False data injection attacks on networked control systems
September 26, 2023
Ahmed Pasha, Rijha Safdar, Syed Taha Ali,
Journal of Control and Decision - Pages 1-10
Cerberus: A Blockchain-Based Accreditation and Degree Verification System
August 01, 2023
Aamna Tariq, Hina Binte Haq, Syed Taha Ali,
IEEE Transactions on Computational Social Systems - Volume: 10, Issue: 4, Page(s): 1503-1514, INSPEC Accession Number: 23515488
Merging engine implementation for intra-frame sharing in multi-tenant virtual passive optical networks
April 01, 2023
Akhlaque Ahmad, Ashfaq Ahmed, Arafat Al-Dweik, Syed Taha Ali, Arsalan Ahmad,
Journal of Optical Communications and Networking - Volume:15, Issue:4, Page:209-218
A First Look at Private Communications in Video Games using Visual Features
April 27, 2021
Abdul Wajid, Nasir Kamal, Muhammad Sharjeel, Raaez Muhammad Sheikh, Huzaifa Bin Wasim, Muhammad Hashir Ali, Wajahat Hussain, Syed Taha Ali, Muhammad Latif Anjum,
Proceedings on Privacy Enhancing Technologies - Volume 2021 (3), Pages 433–452
Secure Opportunistic Contextual Logging for Wearable Healthcare Sensing Devices
March 01, 2021
Muhammad Siddiqui, Syed Taha Ali, Vijay Sivaraman,
IEEE Transactions on Dependable and Secure Computing - Volume 18, Issue 2, Pages 753-764
Forensic Verification of Health Data from Wearable Devices using Anonymous Witnesses
November 01, 2020
Muhammad Siddiqui, Syed Taha Ali, Vijay Sivaraman,
IEEE Internet of Things Journal - Volume 7, Issue 11, Pages 10745-10762
An Overview of End-to-End Verifiable Voting Systems
September 30, 2020
Syed Taha Ali, Judy Murray,
Book on Real-World Electronic Voting: Design, Analysis and Deployment - 1st Edition, Chapter 8,
ZombieCoin 2.0: managing next-generation botnets using Bitcoin
August 01, 2018
Syed Taha Ali, Patrick McCorry, Peter Hyun-Jeen Lee, Feng Hao,
International Journal of Information Security - Vol:17, Pages411–422
SRoWM: Smart Review on Wormhole Mitigation
December 30, 2017
David Samuel Bhatti, Shehla Saeed, Muhammad Asad Ullah, Naila Samar Naaz, Syed Saqib Raza Rizvi, Syed Taha Ali,
International Journal of Computer Science and Network Security - Volume: 17, Issue: 12, Pages 178-187
A Survey of Securing Networks Using Software Defined Networking
September 01, 2015
Syed Taha Ali, Vijay Sivaraman, Sanjay Jha, Adam Radford,
IEEE Transactions on Reliability - Volume:64, Issue:3, Page:1086-1097
Greening residential Wi-Fi networks under centralized control
March 01, 2015
Vijay Sivaraman, John Matthews, Craig Russell, Syed Taha Ali, Arun Vishwanath,
IEEE Transactions on Mobile Computing - Volume:14, Issue:3, Page:552-564
Securing first-hop data provenance for bodyworn devices using wireless link fingerprints
December 01, 2014
Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry, Gene Tsudik, Sanjay Jha,
IEEE Transactions on Information Forensics and Security - Volume:9, Issue:12, Page:2193-2204
Eliminating reconciliation cost in secret key generation for body-worn health monitoring devices
December 01, 2014
Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry,
IEEE Transactions on Mobile Computing - Volume:13, Issue:12, Page:2763-2776
Authentication of lossy data in body-sensor networks for cloud-based healthcare monitoring
June 01, 2014
Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry,
Future Generation Computer Systems - Volume:35, Page:80-90
Secure key loss recovery for network broadcast in single-hop wireless sensor networks
August 01, 2010
Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, Diethelm Ostry,
Ad Hoc Networks - Volume:8, Issue:6, Page:668-679