Dr Syed Wajid Ali Shah

STAFF PROFILE

Position

Research Fellow, Authentication Technologies

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Melbourne Burwood Campus

Qualifications

Doctor of Philosophy, University of New South Wales, 2019

Contact

syed.shah@deakin.edu.au
+61 3 924 46097

Research interests

User authentication, Internet of Things, signal processing, data analytics, privacy, and security.

Publications

Filter by

2024

Towards Higher Levels of Assurance in Remote Identity Proofing

Ashish Nanda, Syed Shah, Jongkil Jeong, Robin Doss, Jeb Webb

(2024), Vol. 13, pp. 62-71, IEEE Consumer Electronics Magazine, Piscataway, N.J., C1

journal article

Examining usable security features and user perceptions of Physical Authentication Devices

A Nanda, J Jeong, S Shah, M Nosouhi, R Doss

(2024), Vol. 139, pp. 103664-103664, Computers and Security, C1

journal article
2023

Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism

M Nosouhi, S Shah, L Pan, Y Zolotavkin, A Nanda, P Gauravaram, R Doss

(2023), Vol. 18, pp. 2160-2174, IEEE Transactions on Information Forensics and Security, C1

journal article

Bit Flipping Key Encapsulation for the Post-Quantum Era

M Nosouhi, S Shah, L Pan, R Doss

(2023), Vol. 11, pp. 56181-56195, IEEE Access, C1

journal article

SoK: On Efficacy of the BGF Decoder for QC-MDPC-based Quantum-Safe Cryptosystems

Syed Shah, Mohammad Nosouhi, Lei Pan, Robin Doss

(2023), pp. 1-8, APKC '23 : Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop, Melbourne, Vic., E1

conference
2022

Traceability in Supply Chains: A Cyber Security Analysis

Naeem Syed, Syed Shah, Rolando Trujillo Rasua, Robin Doss

(2022), Vol. 112, Computers and Security, C1

journal article

A New Zero-Trust Aided Smart Key Authentication Scheme in IoV

Y Song, F Jiang, S Ali Shah, R Doss

(2022), pp. 630-636, Proceedings of the IEEE Conference on Pervasive Computing and Communications 2022 Conference, Workshops and other Affiliated Events, Pisa, Italy, E1

conference

DU-QS22: A Dataset for Analyzing QC-MDPC-Based Quantum-Safe Cryptosystems

M Nosouhi, S Shah, L Pan, R Doss

(2022), Vol. 448, pp. 3-10, AC3 2022 : Proceedings of the EAI International Conference on Applied Cryptography in Computer and Communications 2022, Virtual Event, E1

conference
2021

Data Augmentation and Dense-LSTM for Human Activity Recognition Using WiFi Signal

J Zhang, F Wu, B Wei, Q Zhang, H Huang, S Shah, J Cheng

(2021), Vol. 8, pp. 4628-4641, IEEE Internet of Things Journal, Piscataway, N.J., C1

journal article

LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)

S Shah, N Syed, A Shaghaghi, A Anwar, Z Baig, R Doss

(2021), Vol. 108, Computers and Security, C1

journal article

VID: Human identification through vein patterns captured from commodity depth cameras

S Shah, S Kanhere, J Zhang, L Yao

(2021), Vol. 10, pp. 142-162, IET Biometrics, Piscataway, N.J., C1-1

journal article
2020

Echo-id: Smart user identification leveraging inaudible sound signals

S Ali Shah, A Shaghaghi, S Kanhere, J Zhang, A Anwar, R Doss

(2020), Vol. 8, pp. 194508-194522, IEEE Access, C1

journal article

Towards a lightweight continuous authentication protocol for device-to-device communication

S Shah, N Syed, A Shaghaghi, A Anwar, Z Baig, R Doss

(2020), pp. 1119-1126, Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, E1

conference
2019

Recent trends in user authentication - a survey

S Shah, S Kanhere

(2019), Vol. 7, pp. 112505-112519, IEEE access, Piscataway, N.J., C1-1

journal article

Smart user identification using cardiopulmonary activity

S Shah, S Kanhere

(2019), Vol. 58, pp. 1-20, Pervasive and Mobile Computing, Amsterdam, The Netherlands, C1-1

journal article
2018

Wi-Sign: Device-free second factor user authentication

S Shah, S Kanhere

(2018), pp. 135-144, MobiQuitous 2018 : Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, New York, N.Y., E1-1

conference

Wi-Access: Second Factor User Authentication leveraging WiFi Signals

S Shah, S Kanhere

(2018), pp. 330-335, PerCom 2018 : Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, Athens, Greece, E1-1

conference
2017

Wi-auth: WiFi based second factor user authentication

S Shah, S Kanhere

(2017), pp. 393-402, MobiQuitous 2017 : Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Melbourne, Victoria, E1-1

conference

Funded Projects at Deakin

Other Funding Sources

Socrates: Software Security with a focus on critical technologies.

A/Prof Lei Pan, Dr Syed Wajid Ali Shah, Prof Robin Ram Mohan Doss, Dr Zubair Baig, Prof Jemal Abawajy, Prof Shiri Krebs, Dr Jayson Lamchek, Dr Shamsul Huda, Dr Muna Al-Hawawreh, Dr Naeem Syed, Dr Jack Li, Dr Ye Zhu, Dr Frank Jiang, A/Prof William Yeoh, Prof Chang-Tsun Li, A/Prof Lennon Chang, Prof Patrick Emerton, Dr Hourieh Khalajzadeh, Dr Van-Hau Trieu, Dr Yanjun Zhang, Dr Leo Zhang

Cyber Security Research Centre Limited

  • 2024: $30,244
  • 2023: $120,976

Supervisions

No completed student supervisions to report