Follow
Syed W. Shah
Syed W. Shah
UNSW, Sydney/ Deakin University
Verified email at deakin.edu.au
Title
Cited by
Cited by
Year
Data augmentation and dense-LSTM for human activity recognition using WiFi signal
J Zhang, F Wu, B Wei, Q Zhang, H Huang, SW Shah, J Cheng
IEEE Internet of Things Journal 8 (6), 4628-4641, 2020
1102020
Zero trust architecture (zta): A comprehensive survey
NF Syed, SW Shah, A Shaghaghi, A Anwar, Z Baig, R Doss
IEEE Access 10, 57143-57179, 2022
802022
Recent trends in user authentication–a survey
SW Shah, SS Kanhere
IEEE access 7, 112505-112519, 2019
742019
Traceability in supply chains: A Cyber security analysis
NF Syed, SW Shah, R Trujillo-Rasua, R Doss
Computers & Security 112, 102536, 2022
352022
LCDA: Lightweight continuous device-to-device authentication for a zero trust architecture (ZTA)
SW Shah, NF Syed, A Shaghaghi, A Anwar, Z Baig, R Doss
Computers & Security 108, 102351, 2021
322021
Smart user identification using cardiopulmonary activity
SW Shah, SS Kanhere
Pervasive and Mobile Computing 58, 101024, 2019
142019
Wi-Auth: WiFi based second factor user authentication
SW Shah, SS Kanhere
Proceedings of the 14th EAI International Conference on Mobile and …, 2017
132017
Wi-sign: Device-free second factor user authentication
SW Shah, SS Kanhere
Proceedings of the 15th EAI International Conference on Mobile and …, 2018
122018
Wi-access: Second factor user authentication leveraging WiFi signals
SW Shah, SS Kanhere
2018 IEEE International Conference on Pervasive Computing and Communications …, 2018
92018
Towards a lightweight continuous authentication protocol for device-to-device communication
SWA Shah, NF Syed, A Shaghaghi, A Anwar, Z Baig, R Doss
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
82020
Weak-key analysis for bike post-quantum key encapsulation mechanism
MR Nosouhi, SW Shah, L Pan, Y Zolotavkin, A Nanda, P Gauravaram, ...
IEEE Transactions on Information Forensics and Security 18, 2160-2174, 2023
72023
Bit Flipping Key Encapsulation for the Post-Quantum Era
MR Nosouhi, SWA Shah, L Pan, R Doss
IEEE Access, 2023
32023
How hackers can use message mirroring apps to see all your SMS texts — and bypass 2FA security
RD Syed Wajid Ali Shah, Jongkil Jay Jeong
https://theconversation.com/how-hackers-can-use-message-mirroring-apps-to …, 2021
3*2021
VID: Human identification through vein patterns captured from commodity depth cameras
SW Shah, SS Kanhere, J Zhang, L Yao
IET Biometrics 10 (2), 142-162, 2021
32021
DU-QS22: A Dataset for analyzing QC-MDPC-based quantum-safe cryptosystems
MR Nosouhi, SW Shah, L Pan, R Doss
EAI International Conference on Applied Cryptography in Computer and …, 2022
22022
Echo-ID: Smart user identification leveraging inaudible sound signals
SWA Shah, A Shaghaghi, SS Kanhere, J Zhang, A Anwar, R Doss
IEEE Access 8, 194508-194522, 2020
22020
FPGA implementation of modern wireless communication system
SWA Shah, HS Okleh, AS Hussaini, RA Abd-Alhameed, JM Noras, ...
2012 IEEE 17th International Workshop on Computer Aided Modeling and Design …, 2012
22012
Towards Higher Levels of Assurance in Remote Identity Proofing
A Nanda, SWA Shah, JJ Jeong, R Doss, J Webb
IEEE Consumer Electronics Magazine, 2023
12023
A new zero-trust aided smart key authentication scheme in iov
Y Song, F Jiang, SWA Shah, R Doss
2022 IEEE International Conference on Pervasive Computing and Communications …, 2022
12022
Examining usable security features and user perceptions of Physical Authentication Devices
A Nanda, JJ Jeong, SWA Shah, M Nosouhi, R Doss
Computers & Security 139, 103664, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20