Chuadhry Mujeeb Ahmed
Orcid: 0000-0003-3644-0465
According to our database1,
Chuadhry Mujeeb Ahmed
authored at least 40 papers
between 2017 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Comparative DQN-Improved Algorithms for Stochastic Games-Based Automated Edge Intelligence-Enabled IoT Malware Spread-Suppression Strategies.
IEEE Internet Things J., June, 2024
SGD3QN: Joint Stochastic Games and Dueling Double Deep Q-Networks for Defending Malware Propagation in Edge Intelligence-Enabled Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2024
Game-theoretic analytics for privacy preservation in Internet of Things networks: A survey.
Eng. Appl. Artif. Intell., 2024
Time Constant: Actuator Fingerprinting using Transient Response of Device and Process in ICS.
CoRR, 2024
Differential Privacy with Selected Privacy Budget ε in a Cyber Physical System Using Machine Learning.
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
2023
Proceedings of the First International Symposium on Trustworthy Autonomous Systems, 2023
Safety Watermark: A Defense Tool for Real-Time Digital Forensic Incident Response in Industrial Control Systems.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
Blockchain-Enabled Data Sharing in Connected Autonomous Vehicles for Heterogeneous Networks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
2022
An Advanced Boundary Protection Control for the Smart Water Network Using Semisupervised and Deep Learning Approaches.
IEEE Internet Things J., 2022
Can You Still See Me?: Reconstructing Robot Operations Over End-to-End Encrypted Channels.
CoRR, 2022
Can You Still See Me?: Identifying Robot Operations Over End-to-End Encrypted Channels.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
Proof-of-Communication-Capability Based Authentication in Blockchain-enabled Wireless Autonomous Vehicular Networks.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022
Proceedings of the IEEE Global Communications Conference, 2022
Curse of System Complexity and Virtue of Operational Invariants: Machine Learning based System Modeling and Attack Detection in CPS.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
2021
Can Replay Attacks Designed to Steal Water from Water Distribution Systems Remain Undetected?
ACM Trans. Cyber Phys. Syst., 2021
Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation.
Cybersecur., 2021
Proceedings of the Critical Information Infrastructures Security, 2021
Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine Learning.
Proceedings of the CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
<i>NoiSense Print</i>: Detecting Data Integrity Attacks on Sensor Measurements Using Hardware-based Fingerprints.
ACM Trans. Priv. Secur., 2020
Challenges and Opportunities in Cyberphysical Systems Security: A Physics-Based Perspective.
IEEE Secur. Priv., 2020
CoRR, 2020
CoRR, 2020
Process skew: fingerprinting the process for anomaly detection in industrial control systems.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
Proceedings of the Critical Information Infrastructures Security, 2020
A Comprehensive Dataset from a Smart Grid Testbed for Machine Learning Based CPS Security Research.
Proceedings of the Cyber-Physical Security for Critical Infrastructures Protection, 2020
DeepBLOC: A Framework for Securing CPS through Deep Reinforcement Learning on Stochastic Games.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
Challenges in Machine Learning based approaches for Real-Time Anomaly Detection in Industrial Control Systems.
Proceedings of the 6th ACM Workshop on Cyber-Physical System Security, 2020
2019
IEEE Access, 2019
2018
<i>NoisePrint</i>: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Poster: Physics-Based Attack Detection for an Insider Threat Model in a Cyber-Physical System.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
NoiSense: Detecting Data Integrity Attacks on Sensor Measurements using Hardware based Fingerprints.
CoRR, 2017
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017
WADI: a water distribution testbed for research in the design of secure cyber physical systems.
Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017