Syed Wajid Ali Shah

Orcid: 0000-0001-5420-5499

Affiliations:
  • Deakin University, Centre for Cyber Security Research and Innovation, Australia
  • University of New South Wales, Sydney, Australia (PhD 2019)
  • University of Bradford, UK


According to our database1, Syed Wajid Ali Shah authored at least 23 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
User Characteristics and Their Impact on the Perceived Usable Security of Physical Authentication Devices.
IEEE Trans. Hum. Mach. Syst., October, 2024

Toward Higher Levels of Assurance in Remote Identity Proofing.
IEEE Consumer Electron. Mag., January, 2024

Deep learning trends and future perspectives of web security and vulnerabilities.
J. High Speed Networks, 2024

Infrared and visible image fusion based on improved NSCT and NSST.
Int. J. Electron. Secur. Digit. Forensics, 2024

Examining usable security features and user perceptions of Physical Authentication Devices.
Comput. Secur., 2024

2023
Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism.
IEEE Trans. Inf. Forensics Secur., 2023

Bit Flipping Key Encapsulation for the Post-Quantum Era.
IEEE Access, 2023

SoK: On Efficacy of the BGF Decoder for QC-MDPC-based Quantum-Safe Cryptosystems.
Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop, 2023

2022
Traceability in supply chains: A Cyber security analysis.
Comput. Secur., 2022

Zero Trust Architecture (ZTA): A Comprehensive Survey.
IEEE Access, 2022

A New Zero-Trust Aided Smart Key Authentication Scheme in IoV.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

2021
Data Augmentation and Dense-LSTM for Human Activity Recognition Using WiFi Signal.
IEEE Internet Things J., 2021

VID: Human identification through vein patterns captured from commodity depth cameras.
IET Biom., 2021

LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA).
Comput. Secur., 2021

2020
Echo-ID: Smart User Identification Leveraging Inaudible Sound Signals.
IEEE Access, 2020

Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
Exploring pervasive signals and devices for user authentication.
PhD thesis, 2019

Smart user identification using cardiopulmonary activity.
Pervasive Mob. Comput., 2019

Recent Trends in User Authentication - A Survey.
IEEE Access, 2019

2018
Wi-Access: Second Factor User Authentication leveraging WiFi Signals.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018

Wi-Sign: Device-free Second Factor User Authentication.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

2017
Wi-Auth: WiFi based Second Factor User Authentication.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

2012
FPGA implementation of modern wireless communication system.
Proceedings of the 17th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2012


  Loading...