022
A Systematic Literature Review on Blockchain Enabled Federated Learning Framework for Internet of Vehicles.
IACR Cryptol. ePrint Arch., 2022
Adversarial Models Towards Data Availability and Integrity of Distributed State Estimation for Industrial IoT-Based Smart Grid.
CoRR, 2022
CoRR, 2022
SDN-IoT empowered intelligent framework for industry 4.0 applications during COVID-19 pandemic.
Clust. Comput., 2022
Biomed. Signal Process. Control., 2022
Blockchain Meets Secured Microservice Architecture: A Trustworthy Consensus Algorithm.
Proceedings of the 19th International Conference on Wireless Networks and Mobile Systems, 2022
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022
Smart Home/Office Energy Management based on Individual Data Analysis through IoT Networks.
Proceedings of the IEEE International Conference on Communications, 2022
2021
An Architecture and Performance Evaluation of Blockchain-Based Peer-to-Peer Energy Trading.
IEEE Trans. Smart Grid, 2021
Sensors, 2021
Deep Transfer Learning Based Intrusion Detection System for Electric Vehicular Networks.
Sensors, 2021
Sensors, 2021
PeerJ Comput. Sci., 2021
Health Inf. Sci. Syst., 2021
Future Gener. Comput. Syst., 2021
Data-driven behavioural biometrics for continuous and adaptive user verification using Smartphone and Smartwatch.
CoRR, 2021
Emerging Trends of Recently Published Datasets for Intrusion Detection Systems (IDS): A Survey.
CoRR, 2021
Bi-Level Poisoning Attack Model and Countermeasure for Appliance Consumption Data of Smart Homes.
CoRR, 2021
CoRR, 2021
Comprehensive Survey and Taxonomies of False Injection Attacks in Smart Grid: Attack Models, Targets, and Impacts.
CoRR, 2021
LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA).
Comput. Secur., 2021
Do not get fooled: Defense against the one-pixel attack to protect IoT-enabled Deep Learning systems.
Ad Hoc Networks, 2021
Differential Privacy for IoT-Enabled Critical Infrastructure: A Comprehensive Survey.
IEEE Access, 2021
IEEE Access, 2021
A Performance Based Study on Deep Learning Algorithms in the Effective Prediction of Breast Cancer.
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
2020
IEEE Trans. Big Data, 2020
IEEE Access, 2020
IEEE Access, 2020
TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems.
IEEE Access, 2020
Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Measurement Unit Placement Against Injection Attacks for the Secured Operation of an IIoT-based Smart Grid.
Proceedings of the 19th IEEE International Conference on Trust, 2020
CVSS Based Attack Analysis Using a Graphical Security Model: Review and Smart Grid Case Study.
Proceedings of the Smart Grid and Internet of Things - 4th EAI International Conference, 2020
2017
HPC-Based Intelligent Volt/VAr Control of Unbalanced Distribution Smart Grid in the Presence of Noise.
IEEE Trans. Smart Grid, 2017
Ensuring Data Integrity of OPF Module and Energy Database by Detecting Changes in Power Flow Patterns in Smart Grids.
IEEE Trans. Ind. Informatics, 2017
Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements.
J. Comput. Syst. Sci., 2017
2016
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016
Proceedings of the Intelligence and Security Informatics - 11th Pacific Asia Workshop, 2016
2015
Identification of vulnerable node clusters against false data injection attack in an AMI based Smart Grid.
Inf. Syst., 2015
An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2015
A Data-Driven Approach to Distinguish Cyber-Attacks from Physical Faults in a Smart Grid.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015
2014
CoRR, 2014
Swarm Intelligence Based Multi-phase OPF For Peak Power Loss Reduction In A Smart Grid.
CoRR, 2014
Enhanced Estimation of Autoregressive Wind Power Prediction Model Using Constriction Factor Particle Swarm Optimization.
CoRR, 2014
False Data Injection Attack Targeting the LTC Transformers to Disrupt Smart Grid Operation.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014