Chuadhry Mujeeb Ahmed

Orcid: 0000-0003-3644-0465

According to our database1, Chuadhry Mujeeb Ahmed authored at least 40 papers between 2017 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Comparative DQN-Improved Algorithms for Stochastic Games-Based Automated Edge Intelligence-Enabled IoT Malware Spread-Suppression Strategies.
IEEE Internet Things J., June, 2024

SGD3QN: Joint Stochastic Games and Dueling Double Deep Q-Networks for Defending Malware Propagation in Edge Intelligence-Enabled Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2024

Game-theoretic analytics for privacy preservation in Internet of Things networks: A survey.
Eng. Appl. Artif. Intell., 2024

Time Constant: Actuator Fingerprinting using Transient Response of Device and Process in ICS.
CoRR, 2024

Differential Privacy with Selected Privacy Budget ε in a Cyber Physical System Using Machine Learning.
Proceedings of the Applied Cryptography and Network Security Workshops, 2024

Device Fingerprinting in a Smart Grid CPS.
Proceedings of the Applied Cryptography and Network Security Workshops, 2024

2023
AGRITRUST: A Testbed to Enable Trustworthy Smart AgriTech.
Proceedings of the First International Symposium on Trustworthy Autonomous Systems, 2023

Safety Watermark: A Defense Tool for Real-Time Digital Forensic Incident Response in Industrial Control Systems.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

Blockchain-Enabled Data Sharing in Connected Autonomous Vehicles for Heterogeneous Networks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
An Advanced Boundary Protection Control for the Smart Water Network Using Semisupervised and Deep Learning Approaches.
IEEE Internet Things J., 2022

Reconstructing Robot Operations via Radio-Frequency Side-Channel.
CoRR, 2022

Can You Still See Me?: Reconstructing Robot Operations Over End-to-End Encrypted Channels.
CoRR, 2022

Can You Still See Me?: Identifying Robot Operations Over End-to-End Encrypted Channels.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Proof-of-Communication-Capability Based Authentication in Blockchain-enabled Wireless Autonomous Vehicular Networks.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022

Energy Level Spoofing Attacks and Countermeasures in Blockchain-enabled IoT.
Proceedings of the IEEE Global Communications Conference, 2022

Curse of System Complexity and Virtue of Operational Invariants: Machine Learning based System Modeling and Attack Detection in CPS.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

2021
Can Replay Attacks Designed to Steal Water from Water Distribution Systems Remain Undetected?
ACM Trans. Cyber Phys. Syst., 2021

Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation.
Cybersecur., 2021

Bank of Models: Sensor Attack Detection and Isolation in Industrial Control Systems.
Proceedings of the Critical Information Infrastructures Security, 2021

Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine Learning.
Proceedings of the CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, 2021

Scanning the Cycle: Timing-based Authentication on PLCs.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
<i>NoiSense Print</i>: Detecting Data Integrity Attacks on Sensor Measurements Using Hardware-based Fingerprints.
ACM Trans. Priv. Secur., 2020

Challenges and Opportunities in Cyberphysical Systems Security: A Physics-Based Perspective.
IEEE Secur. Priv., 2020

Revisiting Anomaly Detection in ICS: Aimed at Segregation of Attacks and Faults.
CoRR, 2020

Challenges and Opportunities in CPS Security: A Physics-based Perspective.
CoRR, 2020

Process skew: fingerprinting the process for anomaly detection in industrial control systems.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

A Tale of Two Testbeds: A Comparative Study of Attack Detection Techniques in CPS.
Proceedings of the Critical Information Infrastructures Security, 2020

A Comprehensive Dataset from a Smart Grid Testbed for Machine Learning Based CPS Security Research.
Proceedings of the Cyber-Physical Security for Critical Infrastructures Protection, 2020

DeepBLOC: A Framework for Securing CPS through Deep Reinforcement Learning on Stochastic Games.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

Challenges in Machine Learning based approaches for Real-Time Anomaly Detection in Industrial Control Systems.
Proceedings of the 6th ACM Workshop on Cyber-Physical System Security, 2020

2019
Run-Time Resource Management Controller for Power Efficiency of GP-GPU Architecture.
IEEE Access, 2019

2018
<i>NoisePrint</i>: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Poster: Physics-Based Attack Detection for an Insider Threat Model in a Cyber-Physical System.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
NoiSense: Detecting Data Integrity Attacks on Sensor Measurements using Hardware based Fingerprints.
CoRR, 2017

Hardware Identification via Sensor Fingerprinting in a Cyber Physical System.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Can You See Me On Performance of Wireless Fingerprinting in a Cyber Physical System.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

Multistage Downstream Attack Detection in a Cyber Physical System.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017

WADI: a water distribution testbed for research in the design of secure cyber physical systems.
Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks, 2017

Model-based Attack Detection Scheme for Smart Water Distribution Networks.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017


  Loading...