Follow
Hawzhin Mohammed
Hawzhin Mohammed
Verified email at students.tntech.edu
Title
Cited by
Cited by
Year
Efficient privacy-preserving data collection scheme for smart grid AMI networks
H Mohammed, S Tonyali, K Rabieh, M Mahmoud, K Akkaya
2016 IEEE Global Communications Conference (GLOBECOM), 1-6, 2016
492016
EPIC: Efficient privacy-preserving scheme with EtoE data integrity and authenticity for AMI networks
A Alsharif, M Nabil, S Tonyali, H Mohammed, M Mahmoud, K Akkaya
IEEE Internet of Things Journal 6 (2), 3309-3321, 2018
382018
Fusion-On-Field Security and Privacy Preservation for IoT Edge Devices: Concurrent Defense Against Multiple Types of Hardware Trojan Attacks
H Mohammed, SR Hasan, F Awwad
IEEE Access 8, 36847-36862, 2020
222020
A Stealthy Hardware Trojan Exploiting the Architectural Vulnerability of Deep Learning Architectures: Input Interception Attack (IIA)
TA Odetola, HR Mohammed, SR Hasan
arXiv preprint arXiv:1911.00783, 2019
202019
(HIADIoT): Hardware Intrinsic Attack Detection in Internet of Things; Leveraging Power Profiling
H Mohammed, TA Odetola, SR Hasan, S Stissi, I Garlin, F Awwad
2019 IEEE 62nd International Midwest Symposium on Circuits and Systems …, 2019
172019
FeSHI: Feature Map-Based Stealthy Hardware Intrinsic Attack
TA Odetola, F Khalid, H Mohammed, TC Sandefur, SR Hasan
IEEE Access 9, 115370-115387, 2021
122021
How Secure is Distributed Convolutional Neural Network on IoT Edge Devices?
H Mohammed, TA Odetola, SR Hasan
arXiv preprint arXiv:2006.09276, 2020
72020
Hardware Trojan Based Security Issues in Home Area Network: A Testbed Setup
H Mohammed, J Howell, SR Hasan, N Guo, F Khalid, O Elkeelany
2018 IEEE 61st International Midwest Symposium on Circuits and Systems …, 2018
72018
Covert Communication Channel Detection in Low-Power Battery Operated IoT Devices: Leveraging Power Profiles
J Shelley, H Mohammed, L Zink, SR Hasan, O Elkeelany
SoutheastCon 2018, 1-6, 2018
62018
Deployment of Object Detection Enhanced with Multi-label Multi-classification on Edge Device
O Oderhohwo, TA Odetola, H Mohammed, SR Hasan
2020 IEEE 63rd International Midwest Symposium on Circuits and Systems …, 2020
52020
An Edge Intelligence Framework for Resource Constrained Community Area Network
O Oderhohwo, H Mohammed, T Odetola, TN Guo, S Hasan, F Dogbe
2020 IEEE 63rd International Midwest Symposium on Circuits and Systems …, 2020
42020
Load Control and Privacy-Preserving Scheme for Data Collection in AMI Networks
H Mohammed, SR Hasan, MA Rahman
arXiv preprint arXiv:1807.11565, 2018
42018
Dynamic Distribution of Edge Intelligence at the Node Level for Internet of Things
H Mohammed, TA Odetola, N Guo, SR Hasan
2021 IEEE International Midwest Symposium on Circuits and Systems (MWSCAS …, 2021
22021
Collaborative Pipeline Using Opportunistic Mobile Resources via D2D for Computation-Intensive Tasks
TN Guo, H Mohammed, SR Hasan
arXiv preprint arXiv:2006.09301, 2020
22020
InTrust-IoT: Intelligent Ecosystem based on Power Profiling of Trusted device (s) in IoT for Hardware Trojan Detection
H Mohammed, F Khalid, P Sawyer, G Cataloni, SR Hasan
Workshop on Hardware and Architectural Support for Security and Privacy, 1-8, 2021
12021
Secure and Privacy Preserving Data Collection in Smart Grid AMI Networks
HR Mohammed
Tennessee Technological University, 2017
12017
Edge Intelligence in Mobile Nodes: Opportunistic Pipeline via 5G D2D for On-site Sensing
TN Guo, H Mohammed, SR Hasan
2022 IEEE 96th Vehicular Technology Conference (VTC2022-Fall), 1-5, 2022
2022
Hardware Intrinsic Attacks on IoT Based Network: A Secure Edge Intelligence Perspective
HR Mohammed
Tennessee Technological University, 2021
2021
Anomaly Detection In IoT Devices Using Data Mining Techniques
TA Odetola, H Mohammed, SR Hasan, W Eberle
Proceedings of Student Research and Creative Inquiry Day 2, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–19