What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Mohammad Ashiqur Rahman
Google Scholar
ORCID:
0000-0002-2963-7430
28
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
SHEATH: Defending Horizontal Collaboration for Distributed CNNs Against Adversarial Noise.
Muneeba Asif
Mohammad Kumail Kazmi
Mohammad Ashiqur Rahman
Syed Rafay Hasan
Soamar Homsi
2025
conf/dsn
"I will always be by your side": A Side-Channel Aided PWM-based Holistic Attack Recovery for Unmanned Aerial Vehicles.
Muneeba Asif
Jean C. Tonday Rodriguez
Mohammad Kumail Kazmi
Mohammad Ashiqur Rahman
Kemal Akkaya
2024
journals/compsec
Formal threat analysis of machine learning-based control systems: A study on smart healthcare systems.
Nur Imtiazul Haque
Mohammad Ashiqur Rahman
A. Selcuk Uluagac
2024
conf/asiaccs
ConFIDe: A PWM-Driven Control-Fused Intrusion Detection System for Hardware Security in Unmanned Aerial Vehicles.
Muneeba Asif
Mohammad Ashiqur Rahman
Kemal Akkaya
Ahmad Mohammad
2024
conf/dsn
PAROLE: Profitable Arbitrage in Optimistic Rollup with ERC-721 Token Transactions.
Alvi Ataur Khalil
Mohammad Ashiqur Rahman
2023
journals/tifs
Optimal False Data Injection Attack Against Load-Frequency Control in Power Systems.
Mohamadsaleh Jafari
Mohammad Ashiqur Rahman
Sumit Paudyal
2023
conf/cns
SHIP: Securing Hashed Timelock Contracts in Payment Channel Networks.
Alvi Ataur Khalil
Mohammad Ashiqur Rahman
2023
conf/cns
FAKEY: Fake Hashed Key Attack on Payment Channel Networks.
Alvi Ataur Khalil
Mohammad Ashiqur Rahman
Hisham A. Kholidy
2023
conf/dsn
SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems.
Nur Imtiazul Haque
Maurice Ngouen
Mohammad Ashiqur Rahman
A. Selcuk Uluagac
Laurent Njilla
2022
conf/ccs
Poster: A Novel Formal Threat Analyzer for Activity Monitoring-based Smart Home Heating, Ventilation, and Cooling Control System.
Nur Imtiazul Haque
Maurice Ngouen
Yazen Al-Wahadneh
Mohammad Ashiqur Rahman
2021
conf/cns
iAttackGen: Generative Synthesis of False Data Injection Attacks in Cyber-physical Systems.
Md Hasan Shahriar
Alvi Ataur Khalil
Mohammad Ashiqur Rahman
Mohammad Hossein Manshaei
Dong Chen
2020
journals/istr
A game-theoretic analysis to defend against remote operating system fingerprinting.
Mohammad Ashiqur Rahman
Md. Golam Moula Mehedi Hasan
Mohammad Hossein Manshaei
Ehab Al-Shaer
2020
journals/istr
A signaling game approach to mitigate co-resident attacks in an IaaS cloud environment.
Md. Golam Moula Mehedi Hasan
Mohammad Ashiqur Rahman
2020
conf/dsn
On Incentive Compatible Role-Based Reward Distribution in Algorand.
Mehdi Fooladgar
Mohammad Hossein Manshaei
Murtuza Jadliwala
Mohammad Ashiqur Rahman
2019
journals/compsec
Security design against stealthy attacks on power system state estimation: A formal approach.
Mohammad Ashiqur Rahman
Amarjit Datta
Ehab Al-Shaer
2019
conf/cns
Safety Analysis of AMI Networks Through Smart Fraud Detection.
A. H. M. Jakaria
Mohammad Ashiqur Rahman
Md. Golam Moula Mehedi Hasan
2019
conf/wisec
False data injection attacks against contingency analysis in power grids: poster.
Mohammad Ashiqur Rahman
Md Hasan Shahriar
Rahat Masum
2017
journals/compsec
Data-driven analytics for cyber-threat intelligence and information sharing.
Sara Qamar
Zahid Anwar
Mohammad Ashiqur Rahman
Ehab Al-Shaer
Bei-tseng Chu
2017
conf/ccs
Cyber Threat Analysis Framework for the Wind Energy Based Power System.
Amarjit Datta
Mohammad Ashiqur Rahman
2016
conf/cns
Automated synthesis of resiliency configurations for cyber networks.
Mohammad Ashiqur Rahman
Abdullah Al Farooq
Amarjit Datta
Ehab Al-Shaer
2016
conf/cns
IoTSAT: A formal framework for security analysis of the internet of things (IoT).
Mujahid Mohsin
Zahid Anwar
Ghaith Husari
Ehab Al-Shaer
Mohammad Ashiqur Rahman
2016
conf/dsn
Formal Analysis for Dependable Supervisory Control and Data Acquisition in Smart Grids.
Mohammad Ashiqur Rahman
A. H. M. Jakaria
Ehab Al-Shaer
2015
conf/ccs
SafeConfig 2015: Workshop on Automated Decision Making for Active Cyber Defense.
Ehab Al-Shaer
Christopher S. Oehmen
Mohammad Ashiqur Rahman
2014
conf/ccs
Moving Target Defense for Hardening the Security of the Power System State Estimation.
Mohammad Ashiqur Rahman
Ehab Al-Shaer
Rakesh B. Bobba
2014
conf/dsn
Security Threat Analytics and Countermeasure Synthesis for Power System State Estimation.
Mohammad Ashiqur Rahman
Ehab Al-Shaer
Rajesh G. Kavasseri
2013
conf/ccs
A formal model for sustainable vehicle-to-grid management.
Mohammad Ashiqur Rahman
Fadi Mohsen
Ehab Al-Shaer
2013
conf/cns
A game-theoretic approach for deceiving Remote Operating System Fingerprinting.
Mohammad Ashiqur Rahman
Mohammad Hossein Manshaei
Ehab Al-Shaer
2013
conf/ndss
Metrics for Automated Network Security Design.
Mohammad Ashiqur Rahman
Ehab Al-Shaer
Coauthors
A. H. M. Jakaria
(2)
A. Selcuk Uluagac
(2)
Abdullah Al Farooq
(1)
Ahmad Mohammad
(1)
Alvi Ataur Khalil
(4)
Amarjit Datta
(3)
Bei-tseng Chu
(1)
Christopher S. Oehmen
(1)
Dong Chen
(1)
Ehab Al-Shaer
(12)
Fadi Mohsen
(1)
Ghaith Husari
(1)
Hisham A. Kholidy
(1)
Jean C. Tonday Rodriguez
(1)
Kemal Akkaya
(2)
Laurent Njilla
(1)
Maurice Ngouen
(2)
Md Hasan Shahriar
(2)
Md. Golam Moula Mehedi Hasan
(3)
Mehdi Fooladgar
(1)
Mohamadsaleh Jafari
(1)
Mohammad Ashiqur Rahman
(28)
Mohammad Hossein Manshaei
(4)
Mohammad Kumail Kazmi
(2)
Mujahid Mohsin
(1)
Muneeba Asif
(3)
Murtuza Jadliwala
(1)
Nur Imtiazul Haque
(3)
Rahat Masum
(1)
Rajesh G. Kavasseri
(1)
Rakesh B. Bobba
(1)
Sara Qamar
(1)
Soamar Homsi
(1)
Sumit Paudyal
(1)
Syed Rafay Hasan
(1)
Yazen Al-Wahadneh
(1)
Zahid Anwar
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to