default search action
Haroon Elahi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j11]Haroon Elahi, Guojun Wang:
Forward-porting and its limitations in fuzzer evaluation. Inf. Sci. 662: 120142 (2024) - [j10]Haroon Elahi, Guojun Wang, Wenjun Jiang, Alexandre Bartel, Yves Le Traon:
A Qualitative Study of App Acquisition and Management. IEEE Trans. Comput. Soc. Syst. 11(2): 1907-1925 (2024) - 2023
- [j9]Cheng Zhang, Yang Xu, Haroon Elahi, Deyu Zhang, Yunlin Tan, Junxian Chen, Yaoxue Zhang:
A Blockchain-Based Model Migration Approach for Secure and Sustainable Federated Learning in IoT Systems. IEEE Internet Things J. 10(8, April 15): 6574-6585 (2023) - 2022
- [j8]Xiaofei Xing, Xiang Jin, Haroon Elahi, Hai Jiang, Guojun Wang:
A Malware Detection Approach Using Autoencoder in Deep Learning. IEEE Access 10: 25696-25706 (2022) - [j7]Song Wang, Haroon Elahi, Yanzhu Hu, Yixin Zhang, Jiao Wang:
A botnets control strategy based on variable forgetting rate of control commands. Concurr. Comput. Pract. Exp. 34(7) (2022) - [j6]Ziming Liu, Yang Xu, Cheng Zhang, Haroon Elahi, Xiaokang Zhou:
A blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social internet of vehicles. Digit. Commun. Networks 8(6): 976-983 (2022) - 2021
- [j5]Haroon Elahi, Guojun Wang, Yang Xu, Aniello Castiglione, Qiben Yan, Muhammad Naeem Shehzad:
On the Characterization and Risk Assessment of AI-Powered Mobile Cloud Applications. Comput. Stand. Interfaces 78: 103538 (2021) - [j4]Haroon Elahi, Aniello Castiglione, Guojun Wang, Oana Geman:
A human-centered artificial intelligence approach for privacy protection of elderly App users in smart cities. Neurocomputing 444: 189-202 (2021) - [j3]Xiaodan Yan, Jiwei Zhang, Haroon Elahi, Meiyi Jiang, Hui Gao:
A Personalized Search Query Generating Method for Safety-Enhanced Vehicle-to-People Networks. IEEE Trans. Veh. Technol. 70(6): 5296-5307 (2021) - [j2]Chunmei Fan, Jiansheng Zhu, Haroon Elahi, Lipeng Yang, Beibei Li:
A Hybridly Optimized LSTM-Based Data Flow Prediction Model for Dependable Online Ticketing. Wirel. Commun. Mob. Comput. 2021: 9951607:1-9951607:13 (2021) - 2020
- [j1]Haroon Elahi, Guojun Wang, Jianer Chen:
Pleasure or pain? An evaluation of the costs and utilities of bloatware applications in android smartphones. J. Netw. Comput. Appl. 157: 102578 (2020)
Conference and Workshop Papers
- 2022
- [c13]Irfan Ali, Muhammad Naeem Shehzad, Qaisar Bashir, Haroon Elahi, Muhammad Naeem Awais, Oana Geman, Pin Liu:
A Thermal-Aware Scheduling Algorithm for Reducing Thermal Risks in DAG-Based Applications in Cyber-Physical Systems. UbiSec 2022: 497-508 - 2020
- [c12]Min Li, Haroon Elahi, Shuhong Chen:
A Risk Analysis of Android Children's Apps. WISA 2020: 539-546 - [c11]Xiang Jin, Xiaofei Xing, Haroon Elahi, Guojun Wang, Hai Jiang:
A Malware Detection Approach Using Malware Images and Autoencoders. MASS 2020: 1-6 - [c10]Min Li, Haroon Elahi, Tao Peng, Fang Qi, Guojun Wang:
A Function-Centric Risk Assessment Approach for Android Applications. TrustCom 2020: 1187-1193 - 2019
- [c9]Haroon Elahi, Guojun Wang, Tao Peng, Jianer Chen:
AI and Its Risks in Android Smartphones: A Case of Google Smart Assistant. DependSys 2019: 341-355 - [c8]Boya Li, Guojun Wang, Haroon Elahi, Guihua Duan:
A Light-Weight Framework for Pre-submission Vetting of Android Applications in App Stores. DependSys 2019: 356-368 - [c7]Mir Muneeb Ullah, Uzair Hafeez, Muhammad Naeem Shehzad, Muhammad Naeem Awais, Haroon Elahi:
A Soft Robotic Glove for Assistance and Rehabilitation of Stroke Affected Patients. FIT 2019: 110-115 - 2018
- [c6]Oana Geman, Iuliana Chiuchisan, Valentina Emilia Balas, Guojun Wang, Muhammad Arif, Haroon Elahi, Tao Peng:
Portable Non-invasive Device for Measuring Saturated Oxygen of the Blood. SOFA (2) 2018: 457-462 - [c5]Iuliana Chiuchisan, Oana Geman, Valentina Emilia Balas, Guojun Wang, Muhammad Arif, Haroon Elahi, Tao Peng:
"Smart" Footwear for the Visually-Impaired People Based on Arduino Platform and Ultrasonic Sensors. SOFA (2) 2018: 463-468 - [c4]Haroon Elahi, Guojun Wang:
A Participatory Privacy Protection Framework for Smart-Phone Application Default Settings. SSCC 2018: 168-182 - 2017
- [c3]Haroon Elahi, Guojun Wang, Wei Zhang:
A Privacy-Aware Conceptual Framework for Coordination. ISPA/IUCC 2017: 190-197 - [c2]Haroon Elahi, Guojun Wang, Xu Li:
Smartphone Bloatware: An Overlooked Privacy Problem. SpaCCS 2017: 169-185 - [c1]Haroon Elahi, Guojun Wang, Dongqing Xie:
Assessing privacy behaviors of smartphone users in the context of data over-collection problem: An exploratory study. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-8
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-03 00:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint