Publications

Full articles in refereed publications:

  1. Changalvala, R., Fedoruk B., and Malik, H., “RADAR Data Integrity Verification Using 2D QIM-based Data Hiding,” Sensors, September 2020.

  2. Islam, R., Refat, R.-D., and Malik, H., “Graph-Based Intrusion Detection System for Controller Area Networks,” IEEE Transactions on Information Forensics and Security, Vol. September 2020.

  3. Lachtar, N., Elkhail, A.A., Bacha, A., and Malik, H., “A Cross-stack Approach Towards Defending Against Cryptojacking,” IEEE Computer Architecture Letters, Vol. (), 2020. DOI: 10.1109/LCA.2020.3017457

  4. R. Baumann*, Malik, K.M., Javed, A., Ball, A.*, Kujawa, B.*, and Malik, H., “Voice Spoofing Detection Corpus for Single and Multi-order Audio Replays,” Journal of Computer Speech and Language, Vol. (), 2020

  5. Malik, K.M., Javed, A., Malik, H., and Irtaza, A., “A Light-weight Replay Detection Framework for Voice Controlled IoT Devices,” IEEE Journal of Selected Topics in Signal Processing, Vol. (), 2020, DOI: 10.1109/JSTSP.2020.2999828

  6. Malik, H., Gjomemo, R., Venkatakrishnan, V.N., Ansari, R., and Irtaza, A., “Remote Check Truncation Systems: Vulnerability Analysis and Countermeasures,” IEEE Access, PP(99):1-1· March 2020 DOI: 10.1109/ACCESS.2020.2982620

  7. Hafeez, A., Ponnapalli, S., and Malik, H., “Exploiting Channel Distortion for Transmitter Identification for In-vehicle Network Security,” SAE International Journal of Transportation Cybersecurity and Privacy, Manuscript Number: JTCYBER-2019-0005, 2020

  8. Javed, A., Irtaza, A., Khalid, K.M., Malik, H., “A Decision Tree Framework for Shot Classification of Field Sports Videos,” J. of Supercomputing, vol. 76(9), pp. 7274 – 7267 January 2020, DOI: 10.1007/s11227-020-03155-8

  9. Changalvala, R., and Malik, H., “LiDAR Data Integrity Verification for Autonomous Vehicle,” IEEE Access , 2019, DOI: 10.1109/ACCESS.2019.2943207

  10. Avatefipour, O., Papari, B., Kavousi-Fard, A., and Malik, H., “An Intelligent Secured Framework for Cyberattack Detection in Electric Vehicles CAN Bus Using Machine Learning,” IEEE Access, 2019. DOI: 10.1109/ACCESS.2019.2937576

  11. Javed, A., Irtaza, A., Khaliq, Y., Malik, H., and, Mahmood, M.T., “Replay and key-events detection for sports video summarization using confined elliptical local ternary patterns and extreme learning machine,” Applied Intelligence, 2019, DOI: https://doi.org/10.1007/s10489-019-01410-x

  12. Javed, A., Irtaza, A., Bajwa, K.B., Malik, H., and Mahmood M.T., “Decision tree analysis of cricket videos: a multimedia approach for video summarization,” IET Image Processing, 2018 [pdf][slidesppt].

  13. Nasir, M.H., Javed, A., Irtaza, A., Malik, H., and Mahmood, M.T., “Event Detection and Summarization of Cricket Videos,” J. of Image and Graphics, vol. 6, no. 1, pp. 27-32, June 2018. doi: 10.18178/joig.6.1.27-32

  14. Malik, K.M., Anjum, M.S., Malik, H., Malik, G.M., Soltanian-Zadeh, H., “ISADAQ: A novel framework for intracranial saccular aneurysm detection and quantification using morphological analysis of cerebral angiograms,” IEEE Access, 2018. DOI: 10.1109/ACCESS.2018.2799307

  15. Avatefipour, O., and Malik, H., “State-of-the-art survey on in-vehicle network communication “CAN-bus” security and vulnerabilities,” Int. J. of Computer Science and Network, Vol. 6(6), December 2017.

  16. Elzaghir, W., Yi Zhang, Y., Natarajan, N., Massey, F., Mi, C., and Malik, H., “Control of a hybrid electric vehicle with dual clutch transmission configurations during mode transition,” Int. Journal of Electric and Hybrid Vehicles, 2017.

  17. Khan, M.K., Zakariah, M., Malik H., and Choo, K.-K. R., “A novel audio forensic dataset for digital multimedia forensics,” Australian Journal of Forensic Sciences, http://dx.doi.org/10.1080/00450618.2017.1296186, March 2017.

  18. Zakariah, M., Khan, M.K., and Malik H., “Digital multimedia audio forensics: past, present and future,” Springer Journal on Multimedia Tools and Applications, DOI: 10.1007/s11042-016-4277-2, January, 2017.

  19. Dilpazir, H., Muhammad, Z., Minhas, Q., Ahmed, F., Malik, H., and Mahmood, H., “Multivariate mutual information for audio-video fusion” Springer Journal on Signal, Image and Video Processing, pp. 1863 – 1703, 2016.

  20. Javed, A., Bajwa, K., Malik, H., and Irtaza, A. “An Efficient framework for automatic highlights generation from sports videos,” IEEE Signal Processing Letters, vol. 23(7), pp. 954–958, 2016.

  21. Zhao, H., Chen, Y., Wang, R., and Malik, H., “Audio Splicing Detection and Localization using Environmental Signature,” Springer Journal on Multimedia Tools and Applications, June 2017, Volume 76, Issue 12, pp 13897–13927, DOI: 10.1007/s11042-016-3758-7

  22. Zhao, H., Chen, Y., Wang, R., and Malik, H., “Anti-Forensics of Environmental-Signature-Based Audio Splicing Detection and Its Countermeasure via Rich-features Classification,” IEEE Transactions on Information Forensics and Security, vol. 11(7), pp. 1603 – 1617, July 2016.

  23. Malik, H., Subbalakshmi, K.P., and Chandramouli, R., “Joint-Channel Modeling to Attack QIM Steganography,” Springer Journal on Multimedia Tools and Applications. DOI: 10.1007/s11042-015-3006-6, vol. 75, Issue 21, pp 13585–13611, Nov. 2015.

  24. Minhas, Q.A., Mahmood, H., and Malik, H. “Channel Selection for Simultaneous Move Game in Cognitive Radio Ad hoc Networks,” Springer Journal on Wireless Networks, doi: 10.1007/s11276-015-0952-x, SBN: 1022-0038, (Online), ISBN: 978-94-017-9803-7 (print), pp. 531 – 543, 2015.

  25. Malik, H., and Mahmood, H., “Acoustic Environment Identification using Unsupervised Learning,” Security Informatics: Thematic Series on Information Visualization and Visual Analytics for Crime Analysis and Prediction, Vol. 3(11), 2014.

  26. Abbas, M.M., Tawhid, M., Saleem, K., Zia, M., Saqib, M., Mahmood, H., and Malik, H., “Solar Energy Harvesting and Management in Wireless Sensor Network” International Journal of Distributed Sensor Networks, Special Issue: Recent Trends in Wireless Sensor Networks with Applications, Vol. 2014, Article ID 436107, 8 pages, 2014. doi:10.1155/2014/436107.

  27. Malik, H., “Acoustic Environment Identification and Its Applications to Audio Forensics,” IEEE Transactions on Information Forensics and Security, vol. 8(11), November 2013, pp. 1827 – 1837.

  28. Zhao, H., and Malik, H., “Audio Recording Location Identification using Acoustic Environment Signature,” IEEE Transactions on Information Forensics and Security, vol. 8(11), pp. 1746 – 1759, November 2013.

  29. Malik, H., Subbalakshmi, K. P., and Chandramouli, R., “Nonparametric Steganalysis of Quantization Index Modulation Based Data Hiding Using Approximate Entropy,” IEEE Transactions on Information Forensics and Security, vol. 7(2), pp. 418 – 431, April 2012.

  30. Malik, H., “Multimedia Social Networks: Behavior Forensics”, IEEE COMSOC MMTC R-Letter, Vol. 1(2), December 2010, pp. 10-11.

  31. Malik, H., “Blind Watermark Estimation Attack for Spread Spectrum Watermarking,” International Journal on Informatica: Special Issue on Multimedia Information System Security, vol. 33, March 2009, pp. 49 – 68.

  32. Malik, H., Khokhar, A., and Ansari, R., “Robust Audio Watermarking using Frequency Selective Spread Spectrum,” IEE (IET) Information Security, vol. 2(4), Dec. 2008, pp. 129 – 150.

  33. Malik, H., Khokhar, A., and Ansari, R., “Robust Data Hiding in Audio using Allpass Filter,” IEEE Transactions on Audio, Speech, and Language Processing, vol. 15 (4), May 2007, pp. 1296-1304.

  34. Bokhari, U., Malik, H., Sheikh, N., and Khan, I., “Automated Fingerprint Identification System,” Journal of IEEE/P, November 2002.

Refereed conference or symposium proceedings papers (Recent)

  1. Lachtar, N., Alkhail, A.A., Bacha, A., and Malik, H. “An Application Agnostic Defense Against the Dark Arts of Cryptojacking,” in the Proc. of IEEE/IFIP Int. Conf. on Dependable Systems and Networks (DSN), 2021.

  2. Refat, R.-D., Elkhail, A.A., Azeem, H., and Malik, H., “Detecting CAN bus intrusion by applying machine learning method to graph based features,” in Proc. of Intelligent Systems Conference (IntelliSys) 2021.

  3. Cheek, E., Khuttan, D. Changalvala, R., and Malik, H., “Physical Fingerprinting of Ultrasonic Sensors and Applications to Sensor Security,” in Proc. IEEE Int. Conf. on Dependability in Sensor, Cloud, and Big Data Systems and Applications 2020 (IEEE DependSys’20).

  4. Ibdah, D., Lachtar, N., Alkhail, A.R.A., Bacha, A., and Malik, H., “Dark Firmware: A Systematic Approach to Exploring Application Security Risks in the Presence of Untrusted Firmware,” in the Proc. of 23rd Int. Symposium on Research in Attacks, Intrusions and Defenses 2020 (RAID2020), Donostia / San Sebastian, Spain October 14-16, 2020

  5. Changalvala, R., and Malik, H., “Sensor Data Integrity Verification for Autonomous Vehicles Using Spread 3D Dither QIM,” in the Proc. of IEEE 92nd Vehicular Technology Conference 2020 (VTC2020)-Fall, Victoria, BC Canada, October 4 – 7, 2020.

  6. Hafeez, A., Rehman, K., and Malik, H., “State of the Art Survey on Comparison of Physical Fingerprinting-Based Intrusion Detection Techniques for In-Vehicle Security,” WCX SAE World Congress Experience, April, 2020.

  7. Irtaza, A., Nida, N., Javed, A., Malik, H., Malik, K.M., “Segmenting melanoma Lesion using Single Shot Detector (SSD) and Level Set Segmentation,” in Proc. of 13th Int. Conf. on Mathematics, Actuarial, Computer Science & Statistics (MACS 13), Karachi, Pakistan, December 14 – 15, 2019.

  8. Changalvala, R., and Malik, H., “LiDAR Data Integrity Verification for Autonomous Vehicle using 3D Data Hiding,” IEEE Computational Intelligence in Vehicles and Transportation Systems (CIVTS), Xiamen, China, December 6-9, 2019.

  9. Hafeez, A., Ponnapalli, S.C., and Malik, H., “Transmitter Identification for CAN protocol using channel distortion,” 7th Embedded Security in Cars (ESCar) USA, Ypsilanti, MI, June 12-13, 2019.

  10. Malik, H. and Changalvala, R., “Fighting AI with AI: Fake Speech Detection using Deep Learning,” in Proc. AES Int. Conf. Audio Forensics 2019, Porto, Portugal, June 18 – 20, 2019.

  11. Hafeez, A., Malik, K.M., and Malik, H., “Exploiting Frequency Response for the Identification of Microphone using Artificial Neural Networks,” in Proc. AES Int. Conf. Audio Forensics 2019, Porto, Portugal, June 18 – 20, 2019.

  12. Malik, H., “Securing Voice-driven Interfaces against Fake (Cloned) Audio Attacks,” in Proc. of 2nd IEEE Workshop on Fake Multimedia 2019 (FakeMM’19), San Jose, CA, March 28 – 30, 2019.

  13. Malik, K.M., Malik, H., and, Baumann, R.*, “Towards Vulnerability Analysis of Voice-Driven Interfaces and Countermeasures for Replay Attacks,” in Proc. of 2nd IEEE Workshop on Fake Multimedia 2019 (FakeMM’19), San Jose, CA, March 28 – 30, 2019.

  14. Shariff, S., Ahmad, Z., Alam, M.S., Malik, H., Ahmad, F., “Design and Optimization of Intelligent Transportation System for Smart Cities”, in Proc. of WCX SAE World Congress Experience Intelligent Transportation Systems (AE504), Detroit, MI, April 9 – 11, 2019.

  15. Anjum, M.S., Malik, K.M., Soltanian-Zadeh, H., Malik, H., and Malik, G.M., “Saccular Brain Aneurysm Detection and Multiclassifier Rupture Prediction Using Digital Subtraction and Magnetic Resonance Angiograms”, in Proc. of 5th Int. Conf. on Biomedical and Bioinformatics Engineering (ICBBE 2018), Okinawa, Japan during November 12-14, 2018.

  16. Tayyab, M., Hafeez, A., and Malik, H., “Spoofing Attack on Clock Based Intrusion Detection System in Controller Area Networks,” 2018 NDIA Ground Vehicle Systems Engineering and Technology Symposium, Modeling & Simulation, Testing and Validation (MSTV), Technical Session, Novi, MI, August 7-9, 2018.

  17. Tayyab, M., Hafeez, A., and Malik, H., “Clock Phishing Attack on Clock Based Intrusion Detection Systems for CAN Protocol,” in Proc. of 6th Embedded Security in Cars (ESCar) USA, Ypsilanti, MI, June 20-21, 2018.

  18. Avatefipour, O., Hafeez, A., Tayyab, M., and Malik, H., “Linking Received Packet to the Source Through Physical-Fingerprinting of CAN-bus,” IEEE Workshop in Information Forensics and Security 2017, Rennes, France.

  19. Hafeez, A., Malik, H., and Mahmood, K., “Performance of Blind Microphone Recognition Algorithms in the Presence of Anti-Forensic Attacks,”, in Proc. of AES Int. Conf. on Audio Forensics, Arlington, VA, June 15 – 17, 2017.

  20. Hussain, M.M., Alam, M.S., Beg M.M.S., and Malik, H., “A Risk Averse Business Model for Smart Charging of Electric Vehicles,” in Proc. Int. Conf. on Smart Systems, Innovation, and Computing, Jaipur, India, April 14 – 16, 2017.

  21. Mahmood, K., Sathyan, V., Kanaan, H., Malik, G.M., and Malik, H., “Autonomous Decentralized Privacy-Enabled Data Preparation Architecture for Multicenter Clinical Observational Research,” in Proc. of IEEE 13th Int. Symposium on Autonomous Decentralized Systems (ISADS), 2017.

  22. Javed, A., Irtaza, A., Bajwa, K.B., Malik, H., and Mahmood M.T., A Hybrid Approach for Summarization of Cricket Videos,” in Proc. of IEEE ICCE-Asia: Applied Intelligence for Smart Living and Smart Cities, Seoul, S. Korea, Oct. 26 – 28, 2016.

Chapters in books

  1. Mahmud, F., Minhas, Q.A., Mahmood, H., Muhammad, Z., and Malik, H., “Power Aware Virtual Path Routing Protocol for Cognitive Radio Ad Hoc Networks,” IAENG Transactions on Engineering Technologies, Special Volume of the World Congress on Engineering 2015, Springer Netherlands, ISBN: , 2015.

  2. Minhas, Q.A., Mahmood, H., and Malik, H., “The role of ad hoc networks in Mobile Telecommunications” in Recent Developments in Mobile Communications - A Multidisciplinary Approach, InTech, ISBN: 978-953-307-910-3, 2012.

  3. Dilpazir, H., Mahmood, H., Shah, T., and Malik, H., “Source Coding and Channel Coding for Mobile Multimedia Communications” in Mobile Multimedia - User and Technology Perspectives, InTech, ISBN: 978-953-307-908-0, 2012.

  4. Malik, H., “Critical Analysis of Digital Steganography,” in Handbook of Research on Secure Multimedia Distribution, Shiguo Lian (Ed.), Idea Group Inc., 2008

  5. Malik, H., Subbalakshmi, K. P., and Chandramouli, R., “Steganalysis: Trends and Challenges,” in Multimedia Forensics and Security, C-T. Li (Ed.), Idea Group Inc., 2008.