Contact:

Room 713,
ECE Building,
Bangladesh University of Engineering and Technology (BUET)
Dhaka - 1000, Bangladesh

Phone: 880-2-55167100/6208
Email: hossen_mustafa@iict.buet.ac.bd

Personal Website

Dr. Hossen Asiful Mustafa

Associate Professor

Research Interest

Wireless Networks, Network Security, Mobile Computing, Distributed Systems

Education

  • PhD in Computer Science and Engineering, University of South Carolina, 2014
  • Master of Engineering in Computer Science and Engineering, University of South Carolina, 2011
  • Bachelor of Science in Computer Science and Engineering, Bangladesh University of Engineering and Technology, 2005

Selected Publications

Journal Publications

  1. Rezaur Rahman, and Hossen Mustafa., Securing IPv6 Neighbor Discovery using Pre-Shared Key. Advances in Science, Technology and Engineering Systems Journal (ASTESJ), Vol. 2, Issue 2, Page No 722-732, Mar 2021.
  2. Md Mahedi Hasan, and Hossen Mustafa, Multi-level Features Fusion for Robust Pose-based Gait Recognition using RNN. International Journal of Computer Science and Information Security, IJCSIS ISSN 1947-5500, Pittsburgh, PA, USA, Volume 18 No. 1, Feb 2020.
  3. Md. Amirul Islam, and Hossen Mustafa, A Dynamic Reallocation Based Window Access Scheme for Enhancing QoS of Vehicular Ad-hoc Networks (VANETs). Advances in Science, Technology and Engineering Systems Journal (ASTESJ), Vol. 3, Issue 1, Page No 322-328, Jan 2018.
  4. Hossen Mustafa, and Hasan M Kafi, Design and Analysis of a Secure Three Factor User Authentication Scheme Using Biometric and Smart Card. International Journal of Computer Science and Information Security, Vol. 15 No. 6, Jul 2017.
  5. Hossen Mustafa, Wenyuan Xu, Ahmad-Reza Sadeghi, and Steffen Schulz, End-to-End Detection of Caller ID Spoofing Attacks. In IEEE Transactions on Dependable and Secure Computing (TDSC), Aug 2016.
  6. Mustafa, H., Zhang, X., Liu, Z., Xu, W., and Perrig, P., Jamming-Resilient Multipath Routing. IEEE Transactions on Dependable and Secure Computing (TDSC), Aug 2012.

Conference Publications

  1. Raihan-Al-Masud, M. and Mustafa, H., Network Intrusion Detection System Using Voting Ensemble Machine Learning.. The 3rd IEEE International Conference on Telecommunications and Photonics (ICTP), Dec 2019.
  2. Salahuddin Ahmed and Hossen Mustafa, A Secure QR Code System for Sharing Personal Confidential Information. In the Proceedings of The International Conference on Computer, Communication, Chemical, Material and Electronic Engineering (IC4ME2-2019), Jul 2019.
  3. Maoyejatun Hasana and Hossen Mustafa, A Multi-Channel Clustering based Anti-Jamming Technique for Wireless Sensor Networks by Localizing Jammer. In the Proceedings of the International Conference on Applications and Techniques in Information Science (iCATIS2019), Jan 2019.
  4. Farhad Hossain, Liakot Ali, Zahurul Islam and Hossen A Mustafa, A Direction-Sensitive Fall Detection System Using Single 3D Accelerometer and Learning Classifier. The International Conference on Medical Engineering, Health Informatics and Technology (MediTec), Dec 2016.
  5. Kar, G., Mustafa, H., Wang, Y., Chen, Y., Xu, W., Gruteser, M., and Vu, T., Detection of On-Road Vehicles Emanating GPS Interference. In Proceedings of the ACM Computer and Communication Security (CCS), Nov 2014.
  6. Mustafa, H., and Xu, W., CETAD: Detecting Evil Twin Access Point Attacks in Wireless Hotspots. In Proceedings of the 2nd IEEE Conference on Communications and Network Security (CNS), Oct 2014.
  7. Mustafa, H., Xu, W., Sadeghi, A., and Schulz, S., You Can Call But You Can’t Hide: Detecting Caller ID Spoofing Attacks. In Proceedings of the 44th IEEE International Conference on Dependable Systems and Networks (DSN), Atlanta, GA, Jun 2014.
  8. Clark, S., Mustafa, H., Ransford, R., Sorber, J., Fu, K., and Xu, W., Current Events: Identifying Webpages by Tapping the Electrical Outlet. In Proceedings of the European Symposium on Research in Computer Security (ESORICS), Egham, UK., Sep 2013.
  9. Zhang, X., Han, W., Fang, Z., Yin, Y., Mustafa, H., Role Mining Algorithm Evaluation and Improvement in Large Volume Android Applications. In AsiaCCS International Workshop on Security in Embedded Systems and Smartphones (SESP), Hangzhou, China, May 2013.
  10. Rouf, I., Mustafa, H., Xu, M., Miller, R., Xu, W., and Gruteser, M., Neighborhood Watch: Security and Privacy Analysis of Automatic Meter Reading Systems. In Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS), Raleigh NC, USA, Oct 2012.
  11. Schulz, S., Sadeghi, A., Zhdanova, M., Mustafa, H., Xu, W., and Varadharajan, V., Tetherway: A Framework for Tethering Camouflage. In Proceedings of the 5th ACM Conference on Wireless Network Security (WiSec), Tucson, Arizona, USA, Apr 2012.
  12. Mustafa, H., Zhang, X., Liu, Z., Xu, W., and Perrig, A., Jamming-Resilient Multipath Routing Leveraging Availability-Based Correlation. In Proceedings of the 4th ACM Conference on Wireless Network Security (WiSec), Hamburg, Germany., Jun 2011.
  13. Rouf, I., Miller, R., Mustafa, H., Taylor, T., Oh, S., Xu, W., Gruteser, M., Trappe, W., and Seskar, I., Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study. In Proceedings of the 19th USENIX Security Symposium, Washington DC, USA., Aug 2010.