Follow
Haroon Elahi
Haroon Elahi
Sustech
Verified email at sustech.edu.cn
Title
Cited by
Cited by
Year
A malware detection approach using autoencoder in deep learning
X Xing, X Jin, H Elahi, H Jiang, G Wang
IEEE Access 10, 25696-25706, 2022
692022
A blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social internet of vehicles
Z Liu, Y Xu, C Zhang, H Elahi, X Zhou
Digital Communications and Networks 8 (6), 976-983, 2022
532022
A blockchain-based model migration approach for secure and sustainable federated learning in IoT systems
C Zhang, Y Xu, H Elahi, D Zhang, Y Tan, J Chen, Y Zhang
IEEE Internet of Things Journal 10 (8), 6574-6585, 2022
462022
A human-centered artificial intelligence approach for privacy protection of elderly App users in smart cities
H Elahi, A Castiglione, G Wang, O Geman
Neurocomputing 444, 189-202, 2021
382021
A malware detection approach using malware images and autoencoders
X Jin, X Xing, H Elahi, G Wang, H Jiang
2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems …, 2020
342020
On transparency and accountability of smart assistants in smart cities
H Elahi, G Wang, T Peng, J Chen
Applied Sciences 9 (24), 5344, 2019
312019
Pleasure or pain? An evaluation of the costs and utilities of bloatware applications in android smartphones
H Elahi, G Wang, J Chen
Journal of Network and Computer Applications 157, 102578, 2020
192020
Smartphone bloatware: an overlooked privacy problem
H Elahi, G Wang, X Li
Security, Privacy, and Anonymity in Computation, Communication, and Storage …, 2017
182017
On the characterization and risk assessment of ai-powered mobile cloud applications
H Elahi, G Wang, Y Xu, A Castiglione, Q Yan, MN Shehzad
Computer Standards & Interfaces 78, 103538, 2021
162021
A soft robotic glove for assistance and rehabilitation of stroke affected patients
MM Ullah, U Hafeez, MN Shehzad, MN Awais, H Elahi
2019 International Conference on Frontiers of Information Technology (FIT …, 2019
112019
Assessing privacy behaviors of smartphone users in the context of data over-collection problem: An exploratory study
H Elahi, G Wang, D Xie
2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2017
112017
A personalized search query generating method for safety-enhanced vehicle-to-people networks
X Yan, J Zhang, H Elahi, M Jiang, H Gao
IEEE Transactions on Vehicular Technology 70 (6), 5296-5307, 2021
92021
AI and its risks in android smartphones: A case of google smart assistant
H Elahi, G Wang, T Peng, J Chen
Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th …, 2019
82019
A light-weight framework for pre-submission vetting of android applications in app stores
B Li, G Wang, H Elahi, G Duan
Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th …, 2019
52019
Portable non-invasive device for measuring saturated oxygen of the blood
O Geman, I Chiuchisan, V Balas, G Wang, M Arif, H Elahi, P Tao
Soft Computing Applications: Proceedings of the 8th International Workshop …, 2021
42021
Recent Healthcare Information Breaches and their Lessons
H Elahi, O Geman
Archives of Surgical Research 1 (4), 17-23, 2020
42020
A participatory privacy protection framework for smart-phone application default settings
H Elahi, G Wang
Security in Computing and Communications: 6th International Symposium, SSCC …, 2019
42019
A Hybridly Optimized LSTM‐Based Data Flow Prediction Model for Dependable Online Ticketing
C Fan, J Zhu, H Elahi, L Yang, B Li
Wireless Communications and Mobile Computing 2021 (1), 9951607, 2021
22021
Forward-porting and its limitations in fuzzer evaluation
H Elahi, G Wang
Information Sciences 662, 120142, 2024
12024
A Qualitative Study of App Acquisition and Management
H Elahi, G Wang, W Jiang, A Bartel, Y Le Traon
IEEE Transactions on Computational Social Systems, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20