Raheem Beyah
Georgia Institute of Technology
H-index: 41
North America-United States
Top articles of Raheem Beyah
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Detect Insider Attacks in Industrial Cyber-physical Systems Using Multi-physical Features-based Fingerprinting | ACM Transactions on Sensor Networks | Zhen Hong Lingling Lu Dehua Zheng Jiahui Suo Peng Sun | 2024/1/9 |
{MINER}: A Hybrid {Data-Driven} Approach for {REST}{API} Fuzzing | Chenyang Lyu Jiacheng Xu Shouling Ji Xuhong Zhang Qinying Wang | 2023 | |
A Non-Invasive Circuit Breaker Arc Duration Measurement Method with Improved Robustness Based on Vibration–Sound Fusion and Convolutional Neural Network | Energies | Ning Guo Kevin Whitmore Morris Cohen Raheem Beyah Lukas Graber | 2023/9/12 |
LF Radio Receiver For Substation Intrusion Deterrent and Measurement Validation | Roderick Gray Morris Cohen Kevin Whitmore Lukas Graber Ning A Guo | 2023/7/16 | |
One bad apple spoils the barrel: Understanding the security risks introduced by third-party components in iot firmware | IEEE Transactions on Dependable and Secure Computing | Binbin Zhao Shouling Ji Jiacheng Xu Yuan Tian Qiuyang Wei | 2023/5/25 |
Trustworthy IAP: An Intelligent Applications Profiler to Investigate Vulnerabilities of Consumer Electronic Devices | IEEE Transactions on Consumer Electronics | Jie Su Zhen Hong Lei Ye Tao Liu Sizhuang Liang | 2023/12/27 |
Secure QR code system for distributed large payload transmissions for everyday use | 2023/4/6 | ||
Arc Duration Measurement of Vacuum Interrupter Based on Multi-sensor Fusion | Ning Guo Kevin Whitmore Samuel Neall Roderick Gray Morris Cohen | 2023/10/4 | |
{UVSCAN}: Detecting {Third-Party} Component Usage Violations in {IoT} Firmware | Binbin Zhao Shouling Ji Xuhong Zhang Yuan Tian Qinying Wang | 2023 | |
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices | arXiv preprint arXiv:2309.14742 | Qinying Wang Boyu Chang Shouling Ji Yuan Tian Xuhong Zhang | 2023/9/26 |
Hiding My Real Self! Protecting Intellectual Property in Additive Manufacturing Systems Against Optical Side-Channel Attacks. | Sizhuang Liang Saman A Zonouz Raheem Beyah | 2022 | |
Multi‐Color 3D Printing via Single‐Vat Grayscale Digital Light Processing | Advanced Functional Materials | Xirui Peng Liang Yue Sizhuang Liang Stuart Montgomery Chunliang Lu | 2022/7 |
{MaDIoT} 2.0: Modern {High-Wattage}{IoT} botnet attacks and defenses | Tohid Shekari Alvaro A Cardenas Raheem Beyah | 2022 | |
Simulation and Measurement of the Magnetic Field Signature of a Vacuum Circuit Breaker and the Identification of Arcing | Ning Guo Kevin Whitmore Morris Cohen Tohid Shekari Raheem Beyah | 2022/10/23 | |
Magnetic Signature of Vacuum Interrupters during Load Switching | Ning Guo Kevin Whitmore Morris Cohen Tohid Shekari Raheem Beyah | 2022/6/19 | |
DetectS ec: Evaluating the robustness of object detection models to adversarial attacks | International Journal of Intelligent Systems | Tianyu Du Shouling Ji Bo Wang Sirui He Jinfeng Li | 2022/9 |
Transfer attacks revisited: A large-scale empirical study in real computer vision settings | Yuhao Mao Chong Fu Saizhuo Wang Shouling Ji Xuhong Zhang | 2022/5 | |
Fraud-agents detection in online microfinance: A large-scale empirical study | IEEE Transactions on Dependable and Secure Computing | Yiming Wu Zhiyuan Xie Shouling Ji Zhenguang Liu Xuhong Zhang | 2022/2/14 |
A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware | Binbin Zhao Shouling Ji Jiacheng Xu Yuan Tian Qiuyang Wei | 2022/7/18 | |
EMS: History-Driven Mutation for Coverage-based Fuzzing. | Chenyang Lyu Shouling Ji Xuhong Zhang Hong Liang Binbin Zhao | 2022/2 |