default search action
Hawzhin Mohammed
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c8]Terry N. Guo, Hawzhin Mohammed, Syed Rafay Hasan:
Edge Intelligence in Mobile Nodes: Opportunistic Pipeline via 5G D2D for On-site Sensing. VTC Fall 2022: 1-5 - 2021
- [j3]Tolulope A. Odetola, Faiq Khalid, Hawzhin Mohammed, Travis Sandefur, Syed Rafay Hasan:
FeSHI: Feature Map-Based Stealthy Hardware Intrinsic Attack. IEEE Access 9: 115370-115387 (2021) - [c7]Hawzhin Mohammed, Faiq Khalid, Paul Sawyer, Gabriella Cataloni, Syed Rafay Hasan:
InTrust-IoT: Intelligent Ecosystem based on Power Profiling of Trusted device(s) in IoT for Hardware Trojan Detection. HASP@MICRO 2021: 8:1-8:8 - [c6]Hawzhin Mohammed, Tolulope A. Odetola, Nan Guo, Syed Rafay Hasan:
Dynamic Distribution of Edge Intelligence at the Node Level for Internet of Things. MWSCAS 2021: 330-333 - [i7]Tolulope A. Odetola, Faiq Khalid, Travis Sandefur, Hawzhin Mohammed, Syed Rafay Hasan:
FeSHI: Feature Map Based Stealthy Hardware Intrinsic Attack. CoRR abs/2106.06895 (2021) - [i6]Hawzhin Mohammed, Tolulope A. Odetola, Nan Guo, Syed Rafay Hasan:
Dynamic Distribution of Edge Intelligence at the Node Level for Internet of Things. CoRR abs/2107.05828 (2021) - 2020
- [j2]Hawzhin Mohammed, Syed Rafay Hasan, Falah Awwad:
Fusion-On-Field Security and Privacy Preservation for IoT Edge Devices: Concurrent Defense Against Multiple Types of Hardware Trojan Attacks. IEEE Access 8: 36847-36862 (2020) - [c5]Ogheneuriri Oderhohwo, Hawzhin Mohammed, Tolulope A. Odetola, Terry N. Guo, Syed Rafay Hasan, Felix Dogbe:
An Edge Intelligence Framework for Resource Constrained Community Area Network. MWSCAS 2020: 97-100 - [c4]Ogheneuriri Oderhohwo, Tolulope A. Odetola, Hawzhin Mohammed, Syed Rafay Hasan:
Deployment of Object Detection Enhanced with Multi-label Multi-classification on Edge Device. MWSCAS 2020: 986-989 - [i5]Hawzhin Mohammed, Tolulope A. Odetola, Syed Rafay Hasan:
How Secure is Distributed Convolutional Neural Network on IoT Edge Devices? CoRR abs/2006.09276 (2020) - [i4]Terry N. Guo, Hawzhin Mohammed, Syed Rafay Hasan:
Collaborative Pipeline Using Opportunistic Mobile Resources via D2D for Computation-Intensive Tasks. CoRR abs/2006.09301 (2020)
2010 – 2019
- 2019
- [j1]Ahmad Alsharif, Mahmoud Nabil, Samet Tonyali, Hawzhin Mohammed, Mohamed Mahmoud, Kemal Akkaya:
EPIC: Efficient Privacy-Preserving Scheme With EtoE Data Integrity and Authenticity for AMI Networks. IEEE Internet Things J. 6(2): 3309-3321 (2019) - [c3]Hawzhin Mohammed, Tolulope A. Odetola, Syed Rafay Hasan, Sari Stissi, Isaiah Garlin, Falah Awwad:
(HIADIoT): Hardware Intrinsic Attack Detection in Internet of Things; Leveraging Power Profiling. MWSCAS 2019: 852-855 - [i3]Tolulope A. Odetola, Hawzhin Raoof Mohammed, Syed Rafay Hasan:
A Stealthy Hardware Trojan Exploiting the Architectural Vulnerability of Deep Learning Architectures: Input Interception Attack (IIA). CoRR abs/1911.00783 (2019) - 2018
- [c2]Hawzhin Mohammed, Jimmy Howell, Syed Rafay Hasan, Nan Guo, Faiq Khalid, Omar S. Elkeelany:
Hardware Trojan Based Security Issues in Home Area Network: A Testbed Setup. MWSCAS 2018: 972-975 - [i2]Hawzhin Mohammed, Syed Rafay Hasan, Mohammad Ashiqur Rahman:
Load Control and Privacy-Preserving Scheme for Data Collection in AMI Networks. CoRR abs/1807.11565 (2018) - [i1]Ahmad Alsharif, Mahmoud Nabil, Samet Tonyali, Hawzhin Mohammed, Mohamed Mahmoud, Kemal Akkaya:
EPIC: Efficient Privacy-Preserving Scheme with E2E Data Integrity and Authenticity for AMI Networks. CoRR abs/1810.01851 (2018) - 2016
- [c1]Hawzhin Mohammed, Samet Tonyali, Khaled Rabieh, Mohamed Mahmoud, Kemal Akkaya:
Efficient Privacy-Preserving Data Collection Scheme for Smart Grid AMI Networks. GLOBECOM 2016: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint