Data augmentation and dense-LSTM for human activity recognition using WiFi signal J Zhang, F Wu, B Wei, Q Zhang, H Huang, SW Shah, J Cheng IEEE Internet of Things Journal 8 (6), 4628-4641, 2020 | 112 | 2020 |
Zero trust architecture (zta): A comprehensive survey NF Syed, SW Shah, A Shaghaghi, A Anwar, Z Baig, R Doss IEEE Access 10, 57143-57179, 2022 | 84 | 2022 |
Recent trends in user authentication–a survey SW Shah, SS Kanhere IEEE access 7, 112505-112519, 2019 | 75 | 2019 |
Traceability in supply chains: A Cyber security analysis NF Syed, SW Shah, R Trujillo-Rasua, R Doss Computers & Security 112, 102536, 2022 | 37 | 2022 |
LCDA: Lightweight continuous device-to-device authentication for a zero trust architecture (ZTA) SW Shah, NF Syed, A Shaghaghi, A Anwar, Z Baig, R Doss Computers & Security 108, 102351, 2021 | 33 | 2021 |
Smart user identification using cardiopulmonary activity SW Shah, SS Kanhere Pervasive and Mobile Computing 58, 101024, 2019 | 14 | 2019 |
Wi-Auth: WiFi based second factor user authentication SW Shah, SS Kanhere Proceedings of the 14th EAI International Conference on Mobile and …, 2017 | 13 | 2017 |
Wi-sign: Device-free second factor user authentication SW Shah, SS Kanhere Proceedings of the 15th EAI International Conference on Mobile and …, 2018 | 12 | 2018 |
Towards a lightweight continuous authentication protocol for device-to-device communication SWA Shah, NF Syed, A Shaghaghi, A Anwar, Z Baig, R Doss 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 9 | 2020 |
Wi-access: Second factor user authentication leveraging WiFi signals SW Shah, SS Kanhere 2018 IEEE International Conference on Pervasive Computing and Communications …, 2018 | 9 | 2018 |
Weak-key analysis for bike post-quantum key encapsulation mechanism MR Nosouhi, SW Shah, L Pan, Y Zolotavkin, A Nanda, P Gauravaram, ... IEEE Transactions on Information Forensics and Security 18, 2160-2174, 2023 | 7 | 2023 |
Bit Flipping Key Encapsulation for the Post-Quantum Era MR Nosouhi, SWA Shah, L Pan, R Doss IEEE Access, 2023 | 3 | 2023 |
How hackers can use message mirroring apps to see all your SMS texts — and bypass 2FA security RD Syed Wajid Ali Shah, Jongkil Jay Jeong https://theconversation.com/how-hackers-can-use-message-mirroring-apps-to …, 2021 | 3* | 2021 |
VID: Human identification through vein patterns captured from commodity depth cameras SW Shah, SS Kanhere, J Zhang, L Yao IET Biometrics 10 (2), 142-162, 2021 | 3 | 2021 |
DU-QS22: A Dataset for analyzing QC-MDPC-based quantum-safe cryptosystems MR Nosouhi, SW Shah, L Pan, R Doss EAI International Conference on Applied Cryptography in Computer and …, 2022 | 2 | 2022 |
A new zero-trust aided smart key authentication scheme in iov Y Song, F Jiang, SWA Shah, R Doss 2022 IEEE International Conference on Pervasive Computing and Communications …, 2022 | 2 | 2022 |
Echo-ID: Smart user identification leveraging inaudible sound signals SWA Shah, A Shaghaghi, SS Kanhere, J Zhang, A Anwar, R Doss IEEE Access 8, 194508-194522, 2020 | 2 | 2020 |
FPGA implementation of modern wireless communication system SWA Shah, HS Okleh, AS Hussaini, RA Abd-Alhameed, JM Noras, ... 2012 IEEE 17th International Workshop on Computer Aided Modeling and Design …, 2012 | 2 | 2012 |
Towards Higher Levels of Assurance in Remote Identity Proofing A Nanda, SWA Shah, JJ Jeong, R Doss, J Webb IEEE Consumer Electronics Magazine, 2023 | 1 | 2023 |
Examining usable security features and user perceptions of Physical Authentication Devices A Nanda, JJ Jeong, SWA Shah, M Nosouhi, R Doss Computers & Security 139, 103664, 2024 | | 2024 |