default search action
Hossain Shahriar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c213]Priyanka Bhyregowda, Mohammad Masum, Lohuwa Mamudu, Mohammed Chowdhurv, Sai Chandra Kosaraiu, Hossain Shahriar:
ActivePCA: A Novel Framework Integrating PCA and Active Machine Learning for Efficient Dimension Reduction. COMPSAC 2024: 320-325 - [c212]Mst. Shapna Akter, Hossain Shahriar, Alfredo Cuzzocrea, Fan Wu:
Uncovering the Interpretation of Large Language Models. COMPSAC 2024: 1057-1066 - [c211]Md. Abdur Rahman, Mst. Shapna Akter, Emily Miller, Bogdan Timofti, Hossain Shahriar, Mohammad Masum, Fan Wu:
Fine-Tuned Variational Quantum Classifiers for Cyber Attacks Detection Based on Parameterized Quantum Circuits and Optimizers. COMPSAC 2024: 1067-1072 - [c210]Mst. Shapna Akter, Hossain Shahriar, Alfredo Cuzzocrea, Fan Wu:
Quantum Adversarial Attacks: Developing Quantum FGSM Algorithm. COMPSAC 2024: 1073-1079 - [c209]Chase Lamkin, Mst. Shapna Akter, Hossain Shahriar, Guillermo Francia:
Architecture Design and Implementation of a Security Threat Data Sharing Platform. COMPSAC 2024: 1502-1503 - [c208]Mst. Shapna Akter, Md. Abdur Rahman, Md. Mostafizur Rahman, Juanjose Rodriguez-Cardenas, Hossain Shahriar, Fan Wu, Muhammad Rahman:
Authentic Learning Approach for Data Poisoning Vulnerability in LLMs. COMPSAC 2024: 1504-1505 - [c207]Sainath Veerla, Anbu Valluvan Devadasan, Mohammad Masum, Mohammed Chowdhury, Hossain Shahriar:
E-SMOTE: Entropy Based Minority Oversampling for Heart Failure and AIDS Clinical Trails Analysis. COMPSAC 2024: 1841-1846 - [c206]Md. Mostafizur Rahman, Abdul Barek, Mst. Shapna Akter, ABM Kamrul Islam Riad, Md. Abdur Rahman, Hossain Shahriar, Akond Rahman, Fan Wu:
Authentic Learning on DevOps Security with Labware: Git Hooks To Facilitate Automated Security Static Analysis. COMPSAC 2024: 2418-2423 - [c205]Abdul Barek, Md. Mostafizur Rahman, Mst. Shapna Akter, ABM Kamrul Islam Riad, Md. Abdur Rahman, Hossain Shahriar, Akond Rahman, Fan Wu:
Mitigating Insecure Outputs in Large Language Models(LLMs): A Practical Educational Module. COMPSAC 2024: 2424-2429 - [c204]ABM Kamrul Islam Riad, Abdul Barek, Md. Mostafizur Rahman, Mst. Shapna Akter, Tahia Islam, Md. Abdur Rahman, Md Raihan Mia, Hossain Shahriar, Fan Wu, Sheikh Iqbal Ahamed:
Enhancing HIPAA Compliance in AI-driven mHealth Devices Security and Privacy. COMPSAC 2024: 2430-2435 - [c203]Momotaz Begum, Mehedi Hasan Shuvo, Md. Golam Mostofa, ABM Kamrul Islam Riad, Md Arabin Islam Talukder, Mst. Shapna Akter, Hossain Shahriar:
M-DBSCAN: Modified DBSCAN Clustering Algorithm for Detecting and Controlling Outliers. SAC 2024: 1034-1035 - [c202]Alvaro Alva, Luis Martinez Moreno, Muneeba Asif, Alvi Ataur Khalil, Mohammad Ashiqur Rahman, Alfredo Cuzzocrea, Hossain Shahriar:
Secured UAV Navigation: A Novel Intrusion Detection System Based on PWM Signal Analysis. SDS 2024: 174-180 - [c201]Mst. Shapna Akter, Hossain Shahriar, Alfredo Cuzzocrea:
Towards Analysis and Interpretation of Large Language Models for Arithmetic Reasoning. SDS 2024: 267-270 - [c200]Akond Rahman, Yue Zhang, Fan Wu, Hossain Shahriar:
Student Perceptions of Authentic Learning to Learn White-box Testing. SIGCSE (2) 2024: 1784-1785 - [e7]Hossain Shahriar, Hiroyuki Ohsaki, Moushumi Sharmin, Dave Towey, A. K. M. Jahangir Alam Majumder, Yoshiaki Hori, Ji-Jiang Yang, Michiharu Takemoto, Nazmus Sakib, Ryohei Banno, Sheikh Iqbal Ahamed:
48th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2024, Osaka, Japan, July 2-4, 2024. IEEE 2024, ISBN 979-8-3503-7696-8 [contents] - [i30]Md. Abdur Rahman, Hossain Shahriar, Fan Wu, Alfredo Cuzzocrea:
Applying Pre-trained Multilingual BERT in Embeddings for Improved Malicious Prompt Injection Attacks Detection. CoRR abs/2409.13331 (2024) - 2023
- [c199]Mst. Shapna Akter, Hossain Shahriar, Iysa Iqbal, Md Faruque Hossain, M. A. Karim, Victor Clincy, Razvan Voicu:
Exploring the Vulnerabilities of Machine Learning and Quantum Machine Learning to Adversarial Attacks Using a Malware Dataset: A Comparative Analysis. SSE 2023: 222-231 - [c198]Tarun Potluri, Yong Shi, Hossain Shahriar, Dan Chia-Tien Lo, Reza M. Parizi, Hongmei Chi, Kai Qian:
Secure Software Development in Google Colab. AIIoT 2023: 398-402 - [c197]Dhanunjai Bandi, Yong Shi, Hossain Shahriar, Dan C. Lo, Kun Suo, Hongmei Chi, Kai Qian:
Quantum Machine Learning for Security Data Analysis. AIIoT 2023: 460-465 - [c196]Mst. Shapna Akter, Juanjose Rodriguez-Cardenas, Hossain Shahriar, Alfredo Cuzzocrea, Fan Wu:
Quantum Cryptography for Enhanced Network Security: A Comprehensive Survey of Research, Developments, and Future Directions. IEEE Big Data 2023: 5408-5417 - [c195]Mst. Shapna Akter, Hossain Shahriar, Alfredo Cuzzocrea, Fan Wu, Juanjose Rodriguez-Cardenas:
A Trustable LSTM-Autoencoder Network for Cyberbullying Detection on Social Media Using Synthetic Data. IEEE Big Data 2023: 5418-5427 - [c194]Muneeba Asif, Mohammad Ashiqur Rahman, Kemal Akkaya, Hossain Shahriar, Alfredo Cuzzocrea:
Adversarial Data-Augmented Resilient Intrusion Detection System for Unmanned Aerial Vehicles. IEEE Big Data 2023: 5428-5437 - [c193]Mst. Shapna Akter, Hossain Shahriar, Juan Rodriguez Cardenas, Sheikh Iqbal Ahamed, Alfredo Cuzzocrea:
Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks. COMPSAC 2023: 765-776 - [c192]Yong Shi, Nazmus Sakib, Hossain Shahriar, Dan Lo, Hongmei Chi, Kai Qian:
AI-Assisted Security: A Step towards Reimagining Software Development for a Safer Future. COMPSAC 2023: 991-992 - [c191]Mst. Shapna Akter, Hossain Shahriar, Dan Lo, Nazmus Sakib, Kai Qian, Michael E. Whitman, Fan Wu:
Authentic Learning Approach for Artificial Intelligence Systems Security and Privacy. COMPSAC 2023: 1010-1012 - [c190]Mst. Shapna Akter, Nova Ahmed, Hossain Shahriar:
Understanding Rural women's Experience in STEM and Non-STEM field in Bangladesh. COMPSAC 2023: 1037-1046 - [c189]Sharaban Tahora, Bilash Saha, Nazmus Sakib, Hossain Shahriar, Hisham Haddad:
Blockchain Technology in Higher Education Ecosystem: Unraveling the Good, Bad, and Ugly. COMPSAC 2023: 1047-1056 - [c188]Mst. Shapna Akter, Hossain Shahriar, Sheikh Iqbal Ahamed, Kishor Datta Gupta, Muhammad Rahman, Atef Mohamed, Mohammad Ashiqur Rahman, Akond Rahman, Fan Wu:
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection. COMPSAC 2023: 1057-1063 - [c187]Mst. Shapna Akter, Hossain Shahriar, Alfredo Cuzzocrea:
Autism Disease Detection Using Transfer Learning Techniques: Performance Comparison Between Central Processing Unit vs Graphics Processing Unit Functions for Neural Networks. COMPSAC 2023: 1084-1092 - [c186]Bilash Saha, Md Saiful Islam, A. B. M. Kamrul Riad, Sharaban Tahora, Hossain Shahriar, Sweta Sneha:
BlockTheFall: Wearable Device-based Fall Detection Framework Powered by Machine Learning and Blockchain for Elderly Care. COMPSAC 2023: 1412-1417 - [c185]Masrura Tasnim, Arleen Joy Patinga, Hossain Shahriar, Sweta Sneha:
Cardiovascular Health Management Compliance with Health Insurance Portability and Accountability Act. COMPSAC 2023: 1423-1428 - [c184]Paramita Basak Upama, Maria Valero, Hossain Shahriar, Mohammad Syam, Sheikh Iqbal Ahamed:
Mental Health Analysis During Pandemic: A Survey of Detection and Treatment. COMPSAC 2023: 1530-1538 - [c183]Paramita Basak Upama, Anushka Kolli, Hansika Kolli, Subarna Alam, Mohammad Syam, Hossain Shahriar, Sheikh Iqbal Ahamed:
Quantum Machine Learning in Disease Detection and Prediction: a survey of applications and future possibilities. COMPSAC 2023: 1545-1551 - [c182]Md. Abdur Rahman, Hossain Shahriar, Victor Clincy, Md Faruque Hossain, Muhammad Asadur Rahman:
A Quantum Generative Adversarial Network-based Intrusion Detection System. COMPSAC 2023: 1810-1815 - [c181]Nafisa Anjum, Nazmus Sakib, Juan Rodriguez Cardenas, Corey Brookins, Ava Norouzinia, Asia Shavers, Miranda Dominguez, Marie Nassif, Hossain Shahriar:
Uncovering Software Supply Chains Vulnerability: A Review of Attack Vectors, Stakeholders, and Regulatory Frameworks. COMPSAC 2023: 1816-1821 - [c180]Bilash Saha, Sharaban Tahora, Abdul Barek, Hossain Shahriar:
HIPAAChecker: The Comprehensive Solution for HIPAA Compliance in Android mHealth Apps. COMPSAC 2023: 1822-1827 - [c179]Md. Mostafizur Rahman, Aiasha Siddika Arshi, Md. Golam Moula Mehedi Hasan, Sumayia Farzana Mishu, Hossain Shahriar, Fan Wu:
Security Risk and Attacks in AI: A Survey of Security and Privacy. COMPSAC 2023: 1834-1839 - [c178]Md Arabin Islam Talukder, Sumaiya Farzana Mishu, Hossain Shahriar, ABM Kamrul Islam Riad, Fan Wu, Akond Rahman:
A Plugin for Kotlin based Android Apps to Detect Security Breaches through Dataflow. COMPSAC 2023: 1840-1845 - [c177]Sricharan Donkada, Seyedamin Pouriyeh, Reza M. Parizi, Chloe Yixin Xie, Hossain Shahriar:
Early Heart Disease Detection Using Mel-Spectrograms and Deep Learning. ISCC 2023: 1-6 - [c176]Dan C. Lo, Hossain Shahriar, Kai Qian, Michael E. Whitman, Fan Wu, Cassandra Thomas:
Authentic Learning on Machine Learning for Cybersecurity. SIGCSE (2) 2023: 1299 - [c175]Yong Shi, Hossain Shahriar, Dan C. Lo, Kai Qian, Hongmei Chi:
Collaborative and Active Learning with Portable Online Hands-on Labware for Blockchain Development. SIGCSE (2) 2023: 1307 - [c174]Nafisa Anjum, Nazmus Sakib, Hossain Shahriar:
Confronting Toddlers' Brain Development Challenges Due to Screen-Addiction: Unpacking Perspectives from Stakeholders. SIGITE 2023: 218-219 - [e6]Hossain Shahriar, Yuuichi Teranishi, Alfredo Cuzzocrea, Moushumi Sharmin, Dave Towey, A. K. M. Jahangir Alam Majumder, Hiroki Kashiwazaki, Ji-Jiang Yang, Michiharu Takemoto, Nazmus Sakib, Ryohei Banno, Sheikh Iqbal Ahamed:
47th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2023, Torino, Italy, June 26-30, 2023. IEEE 2023, ISBN 979-8-3503-2697-0 [contents] - [e5]Jiman Hong, Maart Lanperne, Juw Won Park, Tomás Cerný, Hossain Shahriar:
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, SAC 2023, Tallinn, Estonia, March 27-31, 2023. ACM 2023, ISBN 978-1-4503-9517-5 [contents] - [i29]Mst. Shapna Akter, Hossain Shahriar, Nova Ahmed, Alfredo Cuzzocrea:
Deep Learning Approach for Classifying the Aggressive Comments on Social Media: Machine Translated Data Vs Real Life Data. CoRR abs/2303.07484 (2023) - [i28]Mst. Shapna Akter, Hossain Shahriar, Alfredo Cuzzocrea, Nova Ahmed, Carson K. Leung:
Handwritten Word Recognition using Deep Learning Approach: A Novel Way of Generating Handwritten Words. CoRR abs/2303.07514 (2023) - [i27]Mst. Shapna Akter, Hossain Shahriar, Sweta Sneha, Alfredo Cuzzocrea:
Multi-class Skin Cancer Classification Architecture Based on Deep Convolutional Neural Network. CoRR abs/2303.07520 (2023) - [i26]Mst. Shapna Akter, Hossain Shahriar, Zakirul Alam Bhuiya:
Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing. CoRR abs/2303.07525 (2023) - [i25]Mst. Shapna Akter, Hossain Shahriar:
Towards Unsupervised Learning based Denoising of Cyber Physical System Data to Mitigate Security Concerns. CoRR abs/2303.07530 (2023) - [i24]Mst. Shapna Akter, Hossain Shahriar, Iysa Iqbal, Md Faruque Hossain, M. A. Karim, Victor Clincy, Razvan Voicu:
Exploring the Vulnerabilities of Machine Learning and Quantum Machine Learning to Adversarial Attacks using a Malware Dataset: A Comparative Analysis. CoRR abs/2305.19593 (2023) - [i23]Mst. Shapna Akter, Hossain Shahriar, Alfredo Cuzzocrea:
Autism Disease Detection Using Transfer Learning Techniques: Performance Comparison Between Central Processing Unit vs Graphics Processing Unit Functions for Neural Networks. CoRR abs/2306.00283 (2023) - [i22]Mst. Shapna Akter, Hossain Shahriar, Sheikh Iqbal Ahamed, Kishor Datta Gupta, Muhammad Asadur Rahman, Atef Mohamed, Mohammad Ashiqur Rahman, Akond Rahman, Fan Wu:
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection. CoRR abs/2306.00284 (2023) - [i21]Sharaban Tahora, Bilash Saha, Nazmus Sakib, Hossain Shahriar, Hisham Haddad:
Blockchain Technology in Higher Education Ecosystem: Unraveling the Good, Bad, and Ugly. CoRR abs/2306.04071 (2023) - [i20]Bilash Saha, Sharaban Tahora, Abdul Barek, Hossain Shahriar:
HIPAAChecker: The Comprehensive Solution for HIPAA Compliance in Android mHealth Apps. CoRR abs/2306.06448 (2023) - [i19]Bilash Saha, Md Saiful Islam, A. B. M. Kamrul Riad, Sharaban Tahora, Hossain Shahriar, Sweta Sneha:
BlockTheFall: Wearable Device-based Fall Detection Framework Powered by Machine Learning and Blockchain for Elderly Care. CoRR abs/2306.06452 (2023) - [i18]Mst. Shapna Akter, Hossain Shahriar, Juan Rodriguez Cardenas, Sheikh Iqbal Ahamed, Alfredo Cuzzocrea:
Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks. CoRR abs/2306.07981 (2023) - [i17]Mst. Shapna Akter, Md. Jobair Hossain Faruk, Nafisa Anjum, Mohammad Masum, Hossain Shahriar, Akond Rahman, Fan Wu, Alfredo Cuzzocrea:
Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms. CoRR abs/2306.08060 (2023) - [i16]Bilash Saha, Md. Golam Moula Mehedi Hasan, Nafisa Anjum, Sharaban Tahora, Aiasha Siddika, Hossain Shahriar:
Protecting the Decentralized Future: An Exploration of Common Blockchain Attacks and their Countermeasures. CoRR abs/2306.11884 (2023) - [i15]Mst. Shapna Akter, Hossain Shahriar, Alfredo Cuzzocrea:
A Trustable LSTM-Autoencoder Network for Cyberbullying Detection on Social Media Using Synthetic Data. CoRR abs/2308.09722 (2023) - [i14]Mst. Shapna Akter, Juanjose Rodriguez-Cardenas, Hossain Shahriar, Akond Rahman, Fan Wu:
Teaching DevOps Security Education with Hands-on Labware: Automated Detection of Security Weakness in Python. CoRR abs/2311.16944 (2023) - 2022
- [j18]Mst. Shapna Akter, Hossain Shahriar, Reaz Chowdhury, M. R. C. Mahdy:
Forecasting the Risk Factor of Frontier Markets: A Novel Stacking Ensemble of Neural Network Approach. Future Internet 14(9): 252 (2022) - [j17]Hossain Shahriar, Sweta Sneha, Patricia Whitley:
Approaches and challenges to secure health data. Int. J. Medical Eng. Informatics 14(3): 213-228 (2022) - [c173]Md. Jobair Hossain Faruk, Mazharul Islam, Fazlul Alam, Hossain Shahriar, Akond Rahman:
Bie Vote: A Biometric Identification Enabled Blockchain-Based Secure and Transparent Voting Framework. BCCA 2022: 253-258 - [c172]Mst. Shapna Akter, Hossain Shahriar, Sweta Sneha, Alfredo Cuzzocrea:
Multi-class Skin Cancer Classification Architecture Based on Deep Convolutional Neural Network. IEEE Big Data 2022: 5404-5413 - [c171]Mst. Shapna Akter, Hossain Shahriar, Alfredo Cuzzocrea, Nova Ahmed, Carson K. Leung:
Handwritten Word Recognition using Deep Learning Approach: A Novel Way of Generating Handwritten Words. IEEE Big Data 2022: 5414-5423 - [c170]Jagan Mohan Reddy, Abhishek Attuluri, Abhinay Kolli, Nazmus Sakib, Hossain Shahriar, Alfredo Cuzzocrea:
A Crowd Source System for YouTube Big Data Analytics: Unpacking Values from Data Sprawl. IEEE Big Data 2022: 5451-5457 - [c169]Mohammad Masum, Nafisa Anjum, Md. Jobair Hossain Faruk, Hossain Shahriar, Nazmus Sakib, Maria Valero, Mohammed Karim, Akond Rahman, Fan Wu, Alfredo Cuzzocrea:
A Novel Machine Learning Based Framework for Bridge Condition Analysis. IEEE Big Data 2022: 5530-5535 - [c168]Mst. Shapna Akter, Md. Jobair Hossain Faruk, Nafisa Anjum, Mohammad Masum, Hossain Shahriar, Nazmus Sakib, Akond Rahman, Fan Wu, Alfredo Cuzzocrea:
Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms. IEEE Big Data 2022: 5639-5645 - [c167]Mst. Shapna Akter, Hossain Shahriar, Nova Ahmed, Alfredo Cuzzocrea:
Deep Learning Approach for Classifying the Aggressive Comments on Social Media: Machine Translated Data Vs Real Life Data. IEEE Big Data 2022: 5646-5655 - [c166]Md. Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan Lo, Michael E. Whitman, Alfredo Cuzzocrea, Fan Wu, Victor Clincy:
Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware: Neural Network Algorithms for Network Denial of Service (DOS) Detection. IEEE Big Data 2022: 5715-5720 - [c165]Mohammad Masum, Md. Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan Lo, Muhaiminul Islam Adnan:
Ransomware Classification and Detection With Machine Learning Algorithms. CCWC 2022: 316-322 - [c164]Mst. Shapna Akter, Hossain Shahriar:
Towards Unsupervised Learning based Denoising of Cyber Physical System Data to Mitigate Security Concerns. CNS 2022: 1-6 - [c163]Chulan Gao, Hossain Shahriar, Dan Lo, Yong Shi, Kai Qian:
Improving the Prediction Accuracy with Feature Selection for Ransomware Detection. COMPSAC 2022: 424-425 - [c162]Dan Chia-Tien Lo, Kai Qian, Yong Shi, Hossain Shahriar, Chung Ng:
Broaden Multidisciplinary Data Science Research by an Innovative Cyberinfrastructure Platform. COMPSAC 2022: 428-429 - [c161]Md. Jobair Hossain Faruk, Mohammad Masum, Hossain Shahriar, Kai Qian, Dan Lo:
Authentic Learning of Machine Learning to Ransomware Detection and Prevention. COMPSAC 2022: 442-443 - [c160]Md. Jobair Hossain Faruk, Arleen Joy Patinga, Lorna Migiro, Hossain Shahriar, Sweta Sneha:
Leveraging Healthcare API to transform Interoperability: API Security and Privacy. COMPSAC 2022: 444-445 - [c159]Jagan Mohan Reddy, Muthukumaran K, Hossain Shahriar, Victor Clincy, Nazmus Sakib:
Comprehensive Feature Extraction for Cross-Project Software Defect Prediction. COMPSAC 2022: 450-451 - [c158]Md Abdullah Al Hafiz Khan, Hossain Shahriar:
MRehab: Mutlimodal data acquisition and modeling framework for assessing stroke and cardiac rehabilitation exercises. COMPSAC 2022: 452-453 - [c157]Mohammad Masum, Hossain Shahriar, Nazmus Sakib, Maria Valero, Kai Qian, Dan Lo, Fan Wu, Mohammed Karim, Parth Bhavsar, Jidong Yang:
Scalable Machine Learning Using PySpark. COMPSAC 2022: 454-455 - [c156]Paramita Basak Upama, Md. Jobair Hossain Faruk, Mohammad Nazim, Mohammad Masum, Hossain Shahriar, Gias Uddin, Shabir Barzanjeh, Sheikh Iqbal Ahamed, Akond Rahman:
Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing Tools. COMPSAC 2022: 520-529 - [c155]Mohammad Masum, Mohammad Nazim, Md. Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Md Abdullah Hafiz Khan, Gias Uddin, Shabir Barzanjeh, Erhan Saglamyurek, Akond Rahman, Sheikh Iqbal Ahamed:
Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go? COMPSAC 2022: 530-538 - [c154]Farzana Ahamed Bhuiyan, Stacy J. Prowell, Hossain Shahriar, Fan Wu, Akond Rahman:
Shifting Left for Machine Learning: An Empirical Study of Security Weaknesses in Supervised Learning-based Projects. COMPSAC 2022: 798-808 - [c153]Akond Rahman, Farzana Ahamed Bhuiyan, Mohammad Mehedi Hassan, Hossain Shahriar, Fan Wu:
Towards Automation for MLOps: An Exploratory Study of Bot Usage in Deep Learning Libraries. COMPSAC 2022: 1093-1097 - [c152]Jagan Moahan Reddy Danda, Kumar Priyansh, Hossain Shahriar, Hisham Haddad, Alfredo Cuzzocrea, Nazmus Sakib:
Predicting Mortality Rate based on Comprehensive Features of Intensive Care Unit Patients. COMPSAC 2022: 1402-1407 - [c151]Jiyoun Randolph, Md. Jobair Hossain Faruk, Bilash Saha, Hossain Shahriar, Maria Valero, Liang Zhao, Nazmus Sakib:
Blockchain-based Medical Image Sharing and Automated Critical-results Notification: A Novel Framework. COMPSAC 2022: 1756-1761 - [c150]Mohammad Taneem Bin Nazim, Md. Jobair Hossain Faruk, Hossain Shahriar, Md Abdullah Khan, Mohammad Masum, Nazmus Sakib, Fan Wu:
Systematic Analysis of Deep Learning Model for Vulnerable Code Detection. COMPSAC 2022: 1768-1773 - [c149]Alvi Ataur Khalil, Javier Franco, Imtiaz Parvez, A. Selcuk Uluagac, Hossain Shahriar, Mohammad Ashiqur Rahman:
A Literature Review on Blockchain-enabled Security and Operation of Cyber-Physical Systems. COMPSAC 2022: 1774-1779 - [c148]Shahriar Sobhan, Timothy Williams, Md. Jobair Hossain Faruk, Juan Rodriguez Cardenas, Masrura Tasnim, Edwin Mathew, Jack Wright, Hossain Shahriar:
A Review of Dark Web: Trends and Future Directions. COMPSAC 2022: 1780-1785 - [c147]Soin Abdoul Kassif Traore, Maria Valero, Hossain Shahriar, Liang Zhao, Sheikh Iqbal Ahamed, Ahyoung Lee:
Enabling Cyberanalytics using IoT Clusters and Containers. COMPSAC 2022: 1798-1803 - [c146]Kumar Priyansh, Ritu Dimri, Fahim Islam Anik, Mst. Shapna Akter, Nazmus Sakib, Hossain Shahriar, Md. Zakirul Alam Bhuiyan:
DuRBIN: A Comprehensive Approach to Analysis and Detection of Emerging Threats due to Network Intrusion. DASC/PiCom/CBDCom/CyberSciTech 2022: 1-8 - [c145]Md. Jobair Hossain Faruk, Sharaban Tahora, Masrura Tasnim, Hossain Shahriar, Nazmus Sakib:
A Review of Quantum Cybersecurity: Threats, Risks and Opportunities. ICAIC 2022: 1-8 - [c144]Oana Tudorache, John Brandon Kenemer, Janna Pruiett, Maria Valero, Margot Lisa Hedenstrom, Hossain Shahriar, Sweta Sneha:
Implementing Virtual Nursing in Health Care: An evaluation of effectiveness and sustainability. ICDH 2022: 129-131 - [c143]Lee Solomon, Reddy Bhavya Gudi, Humera Asfandiyar, Sweta Sneha, Hossain Shahriar:
Knowledge Management in a Healthcare Enterprise: Creation of a Digital Knowledge Repository. ICDH 2022: 215-217 - [c142]Md. Jobair Hossain Faruk, Shashank Trivedi, Mohammad Masum, Maria Valero, Hossain Shahriar, Sheikh Iqbal Ahamed:
A Novel IoT-based Framework for Non-Invasive Human Hygiene Monitoring using Machine Learning Techniques. ICHI 2022: 412-421 - [c141]Md. Jobair Hossain Faruk, Masrura Tasnim, Hossain Shahriar, Maria Valero, Akond Rahman, Fan Wu:
Investigating Novel Approaches to Defend Software Supply Chain Attacks. ISSRE Workshops 2022: 283-288 - [c140]Akond Rahman, Md. Shazibul Islam Shamim, Hossain Shahriar, Fan Wu:
Can We use Authentic Learning to Educate Students about Secure Infrastructure as Code Development? ITiCSE (2) 2022: 631 - [c139]Tahsin Kazi, Kiran Ponakaladinne, Maria Valero, Liang Zhao, Hossain Shahriar, Katherine H. Ingram:
Comparative Study of Machine Learning Methods on Spectroscopy Images for Blood Glucose Estimation. PervasiveHealth 2022: 60-74 - [c138]Md. Jobair Hossain Faruk, Santhiya Subramanian, Hossain Shahriar, Maria Valero, Xia Li, Masrura Tasnim:
Software Engineering Process and Methodology in Blockchain-Oriented Software Development: A Systematic Study. SERA 2022: 120-127 - [c137]Dan Chia-Tien Lo, Hossain Shahriar, Kai Qian, Michael E. Whitman, Fan Wu, Cassandra Thomas:
Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware. SIGCSE (2) 2022: 1153 - [c136]Md. Jobair Hossain Faruk, Bilash Saha, Mazharul Islam, Fazlul Alam, Hossain Shahriar, Maria Valero, Akond Rahman, Fan Wu, Md. Zakirul Alam Bhuiyan:
Development of Blockchain-based e-Voting System: Requirements, Design and Security Perspective. TrustCom 2022: 959-967 - [c135]Mst. Shapna Akter, Hossain Shahriar, Zakirul Alam Bhuiya:
Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing. UbiSec 2022: 83-102 - [e4]Hong Va Leong, Sahra Sedigh Sarvestani, Yuuichi Teranishi, Alfredo Cuzzocrea, Hiroki Kashiwazaki, Dave Towey, Ji-Jiang Yang, Hossain Shahriar:
46th IEEE Annual Computers, Software, and Applications Conferenc, COMPSAC 2022, Los Alamitos, CA, USA, June 27 - July 1, 2022. IEEE 2022, ISBN 978-1-6654-8810-5 [contents] - [e3]Sheikh Iqbal Ahamed, Claudio Agostino Ardagna, Hongyi Bian, Mario A. Bochicchio, Carl K. Chang, Rong N. Chang, Ernesto Damiani, Lin Liu, Misha Pavel, Corrado Priami, Hossain Shahriar, Robert Ward, Fatos Xhafa, Jia Zhang, Farhana H. Zulkernine:
IEEE International Conference on Digital Health, ICDH 2022, Barcelona, Spain, July 10-16, 2022. IEEE 2022, ISBN 978-1-6654-8149-6 [contents] - [i13]Paramita Basak Upama, Md. Jobair Hossain Faruk, Mohammad Nazim, Mohammad Masum, Hossain Shahriar, Gias Uddin, Shabir Barzanjeh, Sheikh Iqbal Ahamed, Akond Rahman:
Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing Tools. CoRR abs/2204.01856 (2022) - [i12]Mohammad Masum, Mohammad Nazim, Md. Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Md Abdullah Hafiz Khan, Gias Uddin, Shabir Barzanjeh, Erhan Saglamyurek, Akond Rahman, Sheikh Iqbal Ahamed:
Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go? CoRR abs/2204.02784 (2022) - [i11]Md. Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Sweta Sneha, Sheikh Iqbal Ahamed, Mohammad Ashiqur Rahman:
Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring. CoRR abs/2206.12766 (2022) - [i10]Md. Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Farhat Lamia Barsha, Shahriar Sobhan, Md Abdullah Khan, Michael E. Whitman, Alfredo Cuzzocrea, Dan Chia-Tien Lo, Akond Rahman, Fan Wu:
Malware Detection and Prevention using Artificial Intelligence Techniques. CoRR abs/2206.12770 (2022) - [i9]Md. Jobair Hossain Faruk, Santhiya Subramanian, Hossain Shahriar, Maria Valero, Xia Li, Masrura Tasnim:
Software Engineering Process and Methodology in Blockchain-Oriented Software Development: A Systematic Study. CoRR abs/2207.00892 (2022) - [i8]Mohammad Masum, Md. Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan C. Lo, Muhaiminul Islam Adnan:
Ransomware Classification and Detection With Machine Learning Algorithms. CoRR abs/2207.00894 (2022) - [i7]Ryan Shivers, Mohammad Ashiqur Rahman, Md. Jobair Hossain Faruk, Hossain Shahriar, Alfredo Cuzzocrea, Victor Clincy:
Ride-Hailing for Autonomous Vehicles: Hyperledger Fabric-Based Secure and Decentralize Blockchain Platform. CoRR abs/2207.03525 (2022) - [i6]Md. Jobair Hossain Faruk, Shashank Trivedi, Mohammad Masum, Maria Valero, Hossain Shahriar, Sheikh Iqbal Ahamed:
A Novel IoT-based Framework for Non-Invasive Human Hygiene Monitoring using Machine Learning Techniques. CoRR abs/2207.03529 (2022) - [i5]Md. Jobair Hossain Faruk, Sharaban Tahora, Masrura Tasnim, Hossain Shahriar, Nazmus Sakib:
A Review of Quantum Cybersecurity: Threats, Risks and Opportunities. CoRR abs/2207.03534 (2022) - [i4]Jiyoun Randolph, Md. Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Liang Zhao, Nazmus Sakib, Bilash Saha:
Blockchain-based Medical Image Sharing and Automated Critical-results Notification: A Novel Framework. CoRR abs/2207.03555 (2022) - [i3]Md. Jobair Hossain Faruk, Maria Valero, Hossain Shahriar:
An Investigation on Non-Invasive Brain-Computer Interfaces: Emotiv Epoc+ Neuroheadset and Its Effectiveness. CoRR abs/2207.06914 (2022) - [i2]Mohammad Masum, Hossain Shahriar, Hisham Haddad, Md. Jobair Hossain Faruk, Maria Valero, Md Abdullah Khan, Mohammad Ashiqur Rahman, Muhaiminul I. Adnan, Alfredo Cuzzocrea:
Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection. CoRR abs/2207.09902 (2022) - 2021
- [j16]Claudio Demartini, Leila De Floriani, Ji-Jiang Yang, Alfredo Cuzzocrea, Hossain Shahriar, Sorel Reisman, Mohammad Zulkernine:
IEEE COMPSAC 2022. Computer 54(12): 27 (2021) - [j15]Hossain Shahriar, Hisham M. Haddad, Maryam Farhadi:
Assessing HIPAA Compliance of Open Source Electronic Health Record Applications. Int. J. Inf. Secur. Priv. 15(2): 181-195 (2021) - [c134]Caitlin L. McOsker, Michael Steven Handlin, Lei Li, Hossain Shahriar, Liang Zhao:
An Architecture for Federated Learning Enabled Collaborative Intrusion Detection System. AMCIS 2021 - [c133]Dan C. Lo, Hossain Shahriar, Kai Qian, Michael E. Whitman, Fan Wu:
Colab Cloud Based Portable and Shareable Hands-on Labware for Machine Learning to Cybersecurity. IEEE BigData 2021: 3311-3315 - [c132]Md. Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Farhat Lamia Barsha, Shahriar Sobhan, Md Abdullah Khan, Michael E. Whitman, Alfredo Cuzzocrea, Dan C. Lo, Akond Rahman, Fan Wu:
Malware Detection and Prevention using Artificial Intelligence Techniques. IEEE BigData 2021: 5369-5377 - [c131]Mohammad Masum, Hossain Shahriar, Hisham Haddad, Md. Jobair Hossain Faruk, Maria Valero, Md Abdullah Khan, Mohammad Ashiqur Rahman, Muhaiminul I. Adnan, Alfredo Cuzzocrea, Fan Wu:
Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection. IEEE BigData 2021: 5413-5419 - [c130]Ryan Shivers, Mohammad Ashiqur Rahman, Md. Jobair Hossain Faruk, Hossain Shahriar, Alfredo Cuzzocrea, Victor Clincy:
Ride-Hailing for Autonomous Vehicles: Hyperledger Fabric-Based Secure and Decentralize Blockchain Platform. IEEE BigData 2021: 5450-5459 - [c129]Nur Imtiazul Haque, Mohammad Ashiqur Rahman, Hossain Shahriar:
Ensemble-based Efficient Anomaly Detection for Smart Building Control Systems. COMPSAC 2021: 504-513 - [c128]Md. Jobair Hossain Faruk, Maria Valero, Hossain Shahriar:
An Investigation on Non-Invasive Brain-Computer Interfaces: Emotiv Epoc+ Neuroheadset and Its Effectiveness. COMPSAC 2021: 580-589 - [c127]Shahriar Sobhan, Md. Saiful Islam, Maria Valero, Hossain Shahriar, Sheikh Iqbal Ahamed:
Data Analysis Methods for Health Monitoring Sensors: A survey. COMPSAC 2021: 669-676 - [c126]Kaitlyn Cottrell, Dibyendu Brinto Bose, Hossain Shahriar, Akond Rahman:
An Empirical Study of Vulnerabilities in Robotics. COMPSAC 2021: 735-744 - [c125]Alexander Boyett, Atef Shalan, Hossain Shahriar, Muhammad Asadur Rahman:
A Taxonomy of XSS Attack Detections in Mobile Environments based on Automation Capabilities. COMPSAC 2021: 1339-1344 - [c124]A. B. M. Kamrul Riad, Hossain Shahriar, Maria Valero, Mokter Hossain:
Cybersecurity Risks and Mitigation Techniques During COVID-19. COMPSAC 2021: 1351-1356 - [c123]Jaciel E. Reyes, Atef Shalan, Hossain Shahriar, Muhammad Asadur Rahman, Sarika Jain:
A Classification of Web Service Credibility Measures. COMPSAC 2021: 1399-1400 - [c122]Akond Rahman, Hossain Shahriar, Dibyendu Brinto Bose:
How Do Students Feel About Automated Security Static Analysis Exercises? FIE 2021: 1-4 - [c121]Lindsay Schirato, Kennedy Makina, Dwayne Flanders, Seyedamin Pouriyeh, Hossain Shahriar:
COVID-19 Mortality Prediction Using Machine Learning Techniques. ICDH 2021: 197-202 - [c120]Shashank Trivedi, Maria Valero, Hossain Shahriar, Liang Zhao:
Non-Invasive Monitoring of Human Hygiene using Vibration Sensor and Classifiers. ICDH 2021: 229-230 - [c119]Md. Saiful Islam, Shahriar Sobhan, Maria Valero, Hossain Shahriar, Liang Zhao, Sheikh Iqbal Ahamed:
Framework for Collecting Data from specialized IoT devices - An application to enhance Healthcare Systems. ICDH 2021: 231-233 - [c118]Lorna Migiro, Hossain Shahriar, Sweta Sneha:
Analyzing Security and Privacy Concerns of Contact Tracing Applications. ICDH 2021: 283-292 - [c117]Mohammad Masum, Hossain Shahriar, Hisham M. Haddad, WenZhan Song:
A Statistical Summary Analysis of Window-Based Extracted Features for EEG Signal Classification. ICDH 2021: 293-298 - [c116]Md. Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Sweta Sneha, Sheikh Iqbal Ahamed, Mohammad Ashiqur Rahman:
Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring. ICDH 2021: 299-308 - [c115]Osama Shahid, Viraaji Mothukuri, Seyedamin Pouriyeh, Reza M. Parizi, Hossain Shahriar:
Detecting Network Attacks using Federated Learning for IoT Devices. ICNP 2021: 1-6 - [c114]Maria Valero, Lei Li, Hossain Shahriar, Shahriar Sobhan, Michael Steven Handlin, Jinghua Zhang:
Emotional Analysis of Learning Cybersecurity with Games. ISI 2021: 1-6 - [c113]Akond Rahman, Hossain Shahriar, Dibyendu Brinto Bose:
Exercise Perceptions: Experience Report from a Secure Software Development Course. QUATIC 2021: 521-535 - [c112]Rebecca H. Rutherfoord, Lei Li, Hossain Shahriar, James K. Rutherfoord:
We Did It! So Can You! Creating "No-Textbook" IT Degrees. SIGITE 2021: 151-152 - [c111]Md. Jobair Hossain Faruk, Paul Miner, Ryan Coughlan, Mohammad Masum, Hossain Shahriar, Victor Clincy, Coskun Cetinkaya:
Smart Connected Aircraft: Towards Security, Privacy, and Ethical Hacking. SIN 2021: 1-5 - 2020
- [c110]Zhoulin Li, Hao Zhang, Mohammad Masum, Hossain Shahriar, Hisham Haddad:
Cyber Fraud Prediction with Supervised Machine Learning Techniques. ACM Southeast Regional Conference 2020: 176-180 - [c109]Mohammad Masum, Hossain Shahriar, Hisham M. Haddad, Md. Shafiul Alam:
r-LSTM: Time Series Forecasting for COVID-19 Confirmed Cases with LSTMbased Framework. IEEE BigData 2020: 1374-1379 - [c108]Mohammad Masum, Hossain Shahriar, Hisham M. Haddad, Sheikh Iqbal Ahamed, Sweta Sneha, Mohammad Ashiqur Rahman, Alfredo Cuzzocrea:
Actionable Knowledge Extraction Framework for COVID-19. IEEE BigData 2020: 4036-4041 - [c107]Amarjit Datta, Mohammad Ashiqur Rahman, Hossain Shahriar:
WTC^2: Impact-Aware Threat Analysis for Water Treatment Centers. COMPSAC 2020: 473-482 - [c106]Mohammad Masum, Hossain Shahriar, Hisham Haddad:
Analysis of Sampling Techniques Towards Epileptic Seizure Detection from Imbalanced Dataset. COMPSAC 2020: 684-692 - [c105]Md. Saiful Islam, Hossain Shahriar, Sweta Sneha, Chi Zhang, Sheikh Iqbal Ahamed:
Mobile Sensor-Based Fall Detection Framework. COMPSAC 2020: 693-698 - [c104]Hossain Shahriar, Kai Qian, Atef Shalan, Fan Wu:
Enhancing Proactive Control Mobile and Web Software Security Education with Hands-on Labware. COMPSAC 2020: 1095-1096 - [c103]Laeticia Etienne, Hossain Shahriar:
Attacks and Mitigation Techniques for Iris-Based Authentication Systems. COMPSAC 2020: 1101-1102 - [c102]Hossain Shahriar, Kai Qian, Hao Zhang:
Learning Environment Containerization of Machine Leaning for Cybersecurity. COMPSAC 2020: 1131-1132 - [c101]Jamesa Hogges, Hossain Shahriar, Sweta Sneha, Sheikh Iqbal Ahamed:
A Two-Step Password Authentication System for Alzheimer Patients. COMPSAC 2020: 1444-1448 - [c100]Chi Zhang, Hossain Shahriar, A. B. M. Kamrul Riad:
Security and Privacy Analysis of Wearable Health Device. COMPSAC 2020: 1767-1772 - [c99]Andrew Gomez, Hossain Shahriar, Victor Clincy, Atef Shalan:
Hands-on Lab on Smart City Vulnerability Exploitation. COMPSAC 2020: 1777-1782 - [c98]Zhuolin Li, Hao Zhang, Hossain Shahriar, Dan Lo, Kai Qian, Michael E. Whitman, Fan Wu:
Denial of Service (DoS) Attack Detection: Performance Comparison of Supervised Machine Learning Algorithms. DASC/PiCom/CBDCom/CyberSciTech 2020: 469-474 - [c97]Mohammad Masum, Hossain Shahriar, Hisham M. Haddad:
Epileptic Seizure Detection for Imbalanced Datasets Using an Integrated Machine Learning Approach. EMBC 2020: 5416-5419 - [c96]Mohammad Masum, Hossain Shahriar:
TL-NID: Deep Neural Network with Transfer Learning for Network Intrusion Detection. ICITST 2020: 1-7 - [c95]Travis Blue, Hossain Shahriar:
Distributed Denial of Service Attack Detection. NCS 2020: 240-241 - [c94]Maria Valero, Hossain Shahriar, Sheikh Iqbal Ahamed:
R-Mon: An mhealth Tool for Real-time Respiratory Monitoring During Pandemics and Self-Isolation. SERVICES 2020: 17-21 - [c93]Hossain Shahriar, Michael E. Whitman, Dan Lo, Fan Wu, Cassandra Thomas:
Case Study-based Portable Hands-on Labware for Machine Learning in Cybersecurity. SIGCSE 2020: 1273 - [c92]Dan C. Lo, Kai Qian, Hossain Shahriar, Fan Wu, Johng-Chern Chern, Pascal Paschos, Chung Ng:
Information Assurance and Security Education on Undergraduate Computing Degree Programs. SIGCSE 2020: 1274 - [c91]Dan Chia-Tien Lo, Ruth Bearden, Deepa Muralidhar, Hossain Shahriar, Wei Chen, Pascal Paschos, Chung Ng:
A Hands-On Lab for Macro Malware Detection using Machine Learning on Virtual Machines. SIGCSE 2020: 1275 - [c90]Chi Zhang, Hossain Shahriar:
The Adoption, Issues, and Challenges of Wearable Healthcare Technology for the Elderly. SIGITE 2020: 50-53 - [c89]Vara Vundavalli, Farhat Lamia Barsha, Mohammad Masum, Hossain Shahriar, Hisham Haddad:
Malicious URL Detection Using Supervised Machine Learning Techniques. SIN 2020: 21:1-21:6 - [c88]Wanrong Zhao, Hossain Shahriar, Victor Clincy, Md. Zakirul Alam Bhuiyan:
Security and Privacy Analysis of mhealth Application: A Case Study. TrustCom 2020: 1882-1887
2010 – 2019
- 2019
- [j14]Hossain Shahriar, Chi Zhang, Stephen Dunn, Robert Bronte, Atef Sahlan, Khaled Tarmissi:
Mobile anti-phishing: Approaches and challenges. Inf. Secur. J. A Glob. Perspect. 28(6): 178-193 (2019) - [c87]Mohammad Masum, Hossain Shahriar:
Droid-NNet: Deep Learning Neural Network for Android Malware Detection. IEEE BigData 2019: 5789-5793 - [c86]Hossain Shahriar, Michael E. Whitman, Dan Chia-Tien Lo, Fan Wu, Cassandra Thomas, Alfredo Cuzzocrea:
Experiential Learning: Case Study-Based Portable Hands-on Regression Labware for Cyber Fraud Prediction. IEEE BigData 2019: 5814-5818 - [c85]Feiyang Qu, Hisham Haddad, Hossain Shahriar:
Smart Contract-Based Secured Business-to-Consumer Supply Chain Systems. Blockchain 2019: 580-585 - [c84]Rehnuma Afrin, Hisham Haddad, Hossain Shahriar:
Supervised and Unsupervised-Based Analytics of Intensive Care Unit Data. COMPSAC (2) 2019: 417-422 - [c83]Lori Kim, Hossain Shahriar, Chi Zhang:
Non-Invasive Wi-Fi Sensors For Smart Healthcare. COMPSAC (2) 2019: 440-445 - [c82]Gracie Carter, Hossain Shahriar, Sweta Sneha:
Blockchain-Based Interoperable Electronic Health Record Sharing Framework. COMPSAC (2) 2019: 452-457 - [c81]Md Arabin Islam Talukder, Hossain Shahriar, Kai Qian, Mohammad Ashiqur Rahman, Sheikh Iqbal Ahamed, Fan Wu, Emmanuel Agu:
DroidPatrol: A Static Analysis Plugin For Secure Mobile Software Development. COMPSAC (1) 2019: 565-569 - [c80]Sheikh Iqbal Ahamed, Mohammad Zulkernine, Hossain Shahriar, Hongmei Chi:
STPSA 2019 Welcome Message. COMPSAC (2) 2019: 567-568 - [c79]Hossain Shahriar, Md Arabin Islam Talukder, Mohammad Ashiqur Rahman, Hongmei Chi, Sheikh Iqbal Ahamed, Fan Wu:
Hands-on File Inclusion Vulnerablity and Proactive Control for Secure Software Development. COMPSAC (2) 2019: 604-609 - [c78]Maryam Farhadi, Hisham Haddad, Hossain Shahriar:
Compliance Checking of Open Source EHR Applications for HIPAA and ONC Security and Privacy Requirements. COMPSAC (1) 2019: 704-713 - [c77]Hao Zhang, Zhuolin Li, Hossain Shahriar, Lixin Tao, Prabir Bhattacharya, Ying Qian:
Improving Prediction Accuracy for Logistic Regression on Imbalanced Datasets. COMPSAC (1) 2019: 918-919 - [c76]Victor Clincy, Hossain Shahriar:
IoT Malware Analysis. COMPSAC (1) 2019: 920-921 - [c75]Victor Clincy, Hossain Shahriar:
Blockchain Development Platform Comparison. COMPSAC (1) 2019: 922-923 - [c74]Hao Zhang, Zhuolin Li, Hossain Shahriar, Dan Lo, Fan Wu, Ying Qian:
Protecting Data in Android External Data Storage. COMPSAC (1) 2019: 924-925 - [c73]Dara Sinclair, Hossain Shahriar, Chi Zhang:
Security requirement prototyping with hyperledger composer for drug supply chain: a blockchain application. ICCSP 2019: 158-163 - [c72]Hossain Shahriar, Atef Shalan, Khaled Tarmissi:
Towards Secure Password Protection in Portable Applications. NCS 2019: 3-13 - [c71]Hossain Shahriar, Chi Zhang, Md Arabin Islam Talukder, Sheikh Iqbal Ahamed:
Resources for healthcare workflow modeling and analysis. SAC 2019: 2469-2472 - [c70]Hossain Shahriar, Kai Qian, Md Arabin Islam Talukder, Reza M. Parizi:
Data Protection with SMSD Labware. SIGCSE 2019: 1262 - [c69]Chi Zhang, Hossain Shahriar:
Redeveloping Electronic Health Records Course with Open Source Tools and Platforms. SIGITE 2019: 161 - [c68]Daniel Laufenberg, Lei Li, Hossain Shahriar, Meng Han:
An Architecture for Blockchain-Enabled Collaborative Signature-based Intrusion Detection System. SIGITE 2019: 169 - [c67]Hossain Shahriar, Md Arabin Islam Talukder, Hongmei Chi, Mohammad Ashiqur Rahman, Sheikh Iqbal Ahamed, Atef Shalan, Khaled Tarmissi:
Data Protection Labware for Mobile Security. SpaCCS 2019: 183-195 - [e2]Vladimir Getov, Jean-Luc Gaudiot, Nariyoshi Yamai, Stelvio Cimato, J. Morris Chang, Yuuichi Teranishi, Ji-Jiang Yang, Hong Va Leong, Hossain Shahriar, Michiharu Takemoto, Dave Towey, Hiroki Takakura, Atilla Elçi, Susumu Takeuchi, Satish Puri:
43rd IEEE Annual Computer Software and Applications Conference, COMPSAC 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 1. IEEE 2019, ISBN 978-1-7281-2607-4 [contents] - [e1]Vladimir Getov, Jean-Luc Gaudiot, Nariyoshi Yamai, Stelvio Cimato, J. Morris Chang, Yuuichi Teranishi, Ji-Jiang Yang, Hong Va Leong, Hossain Shahriar, Michiharu Takemoto, Dave Towey, Hiroki Takakura, Atilla Elçi, Susumu Takeuchi, Satish Puri:
43rd IEEE Annual Computer Software and Applications Conference, COMPSAC 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 2. IEEE 2019, ISBN 978-1-7281-2607-4 [contents] - [i1]Ryan Shivers, Mohammad Ashiqur Rahman, Hossain Shahriar:
Toward a Secure and Decentralized Blockchain-based Ride-Hailing Platform for Autonomous Vehicles. CoRR abs/1910.00715 (2019) - 2018
- [c66]Maryam Farhadi, Hisham Haddad, Hossain Shahriar:
Static Analysis of HIPPA Security Requirements in Electronic Health Record Applications. COMPSAC (2) 2018: 474-479 - [c65]Md. Golam Moula Mehedi Hasan, Amarjit Datta, Mohammad Ashiqur Rahman, Hossain Shahriar:
Chained of Things: A Secure and Dependable Design of Autonomous Vehicle Services. COMPSAC (2) 2018: 498-503 - [c64]Hossain Shahriar, Hiroki Takakura, Michiharu Takemoto, Dave Towey:
Message from the Fast Abstract Co-chairs. COMPSAC (1) 2018: 780 - [c63]Reza M. Parizi, Kai Qian, Hossain Shahriar, Fan Wu, Lixin Tao:
Benchmark Requirements for Assessing Software Security Vulnerability Testing Tools. COMPSAC (1) 2018: 825-826 - [c62]Xianyong Meng, Kai Qian, Dan Chia-Tien Lo, Hossain Shahriar, Md Arabin Islam Talukder, Prabir Bhattacharya:
Secure Mobile IPC Software Development with Vulnerability Detectors in Android Studio. COMPSAC (1) 2018: 829-830 - [c61]Victor Clincy, Hossain Shahriar:
Web Application Firewall: Network Security Models and Configuration. COMPSAC (1) 2018: 835-836 - [c60]Donald Privitera, Hossain Shahriar:
Design and Development of Smart TV Protector. NCS 2018: 45-52 - [c59]Hossain Shahriar, Kai Qian, Md Arabin Islam Talukder, Dan Chia-Tien Lo, Nidhibahen Patel:
Mobile Software Security with Dynamic Analysis. PRDC 2018: 223-224 - [c58]Patricia Whitley, Emily Ennis, Nolan Taaca, Sweta Sneha, Hossain Shahriar, Chi Zhang:
Reduction of Medical Errors in Emergency Medical Care. SIGITE 2018: 160 - [c57]Chi Zhang, Hossain Shahriar:
Health Data Analytics: A Health IT Application Course. SIGITE 2018: 163 - 2017
- [j13]Hossain Shahriar, Hisham Haddad, Pranahita Bulusu:
LDAP Vulnerability Detection in Web Applications. Int. J. Secur. Softw. Eng. 8(4): 31-50 (2017) - [c56]Alfredo Cuzzocrea, Hossain Shahriar:
Data masking techniques for NoSQL database security: A systematic review. IEEE BigData 2017: 4467-4473 - [c55]Dave Towey, Michiharu Takemoto, Hossain Shahriar:
Message from COMPSAC 2017 Fast Abstract Track Co-Chairs. COMPSAC (2) 2017: 259 - [c54]Priyanga Chandrasekar, Kai Qian, Hossain Shahriar, Prabir Bhattacharya:
Improving the Prediction Accuracy of Decision Tree Mining with Data Preprocessing. COMPSAC (2) 2017: 481-484 - [c53]Hossain Shahriar, Hisham Haddad, Mahbubul Islam:
An Iris-Based Authentication Framework to Prevent Presentation Attacks. COMPSAC (2) 2017: 504-509 - [c52]Hossain Shahriar, William Bond:
Towards an Attack Signature Generation Framework for Intrusion Detection Systems. DASC/PiCom/DataCom/CyberSciTech 2017: 597-603 - [c51]Kai Qian, Dan Chia-Tien Lo, Hossain Shahriar, Lei Li, Fan Wu, Prabir Bhattacharya:
Learning database security with hands-on mobile labs. FIE 2017: 1-6 - [c50]Victor Clincy, Hossain Shahriar:
Web service injection attack detection. ICITST 2017: 173-178 - [c49]Kai Qian, Hossain Shahriar, Fan Wu, Lixin Tao, Prabir Bhattacharya:
Labware for Secure Mobile Software Development (SMSD) Education. ITiCSE 2017: 375 - [c48]Robert Bronte, Hossain Shahriar, Hisham M. Haddad:
Mitigating distributed denial of service attacks at the application layer. SAC 2017: 693-696 - [c47]Kai Qian, Hossain Shahriar, Fan Wu, Cassandra Thomas, Emmanuel Agu:
Broadening Secure Mobile Software Development (SMSD) Through Curriculum Development (Abstract Only). SIGCSE 2017: 715 - 2016
- [j12]Hossain Shahriar, Hisham Haddad:
Fuzzy Rule-Based Vulnerability Assessment Framework for Web Applications. Int. J. Secur. Softw. Eng. 7(2): 1-18 (2016) - [j11]Hossain Shahriar, Hisham M. Haddad, David Lebron, Rubana Yasmin Lupu:
Survey of Vulnerabilities and Mitigation Techniques for Mooc-Based Applications. Int. J. Secur. Softw. Eng. 7(4): 1-18 (2016) - [c46]Robert Bronte, Hossain Shahriar, Hisham M. Haddad:
Information Theoretic Anomaly Detection Framework for Web Application. COMPSAC Workshops 2016: 394-399 - [c45]Hossain Shahriar, Hisham M. Haddad, Pranahita Bulusu:
OCL Fault Injection-Based Detection of LDAP Query Injection Vulnerabilities. COMPSAC Workshops 2016: 455-460 - [c44]Hossain Shahriar, Svetlana Peletsverger, Humayun Zafar, Bill Bailey, Linda Johnston:
Digital Badges to Enhance Skills and Preparation for a Career in Cyber Security. COMPSAC Workshops 2016: 622-623 - [c43]Hossain Shahriar, Victor Clincy:
Anomalous Android Application Detection with Latent Semantic Indexing. COMPSAC Workshops 2016: 624-625 - [c42]Hossain Shahriar, Hisham Haddad:
Object injection vulnerability discovery based on latent semantic indexing. SAC 2016: 801-807 - [c41]Robert Bronte, Hossain Shahriar, Hisham M. Haddad:
A Signature-Based Intrusion Detection System for Web Applications based on Genetic Algorithm. SIN 2016: 32-39 - 2015
- [j10]Hossain Shahriar, Hisham M. Haddad:
Client-Side Detection of Clickjacking Attacks. Int. J. Inf. Secur. Priv. 9(1): 1-25 (2015) - [j9]Hossain Shahriar, Hisham M. Haddad, Vamshee Krishna Devendran:
Request and Response Analysis Framework for Mitigating Clickjacking Attacks. Int. J. Secur. Softw. Eng. 6(3): 1-25 (2015) - [c40]Hossain Shahriar, Stelvio Cimato, Jingyu Zhou, Katsuyoshi Iida:
Message from the Fast Abstract Chairs. COMPSAC Workshops 2015: 635 - [c39]David Lebron, Hossain Shahriar:
Comparing MOOC-based platforms: Reflection on pedagogical support, framework and learning analytics. CTS 2015: 167-174 - [c38]Pranahita Bulusu, Hossain Shahriar, Hisham M. Haddad:
Classification of Lightweight Directory Access Protocol query injection attacks and mitigation techniques. CTS 2015: 337-344 - [c37]David Lebron, Hossain Shahriar, Rubana Yasmin Lupu:
Security concerns and mitigation approaches for MOOC-based applications. ICITST 2015: 145-150 - [c36]Solomon Negash, Hossain Shahriar:
Mobile app permissions awareness. ICTA 2015: 1-4 - [c35]Victor Clincy, Hossain Shahriar:
A Novel Approach to Detect Tampered Wireless Network Applications. ITNG 2015: 197-199 - [c34]Hossain Shahriar, Hisham M. Haddad:
Security assessment of clickjacking risks in web applications: metrics based approach. SAC 2015: 791-797 - 2014
- [j8]Hossain Shahriar, Komminist Weldemariam, Mohammad Zulkernine, Thibaud Lutellier:
Effective detection of vulnerable and malicious browser extensions. Comput. Secur. 47: 66-84 (2014) - [j7]Hossain Shahriar, Sarah North, Wei-Chuen Chen, Edward Mawangi:
Information Theoretic XSS Attack Detection in Web Applications. Int. J. Secur. Softw. Eng. 5(3): 1-15 (2014) - [j6]Hossain Shahriar, Vamshee Krishna Devendran:
Classification of Clickjacking Attacks and Detection Techniques. Inf. Secur. J. A Glob. Perspect. 23(4-6): 137-147 (2014) - [c33]Hossain Shahriar, Sheetal Batchu:
Towards mutation-based testing of column-oriented database queries. ACM Southeast Regional Conference 2014: 11:1-11:6 - [c32]Chia-Tien Dan Lo, Kai Qian, Victor Clincy, Hossain Shahriar, Wei Chen:
Labware for networking protocols and wireless security using Android-enabled mobile devices. ACM Southeast Regional Conference 2014: 13:1-13:6 - [c31]Ying Xie, Hossain Shahriar, Jing He, Sarah North, Bennett Setzer, Kenneth E. Hoganson:
CS++: expanding CS curriculum via open cybersecurity courseware. ACM Southeast Regional Conference 2014: 24:1-24:7 - [c30]Dan Chia-Tien Lo, Kai Qian, Wei Chen, Hossain Shahriar, Victor Clincy:
Authentic learning in network and security with portable labs. FIE 2014: 1-5 - [c29]Hossain Shahriar, Sarah North, Edward Mawangi:
Testing of Memory Leak in Android Applications. HASE 2014: 176-183 - [c28]Hossain Shahriar, Victor Clincy:
Detection of repackaged Android Malware. ICITST 2014: 349-354 - [c27]Vanessa N. Cooper, Hossain Shahriar, Hisham M. Haddad:
A Survey of Android Malware Characterisitics and Mitigation Techniques. ITNG 2014: 327-332 - [c26]Hossain Shahriar, Hisham Haddad:
Risk assessment of code injection vulnerabilities using fuzzy logic-based system. SAC 2014: 1164-1170 - [c25]Hossain Shahriar, Hisham M. Haddad:
Content Provider Leakage Vulnerability Detection in Android Applications. SIN 2014: 359 - [c24]Komminist Weldemariam, Hossain Shahriar, Vamshee Krishna Devendran:
Dynamic Analysis of Web Objects. SIN 2014: 423 - 2013
- [c23]Hossain Shahriar, Sarah North, Wei-Chuen Chen:
Client-Side Detection of SQL Injection Attack. CAiSE Workshops 2013: 512-517 - [c22]Hossain Shahriar, Sarah North, Wei-Chuen Chen, Edward Mawangi:
Design and development of Anti-XSS proxy. ICITST 2013: 484-489 - [c21]Hossain Shahriar, Hisham M. Haddad:
Rule-Based Source Level Patching of Buffer Overflow Vulnerabilities. ITNG 2013: 627-632 - [c20]Hossain Shahriar, Vamshee Krishna Devendran, Hisham Haddad:
ProClick: a framework for testing clickjacking attacks in web applications. SIN 2013: 144-151 - [c19]Hossain Shahriar:
Security vulnerabilities and mitigation techniques of web applications. SIN 2013: 459 - [c18]Hossain Shahriar, Komminist Weldemariam, Thibaud Lutellier, Mohammad Zulkernine:
A Model-Based Detection of Vulnerable and Malicious Browser Extensions. SERE 2013: 198-207 - 2012
- [j5]Hossain Shahriar, Mohammad Zulkernine:
Mitigating program security vulnerabilities: Approaches and challenges. ACM Comput. Surv. 44(3): 11:1-11:46 (2012) - [j4]Hossain Shahriar, Mohammad Zulkernine:
Trustworthiness testing of phishing websites: A behavior model-based approach. Future Gener. Comput. Syst. 28(8): 1258-1271 (2012) - [c17]Hossain Shahriar, Mohammad Zulkernine:
Information-Theoretic Detection of SQL Injection Attacks. HASE 2012: 40-47 - [c16]Lorena Gutiérrez-Madronal, Hossain Shahriar, Mohammad Zulkernine, Juan José Domínguez-Jiménez, Inmaculada Medina-Bulo:
Mutation Testing of Event Processing Queries. ISSRE 2012: 21-30 - 2011
- [b1]Hossain Shahriar:
Mitigation of Web-Based Program Security Vulnerability Exploitations. Queen's University at Kingston, Ontario, Canada, 2011 - [j3]Hossain Shahriar, Mohammad Zulkernine:
Taxonomy and classification of automatic monitoring of program security vulnerability exploitations. J. Syst. Softw. 84(2): 250-269 (2011) - [c15]Hossain Shahriar, Mohammad Zulkernine:
Injecting Comments to Detect JavaScript Code Injection Attacks. COMPSAC Workshops 2011: 104-109 - [c14]Hossain Shahriar, Mohammad Zulkernine:
S2XS2: A Server Side Approach to Automatically Detect XSS Attacks. DASC 2011: 7-14 - [c13]Hossain Shahriar, Mohammad Zulkernine:
A Fuzzy Logic-Based Buffer Overflow Vulnerability Auditor. DASC 2011: 137-144 - [c12]Anton Barua, Hossain Shahriar, Mohammad Zulkernine:
Server Side Detection of Content Sniffing Attacks. ISSRE 2011: 20-29 - [c11]Hossain Shahriar, Mohammad Zulkernine:
Information Source-Based Classification of Automatic Phishing Website Detectors. SAINT 2011: 190-195 - 2010
- [j2]Hossain Shahriar, Mohammad Zulkernine:
Assessing Test Suites for Buffer Overflow Vulnerabilities. Int. J. Softw. Eng. Knowl. Eng. 20(1): 73-101 (2010) - [j1]Hossain Shahriar, Mohammad Zulkernine:
Monitoring Buffer Overflow Attacks: A Perennial Task. Int. J. Secur. Softw. Eng. 1(3): 18-40 (2010) - [c10]Hossain Shahriar, Mohammad Zulkernine:
Classification of Buffer Overflow Vulnerability Monitors. ARES 2010: 519-524 - [c9]Hossain Shahriar, Mohammad Zulkernine:
Client-Side Detection of Cross-Site Request Forgery Attacks. ISSRE 2010: 358-367 - [c8]Hossain Shahriar, Mohammad Zulkernine:
Classification of Static Analysis-Based Buffer Overflow Detectors. SSIRI (Companion) 2010: 94-101 - [c7]Hossain Shahriar, Mohammad Zulkernine:
PhishTester: Automatic Testing of Phishing Attacks. SSIRI 2010: 198-207
2000 – 2009
- 2009
- [c6]Hossain Shahriar, Mohammad Zulkernine:
Automatic Testing of Program Security Vulnerabilities. COMPSAC (2) 2009: 550-555 - [c5]Hossain Shahriar, Mohammad Zulkernine:
MUTEC: Mutation-based testing of Cross Site Scripting. SESS@ICSE 2009: 47-53 - 2008
- [c4]Hossain Shahriar, Mohammad Zulkernine:
Mutation-Based Testing of Buffer Overflow Vulnerabilities. COMPSAC 2008: 979-984 - [c3]Hossain Shahriar, Mohammad Zulkernine:
Mutation-Based Testing of Format String Bugs. HASE 2008: 229-238 - [c2]Hossain Shahriar, Mohammad Zulkernine:
MUSIC: Mutation-based SQL Injection Vulnerability Checking. QSIC 2008: 77-86 - 2007
- [c1]Mohammad Gias Uddin, Hossain Shahriar, Mohammad Zulkernine:
ACIR: An Aspect-Connector for Intrusion Response. COMPSAC (2) 2007: 249-254
Coauthor Index
aka: Hisham Haddad
aka: Akond Rahman
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint