Muhamad Shahzad is an Associate Professor in the Department of Computer Science at North Carolina State University (NCSU). He is also a member of the Networking Research Group at NCSU. His research interests lie in the broad areas of Networking, Internet of Things, and Security, with a focus on network measurements and modeling, RFID based systems, activity recognition, and user/device authentication.


Research Areas

  • Cyber Security
  • Embedded and Real-Time Systems
  • Graphics, Human Computer Interaction, & User Experience
  • Networking and Performance Evaluation


Ph.D., 2015, Michigan State University

CSC Spring Courses

  • CSC 573-001 LEC Internet Protocols   MW 4:30pm-5:45pm   Room: 1230 Engineering Building 2

  • CSC 573-604 LEC Internet Protocols      Room: Distance Education - Online

  • CSC 591-022 LEC SP Topic CSC - Internet of Things: Appl & Imp   MW 11:45am-1:00pm   Room: 1021 Engineering Building 2

  • CSC 791-022 LEC Advncd Topics CSC - Internet of Things: Appl & Imp   MW 11:45am-1:00pm   Room: 1021 Engineering Building 2


  • Best Poster Award, IIUG - 2017
  • Winner Virginia Tech Spectrum Sharing Radio Challenge - 2016
  • Fitch-Beach Outstanding Research Award - 2015
  • Outstanding Graduate Student Award - 2015


"Fairness Matters: Identification of Active RFID Tags with Statistically Guaranteed Fairness", ICNP 2015

"Understanding and Modeling of WiFi Signal Based Human Activity Recognition", MobiCom 2015  

"Keystroke Recognition Using WiFi Signals", MobiCom 2015

"Expecting the Unexpected: Fast and Reliable Detection of Missing RFID Tags in the Wild", INFOCOM 2015

"Noise Can Help: Accurate and Efficient Per-flow Latency Measurement without Packet Probing and Time Stamping", SIGMETRICS 2014

"Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures - You can see it but you can not do it", MobiCom 2013

"Probabilistic Optimal Tree Hopping for RFID Identification", SIGMETRICS 2013

"Every Bit Counts - Fast and Scalable RFID Estimation", MobiCom 2012

"A Large Scale Exploratory Analysis of Software Vulnerability Life Cycles", ICSE 2012