Third eye: Context-aware detection for hidden terminal emulation attacks in cognitive radio-enabled IoT networks M Hossain, J Xie IEEE Transactions on Cognitive Communications and Networking 6 (1), 214-228, 2020 | 23 | 2020 |
Design and performance analysis of a dual-band microstrip patch antenna for mobile WiMAX, WLAN, Wi-Fi and bluetooth applications MA Rahman, M Hossain, IS Iqbal, S Sobhan 2014 International Conference on Informatics, Electronics & Vision (ICIEV), 1-6, 2014 | 19 | 2014 |
Off-sensing and route manipulation attack: A cross-layer attack in cognitive radio based wireless mesh networks M Hossain, J Xie IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1376-1384, 2018 | 15 | 2018 |
Covert spectrum handoff: An attack in spectrum handoff processes in cognitive radio networks M Hossain, J Xie 2018 IEEE Global Communications Conference (GLOBECOM), 1-6, 2018 | 10 | 2018 |
Impact of off-sensing attacks in cognitive radio networks M Hossain, J Xie GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-6, 2017 | 10 | 2017 |
Hide and seek: A Markov-based defense strategy against off-sensing attack in cognitive radio networks M Hossain, J Xie IEEE Transactions on Network Science and Engineering 7 (4), 3028-3041, 2020 | 9 | 2020 |
Detection of hidden terminal emulation attacks in cognitive radio-enabled IoT networks M Hossain, J Xie ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019 | 9 | 2019 |
Performance analysis of RLS and VSS-LMS channel estimation techniques for 4G MIMO OFDM systems M Hossain, SM Farhad, MT Riasat 2012 15th International Conference on Computer and Information Technology …, 2012 | 9 | 2012 |
Hide and seek: A defense against off-sensing attack in cognitive radio networks M Hossain, J Xie IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 613-621, 2019 | 8 | 2019 |
A wireless video streaming system based on OFDMA with multi-layer H. 264 coding and adaptive radio resource allocation SMR Islam, M Hossain 2011 International Conference on Image Information Processing, 1-6, 2011 | 6 | 2011 |
Hidden terminal emulation: An attack in dense IoT networks in the shared spectrum operation M Hossain, J Xie 2019 IEEE Global Communications Conference (GLOBECOM), 1-6, 2019 | 4 | 2019 |
Intent-aware Permission Architecture: A Model for Rethinking Informed Consent for Android Apps M Rahman, E Miller, M Hossain, A Ali-Gombe International Conference on Information Systems Security and Privacy …, 2022 | 1 | 2022 |
Intent-aware permission architecture: A model for rethinking informed consent for android apps [intent-aware permission architecture: A model for rethinking informed consent … R Rahman Md, E Miller, M Hossain, A Ali-Gombe ICISSP 2022, 2022 | 1 | 2022 |
Jump and Wobble: A Defense Against Hidden Terminal Emulation Attack in Dense IoT Networks M Hossain, J Xie IEEE International Conference on Communications, 2021 | 1 | 2021 |
PACMAN Attack: A Mobility-Powered Attack in Private 5G-Enabled Industrial Automation System M Rahman, M Hossain, J Xie IEEE International Conference on Communications (ICC), 1-6, 2023 | | 2023 |
Intent-Aware Permission Architecture: A Model for Rethinking Informed Consent for Android Apps M Rashedur Rahman, E Miller, M Hossain, A Ali-Gombe arXiv e-prints, arXiv: 2202.06995, 2022 | | 2022 |
Security Assessment of Dynamic Spectrum Access in Emerging Wireless Networks M Hossain The University of North Carolina at Charlotte, 2020 | | 2020 |
Design and Performance Analysis of An Ultra-Wideband Microstrip Patch Antenna for Mobile WiMAX applications at 3.5 GHz Band including Human Interaction MA Rahman, S Sobhan, M Hossain | | |