default search action
Muhammad Naveed Aman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Mansoor Ali Khan, Muhammad Naveed Aman, Biplab Sikdar:
Beyond Bits: A Review of Quantum Embedding Techniques for Efficient Information Processing. IEEE Access 12: 46118-46137 (2024) - [j30]Mansoor Ali Khan, Muhammad Naveed Aman, Biplab Sikdar:
Soteria: A Quantum-Based Device Attestation Technique for Internet of Things. IEEE Internet Things J. 11(9): 15320-15333 (2024) - [j29]Muhammad Usama, Muhammad Naveed Aman, Biplab Sikdar:
Runtime Self-Attestation of FPGA-Based IoT Devices. IEEE Internet Things J. 11(20): 33406-33417 (2024) - [j28]Kashif Javed, Mansoor Ali Khan, Mukhtar Ullah, Muhammad Naveed Aman, Biplab Sikdar:
Securing Synchrophasors Using Data Provenance in the Quantum Era. IEEE Open J. Commun. Soc. 5: 1594-1608 (2024) - [j27]Varun Kohli, Muhammad Naveed Aman, Biplab Sikdar:
An Intelligent Fingerprinting Technique for Low-Power Embedded IoT Devices. IEEE Trans. Artif. Intell. 5(9): 4519-4534 (2024) - [j26]Asif Iqbal, Muhammad Naveed Aman, Biplab Sikdar:
Machine and Representation Learning-Based GNSS Spoofing Detectors Utilizing Feature Set From Generic GNSS Receivers. IEEE Trans. Consumer Electron. 70(1): 574-583 (2024) - [d1]Muhammad Naveed Aman, Mohamed Haroon Basheer, Asif Iqbal, Biplab Sikdar:
IoT Device RAM Traces For Firmware Attestation. IEEE DataPort, 2024 - [i1]Varun Kohli, Bhavya Kohli, Muhammad Naveed Aman, Biplab Sikdar:
Swarm-Net: Firmware Attestation in IoT Swarms using Graph Neural Networks and Volatile Memory. CoRR abs/2408.05680 (2024) - 2023
- [j25]Xiao Wei, Muhammad Naveed Aman, Biplab Sikdar:
A Light-Weight Technique to Detect GPS Spoofing Using Attenuated Signal Envelopes. IEEE Open J. Comput. Soc. 4: 158-170 (2023) - [j24]Muhammad Naveed Aman, Muhammad Ishfaq, Biplab Sikdar:
Co-Existence With IEEE 802.11 Networks in the ISM Band Without Channel Estimation. IEEE Open J. Comput. Soc. 4: 267-279 (2023) - [j23]James Adu Ansere, Mohsin Kamal, Izaz Ahmad Khan, Muhammad Naveed Aman:
Dynamic Resource Optimization for Energy-Efficient 6G-IoT Ecosystems. Sensors 23(10): 4711 (2023) - [c25]Mirza Athar Baig, Muhammad Naveed Aman:
Exploiting Hardware Imperfections for GPS Spoofing Detection using Clock Variations. DSC 2023: 1-7 - [c24]Varun Kohli, Muhammad Naveed Aman, Biplab Sikdar:
SRAM and Generative Network-based Physical Fingerprinting for Trust Management in the Internet of Things. DSC 2023: 1-8 - [c23]Asif Iqbal, Muhammad Naveed Aman, Biplab Sikdar:
Machine Learning based Time Synchronization Attack Detection for Synchrophasors. GLOBECOM 2023: 2251-2256 - [c22]Mirza Athar Baig, Muhammad Naveed Aman:
Hardware Fingerprinting of Phasor Measurement Units for Data Provenance. ISGT 2023: 1-5 - [c21]Asif Iqbal, Muhammad Naveed Aman, Biplab Sikdar:
Representation Learning based Time Synchronization Attack Detection for Synchrophasors. SmartGridComm 2023: 1-6 - 2022
- [j22]Nalam Venkata Abhishek, Muhammad Naveed Aman, Teng Joon Lim, Biplab Sikdar:
DRiVe: Detecting Malicious Roadside Units in the Internet of Vehicles With Low Latency Data Integrity. IEEE Internet Things J. 9(5): 3270-3281 (2022) - [j21]Muhammad Naveed Aman, Mohamed Haroon Basheer, Jun Wen Wong, Jia Xu, Hoon Wei Lim, Biplab Sikdar:
Machine-Learning-Based Attestation for the Internet of Things Using Memory Traces. IEEE Internet Things J. 9(20): 20431-20443 (2022) - [j20]Chien-Ming Chen, Shehzad Ashraf Chaudhry, Kuo-Hui Yeh, Muhammad Naveed Aman:
Security, Trust and Privacy for Cloud, Fog and Internet of Things. Secur. Commun. Networks 2022: 9841709:1-9841709:2 (2022) - [j19]Muhammad Naveed Aman, Mohamed Haroon Basheer, Siddhant Dash, Ashutosh Sancheti, Jun Wen Wong, Jia Xu, Hoon Wei Lim, Biplab Sikdar:
PRoM: Passive Remote Attestation Against Roving Malware in Multicore IoT Devices. IEEE Syst. J. 16(1): 789-800 (2022) - [j18]Muhammad Naveed Aman, Uzair Javaid, Biplab Sikdar:
IoT-Proctor: A Secure and Lightweight Device Patching Framework for Mitigating Malware Spread in IoT Networks. IEEE Syst. J. 16(3): 3468-3479 (2022) - [c20]Uzair Javaid, Zhen Li, Muhammad Naveed Aman, Dongxu Shao, Kevin Yee, Biplab Sikdar:
Blockchain based Secure Group Data Collaboration in Cloud with Differentially Private Synthetic Data and Trusted Execution Environment. IEEE Big Data 2022: 3919-3927 - [c19]Nalam Venkata Abhishek, Muhammad Naveed Aman, Teng Joon Lim, Biplab Sikdar:
MaDe: Malicious Aerial Vehicle Detection using Generalized Likelihood Ratio Test. ICC 2022: 1-6 - [c18]Nalam Venkata Abhishek, Muhammad Naveed Aman, Teng Joon Lim, Biplab Sikdar:
PIC: Preserving Data Integrity in UAV Assisted Communication. INFOCOM Workshops 2022: 1-6 - 2021
- [j17]Emmanuel Abiodun Abioye, Mohamad Shukri Zainal Abidin, Muhammad Naveed Aman, Mohd Saiful Azimi Mahmud, Salinda Buyamin:
A model predictive controller for precision irrigation using discrete lagurre networks. Comput. Electron. Agric. 181: 105953 (2021) - [j16]Umar Zangina, Salinda Buyamin, Muhammad Naveed Aman, Mohamad Shukri Zainal Abidin, Mohd Saiful Azimi Mahmud:
A greedy approach to improve pesticide application for precision agriculture using model predictive control. Comput. Electron. Agric. 182: 105984 (2021) - [j15]Umar Zangina, Salinda Buyamin, Muhammad Naveed Aman, Mohamad Shukri Zainal Abidin, Mohd Saiful Azimi Mahmud:
Autonomous mobility of a fleet of vehicles for precision pesticide application. Comput. Electron. Agric. 186: 106217 (2021) - [j14]Muhammad Naveed Aman, Uzair Javaid, Biplab Sikdar:
Security Function Virtualization for IoT Applications in 6G Networks. IEEE Commun. Stand. Mag. 5(3): 90-95 (2021) - [j13]Muhammad Naveed Aman, Uzair Javaid, Biplab Sikdar:
A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles. IEEE Internet Things J. 8(2): 1123-1139 (2021) - [j12]Muhammad Naveed Aman, Mohamed Haroon Basheer, Biplab Sikdar:
A Lightweight Protocol for Secure Data Provenance in the Internet of Things Using Wireless Fingerprints. IEEE Syst. J. 15(2): 2948-2958 (2021) - [c17]Muhammad Naveed Aman, Biplab Sikdar:
AI Based Algorithm-Hardware Separation for IoV Security. GLOBECOM (Workshops) 2021: 1-6 - 2020
- [j11]Muhammad Naveed Aman, Mohamed Haroon Basheer, Siddhant Dash, Jun Wen Wong, Jia Xu, Hoon Wei Lim, Biplab Sikdar:
HAtt: Hybrid Remote Attestation for the Internet of Things With High Availability. IEEE Internet Things J. 7(8): 7220-7233 (2020) - [j10]Uzair Javaid, Muhammad Naveed Aman, Biplab Sikdar:
A Scalable Protocol for Driving Trust Management in Internet of Vehicles With Blockchain. IEEE Internet Things J. 7(12): 11815-11829 (2020) - [j9]Olatunji Obalowu Mohammed, Mohd Wazir Mustafa, Muhammad Naveed Aman:
A Graph-Theoretic Approach to Capacity Benefit Margin Calculation for Large Multiarea Power Systems. IEEE Syst. J. 14(1): 1230-1233 (2020) - [c16]Uzair Javaid, Muhammad Naveed Aman, Biplab Sikdar:
Defining trust in IoT environments via distributed remote attestation using blockchain. MobiHoc 2020: 321-326
2010 – 2019
- 2019
- [j8]Muhammad Naveed Aman, Sachin Taneja, Biplab Sikdar, Kee Chaing Chua, Massimo Alioto:
Token-Based Security for the Internet of Things With Dynamic Energy-Quality Tradeoff. IEEE Internet Things J. 6(2): 2843-2859 (2019) - [j7]Muhammad Naveed Aman, Mohamed Haroon Basheer, Biplab Sikdar:
Two-Factor Authentication for IoT With Location Information. IEEE Internet Things J. 6(2): 3335-3351 (2019) - [j6]Muhammad Naveed Aman, Mohamed Haroon Basheer, Biplab Sikdar:
Data Provenance for IoT With Light Weight Authentication and Privacy Preservation. IEEE Internet Things J. 6(6): 10441-10457 (2019) - [j5]Momina T. Khattak, Eko Supriyanto, Muhammad Naveed Aman, Rania Hussein Ahmed Al-Ashwal:
Predicting Down syndrome and neural tube defects using basic risk factors. Medical Biol. Eng. Comput. 57(7): 1417-1424 (2019) - [c15]Muhammad Naveed Aman, Mohamed Haroon Basheer, Biplab Sikdar:
Data Provenance for IoT using Wireless Channel Characteristics and Physically Unclonable Functions. ICC 2019: 1-6 - [c14]Uzair Javaid, Muhammad Naveed Aman, Biplab Sikdar:
DrivMan: Driving Trust Management and Data Sharing in VANETs with Blockchain and Smart Contracts. VTC Spring 2019: 1-5 - 2018
- [j4]Muhammad Naveed Aman, Biplab Sikdar, Kee Chaing Chua, Anwar Ali:
Low Power Data Integrity in IoT Systems. IEEE Internet Things J. 5(4): 3102-3113 (2018) - [j3]Muhammad Naveed Aman, Biplab Sikdar:
ATT-Auth: A Hybrid Protocol for Industrial IoT Attestation With Authentication. IEEE Internet Things J. 5(6): 5119-5131 (2018) - [c13]Uzair Javaid, Ang Kiang Siang, Muhammad Naveed Aman, Biplab Sikdar:
Mitigating loT Device based DDoS Attacks using Blockchain. CRYBLOCK@MobiSys 2018: 71-76 - [c12]Uzair Javaid, Muhammad Naveed Aman, Biplab Sikdar:
BlockPro: Blockchain based Data Provenance and Integrity for Secure IoT Environments. BlockSys@SenSys 2018: 13-18 - 2017
- [j2]Muhammad Naveed Aman, Kee Chaing Chua, Biplab Sikdar:
Mutual Authentication in IoT Systems Using Physical Unclonable Functions. IEEE Internet Things J. 4(5): 1327-1340 (2017) - [c11]Muhammad Naveed Aman, Kee Chaing Chua, Biplab Sikdar:
Secure Data Provenance for the Internet of Things. IoTPTS@AsiaCCS 2017: 11-14 - [c10]Muhammad Naveed Aman, Kee Chaing Chua, Biplab Sikdar:
Physically secure mutual authentication for IoT. DSC 2017: 310-317 - [c9]Muhammad Naveed Aman, Kee Chaing Chua, Biplab Sikdar:
A Light-Weight Mutual Authentication Protocol for IoT Systems. GLOBECOM 2017: 1-6 - 2016
- [c8]Muhammad Naveed Aman, Kee Chaing Chua, Biplab Sikdar:
Position Paper: Physical Unclonable Functions for IoT Security. IoTPTS@AsiaCCS 2016: 10-13 - [c7]Muhammad Naveed Aman, Kashif Javed, Biplab Sikdar, Kee Chaing Chua:
Detecting data tampering attacks in synchrophasor networks using time hopping. ISGT Europe 2016: 1-6 - 2015
- [j1]Anwar Ali, Muhammad Rizwan Mughal, Haider Ali, Leonardo M. Reyneri, Muhammad Naveed Aman:
Design, implementation, and thermal modeling of embedded reconfigurable magnetorquer system for nanosatellites. IEEE Trans. Aerosp. Electron. Syst. 51(4): 2669-2679 (2015) - 2014
- [c6]Muhammad Naveed Aman, Biplab Sikdar:
A wireless MAC protocol with efficient packet recovery. LANMAN 2014: 1-5 - [c5]Muhammad Naveed Aman, Biplab Sikdar, Wai Kin Chan:
Efficient packet recovery in wireless networks. WCNC 2014: 1791-1796 - 2012
- [c4]Muhammad Naveed Aman, Biplab Sikdar:
Distinguishing between channel errors and collisions in IEEE 802.11. CISS 2012: 1-6 - [c3]Muhammad Naveed Aman, Wai Kin Chan, Biplab Sikdar:
Collision detection in IEEE 802.11 networks by error vector magnitude analysis. GLOBECOM 2012: 5218-5223 - [c2]Muhammad Naveed Aman, Biplab Sikdar:
A CART based mechanism for collision detection in IEEE 802.11. LATINCOM 2012: 1-6
2000 – 2009
- 2009
- [c1]Muhammad Naveed Aman, Biplab Sikdar, Shyam Parekh:
Scalable Peer-to-Peer Video Streaming in WiMAX Networks. GLOBECOM 2009: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint