A malware detection approach using autoencoder in deep learning X Xing, X Jin, H Elahi, H Jiang, G Wang IEEE Access 10, 25696-25706, 2022 | 69 | 2022 |
A blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social internet of vehicles Z Liu, Y Xu, C Zhang, H Elahi, X Zhou Digital Communications and Networks 8 (6), 976-983, 2022 | 53 | 2022 |
A blockchain-based model migration approach for secure and sustainable federated learning in IoT systems C Zhang, Y Xu, H Elahi, D Zhang, Y Tan, J Chen, Y Zhang IEEE Internet of Things Journal 10 (8), 6574-6585, 2022 | 46 | 2022 |
A human-centered artificial intelligence approach for privacy protection of elderly App users in smart cities H Elahi, A Castiglione, G Wang, O Geman Neurocomputing 444, 189-202, 2021 | 38 | 2021 |
A malware detection approach using malware images and autoencoders X Jin, X Xing, H Elahi, G Wang, H Jiang 2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems …, 2020 | 34 | 2020 |
On transparency and accountability of smart assistants in smart cities H Elahi, G Wang, T Peng, J Chen Applied Sciences 9 (24), 5344, 2019 | 31 | 2019 |
Pleasure or pain? An evaluation of the costs and utilities of bloatware applications in android smartphones H Elahi, G Wang, J Chen Journal of Network and Computer Applications 157, 102578, 2020 | 19 | 2020 |
Smartphone bloatware: an overlooked privacy problem H Elahi, G Wang, X Li Security, Privacy, and Anonymity in Computation, Communication, and Storage …, 2017 | 18 | 2017 |
On the characterization and risk assessment of ai-powered mobile cloud applications H Elahi, G Wang, Y Xu, A Castiglione, Q Yan, MN Shehzad Computer Standards & Interfaces 78, 103538, 2021 | 16 | 2021 |
A soft robotic glove for assistance and rehabilitation of stroke affected patients MM Ullah, U Hafeez, MN Shehzad, MN Awais, H Elahi 2019 International Conference on Frontiers of Information Technology (FIT …, 2019 | 11 | 2019 |
Assessing privacy behaviors of smartphone users in the context of data over-collection problem: An exploratory study H Elahi, G Wang, D Xie 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2017 | 11 | 2017 |
A personalized search query generating method for safety-enhanced vehicle-to-people networks X Yan, J Zhang, H Elahi, M Jiang, H Gao IEEE Transactions on Vehicular Technology 70 (6), 5296-5307, 2021 | 9 | 2021 |
AI and its risks in android smartphones: A case of google smart assistant H Elahi, G Wang, T Peng, J Chen Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th …, 2019 | 8 | 2019 |
A light-weight framework for pre-submission vetting of android applications in app stores B Li, G Wang, H Elahi, G Duan Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th …, 2019 | 5 | 2019 |
Portable non-invasive device for measuring saturated oxygen of the blood O Geman, I Chiuchisan, V Balas, G Wang, M Arif, H Elahi, P Tao Soft Computing Applications: Proceedings of the 8th International Workshop …, 2021 | 4 | 2021 |
Recent Healthcare Information Breaches and their Lessons H Elahi, O Geman Archives of Surgical Research 1 (4), 17-23, 2020 | 4 | 2020 |
A participatory privacy protection framework for smart-phone application default settings H Elahi, G Wang Security in Computing and Communications: 6th International Symposium, SSCC …, 2019 | 4 | 2019 |
A Hybridly Optimized LSTM‐Based Data Flow Prediction Model for Dependable Online Ticketing C Fan, J Zhu, H Elahi, L Yang, B Li Wireless Communications and Mobile Computing 2021 (1), 9951607, 2021 | 2 | 2021 |
Forward-porting and its limitations in fuzzer evaluation H Elahi, G Wang Information Sciences 662, 120142, 2024 | 1 | 2024 |
A Qualitative Study of App Acquisition and Management H Elahi, G Wang, W Jiang, A Bartel, Y Le Traon IEEE Transactions on Computational Social Systems, 2023 | 1 | 2023 |