| Publications

Bibliometrics can be found in Google Scholar.

2025

  • R Haque, SM Aziz, T Hossain, FH Bappy, MN Yanhaona, T IslamCollaborative Proof-of-Work: A Secure Dynamic Approach to Fair and Efficient Blockchain Mining | 2025 IEEE 15th Annual Computing and Communication Workshop and Conference (CCWC)📄 PDF
  • T Hossain, FH Bappy, TS Zaman, T IslamSEAM: A Secure Automated and Maintainable Smart Contract Upgrade Framework | 2025 IEEE Consumer Communications & Networking Conference (CCNC)📄 PDF
  • FH Bappy, JS Park, K Hasan, T IslamChainGuard: A Blockchain-based Authentication and Access Control Scheme for Distributed Networks | 2025 IEEE Consumer Communications & Networking Conference (CCNC)📄 PDF

2024

  • T Hossain, S Hassan, FH Bappy, MN Yanhaona, STA Rumee, M Zaber, T IslamFlexiContracts: A Novel and Efficient Scheme for Upgrading Smart Contracts in Ethereum Blockchain | 2024 23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
  • M Mia, MMA Pritom, T Islam, K HasanVisually Analyze SHAP Plots to Diagnose Misclassifications in ML-based Intrusion Detection | 2024 IEEE International Conference on Data Mining📄 PDF
  • A Amin, K Hasan, S Zein-Sabatto, L Hong, S Shetty, I Ahmed, T IslamAdvancing Healthcare: Innovative ML Approaches for Improved Medical Imaging in Data-Constrained Environments | 2024 IEEE Global Communications Conference (GLOBECOM)📄 PDF
  • FH Bappy, T Islam, K Hasan, MSI Sajid, MMA PritomSecuring Proof of Stake Blockchains: Leveraging Multi-Agent Reinforcement Learning for Detecting and Mitigating Malicious Nodes | 2024 IEEE Global Communications Conference (GLOBECOM)📄 PDF
  • FH Bappy, T Islam, K Hasan, JS Park, C CaicedoImpact of Conflicting Transactions in Blockchain: Detecting and Mitigating Potential Attacks | 2024 IEEE Global Communications Conference (GLOBECOM)📄 PDF
  • FH Bappy, TS Zaman, MSI Sajid, MMA Pritom, T IslamMaximizing Blockchain Performance: Mitigating Conflicting Transactions through Parallelism and Dependency Management | 2024 IEEE International Conference on Blockchain (Blockchain)📄 PDF❝ Bibtex🌐 Proceedings
  • T Islam, FH Bappy, MNUH Shifat, F Ahmad, K Hasan, TS ZamanAn Efficient and Scalable Auditing Scheme for Cloud Data Storage using an Enhanced B-tree | 2024 IEEE International Conference on Communications📄 PDF🌐 Proceedings
  • E Haque, K Hasan, I Ahmed, MS Alam, T IslamEnhancing UAV Security Through Zero Trust Architecture: An Advanced Deep Learning and Explainable AI Analysis | 2024 International Conference on Computing, Networking and Communications (ICNC)📄 PDF
  • A Amin, K Hasan, S Zein-Sabatto, D Chimba, L Hong, I Ahmed, T IslamEmpowering Healthcare through Privacy-Preserving MRI Analysis | 2024 IEEE SoutheastCon📄 PDF
  • T Islam, FH Bappy, TS Zaman, MSI Sajid, MMA PritomMRL-PoS: A Multi-agent Reinforcement Learning based Proof of Stake Consensus Algorithm for Blockchain | 2024 IEEE 14th Annual Computing and Communication Workshop and Conference📄 PDF❝ Bibtex🌐 Proceedings
  • E Haque, K Hasan, I Ahmed, MS Alam, T IslamTowards an Interpretable AI Framework for Advanced Classification of Unmanned Aerial Vehicles (UAVs) | 2024 IEEE Consumer Communications & Networking Conference📄 PDF🌐 Proceedings
  • FH Bappy, T Islam, TS Zaman, MSI Sajid, MMA PritomConChain: A Scheme for Contention-free and Attack Resilient BlockChain | 2024 IEEE Consumer Communications & Networking Conference📄 PDF
  • S Ahmed, M Nahiduzzaman, T Islam, FH Bappy, TS Zaman, R HasanFASTEN: Towards a FAult-tolerant and STorage EfficieNt Cloud: Balancing Between Replication and Deduplication | 2024 IEEE Consumer Communications & Networking Conference📄 PDF

2023

  • FH Bappy, S Zaman, T Islam, RA Rizvee, JS Park, K HasanTowards Immutability: A Secure and Efficient Auditing Framework for Cloud Supporting Data Integrity and File Version Control | 2023 IEEE Global Communications Conference📄 PDF❝ Bibtex🌐 Proceedings
  • A Amin, K Hasan, S Zein-Sabatto, D Chimba, I Ahmed, T IslamAn Explainable AI Framework for Artificial Intelligence of Medical Things | 2023 IEEE Globecom Workshops (GC Wkshps)📄 PDF❝ Bibtex🌐 Proceedings
  • FH Bappy, T Islam, TS Zaman, R Hasan, C CaicedoA Deep Dive into the Google Cluster Workload Traces: Analyzing the Application Failure Characteristics and User Behaviors | 2023 10th International Conference on Future Internet of Things and Cloud📄 PDF❝ Bibtex🌐 Proceedings
  • GR Sathi, L Vedullapalli, MH Kishan, TS Zaman, MT Islam, MM BadrNetMiner: Identifying Failure-Inducing Patterns in the Logs Generated by Network Monitoring Software | 2023 14th International Conference on Computing Communication and Networking Technologies📄 PDF❝ Bibtex🌐 Proceedings
  • MKB Shuhan, T Islam, EA Shuvo, FH Bappy, K Hasan, C CaicedoQuarks: A Secure and Decentralized Blockchain-Based Messaging Network | 2023 IEEE 10th International Conference on Cyber Security and Cloud Computing📄 PDF❝ Bibtex🌐 Proceedings
  • TS Zaman, T Islam, SR Vadla, UK RanguWasteMiner: An Efficient Waste Collection System for Smart Cities Leveraging IoT and Data Mining Technique | IEEE SoutheastCon 2023📄 PDF❝ Bibtex🌐 Proceedings
  • MS Munir, SH Dipro, K Hasan, T Islam, S ShettyArtificial Intelligence-Enabled Exploratory Cyber-Physical Safety Analyzer Framework for Civilian Urban Air Mobility | Applied Sciences 13 (2), 755, 2023📄 PDF❝ Bibtex🌐 Proceedings

2022

  • K Hasan, S Shetty, T Islam, I AhmedPredictive Cyber Defense Remediation against Advanced Persistent Threat in Cyber-Physical Systems | 2022 International Conference on Computer Communications and Networks (ICCCN), 2022📄 PDF❝ Bibtex🌐 Proceedings
  • T Islam, K Hasan, S Singh, JS ParkA Secure and Decentralized Auditing Scheme for Cloud Ensuring Data Integrity and Fairness in Auditing | 2022 IEEE 9th International Conference on Cyber Security and Cloud Computing, 2022📄 PDF❝ Bibtex🌐 Proceedings
  • TS Zaman, T IslamReDPro: an automated technique to detect and regenerate process-level concurrency failures | Proceedings of the 2022 ACM Southeast Conference, 106-112, 2022📄 PDF❝ Bibtex🌐 Proceedings

2021

  • K Hasan, S Shetty, S Ullah, A Hassanzadeh, T IslamCriticality based Optimal Cyber Defense Remediation in Energy Delivery Systems | EAI Endorsed Transactions on Security and Safety 8 (28), 2021📄 PDF❝ Bibtex🌐 Proceedings
  • MH Ashik, T Islam, K Hasan, K LimA Blockchain-Based Secure Fog-Cloud Architecture for Internet of Things | IEEE International Conference on Cybersecurity and Cloud Computing, 2021📄 PDF❝ Bibtex🌐 Proceedings
  • H Mistareehi, T Islam, D ManivannanA Secure and Distributed Architecture for Vehicular Cloud (Extended Version) | Internet of Things 13 (March, 2021), 2021📄 PDF❝ Bibtex🌐 Proceedings

2020

  • T IslamAlgorithms for Achieving Fault-tolerance and Ensuring Security in Cloud Computing Systems (2020) | Theses and Dissertations– Computer Science 99 (Oct, 2020), University of Kentucky🌐 Proceedings
  • T Islam, K Lim, D ManivannanBlending Convergent Encryption and Access Control Scheme for Achieving A Secure and Storage Efficient Cloud | 2020 IEEE Consumer Communications & Networking Conference❝ Bibtex🌐 Proceedings
  • K Lim, T Islam, K Hyunbum, J JingonA Sybil Attack Detection Scheme based on ADAS Sensors for Vehicular Networks | 2020 IEEE Consumer Communications & Networking Conference❝ Bibtex🌐 Proceedings

2019

  • T Islam, H Mistareehi, D ManivannanSecReS: A Secure and Reliable Storage Scheme for Cloud with Client-side Data Deduplication | 2019 IEEE Global Communications Conference❝ Bibtex🌐 Proceedings
  • H Mistareehi, T Islam, K Lim, D ManivannanA Secure and Distributed Architecture for Vehicular Cloud | 209 14th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing📄 PDF❝ Bibtex🌐 Proceedings
  • T Islam, D ManivannanFaCS: Toward a Fault-Tolerant Cloud Scheduler Leveraging Long Short-Term Memory Network | 2019 IEEE International Conference on Cybersecurity and Cloud Computing❝ Bibtex🌐 Proceedings

2017

  • T Islam, D ManivannanPredicting Application Failure in Cloud: A Machine Learning Approach | 2017 IEEE International Conference on Cognitive Computing📄 PDF❝ Bibtex🌐 Proceedings

2016

  • T Islam, D Manivannan, S ZeadallyA classification and characterization of security threats in cloud computing | International Journal of Next-Generation Computing📄 PDF
Copyright © 2024
Last updated on December 6, 2024