| Publications
Bibliometrics can be found in Google Scholar.
2025
- R Haque, SM Aziz, T Hossain, FH Bappy, MN Yanhaona, T Islam; Collaborative Proof-of-Work: A Secure Dynamic Approach to Fair and Efficient Blockchain Mining | 2025 IEEE 15th Annual Computing and Communication Workshop and Conference (CCWC)📄 PDF
- T Hossain, FH Bappy, TS Zaman, T Islam; SEAM: A Secure Automated and Maintainable Smart Contract Upgrade Framework | 2025 IEEE Consumer Communications & Networking Conference (CCNC)📄 PDF
- FH Bappy, JS Park, K Hasan, T Islam; ChainGuard: A Blockchain-based Authentication and Access Control Scheme for Distributed Networks | 2025 IEEE Consumer Communications & Networking Conference (CCNC)📄 PDF
2024
- T Hossain, S Hassan, FH Bappy, MN Yanhaona, STA Rumee, M Zaber, T Islam; FlexiContracts: A Novel and Efficient Scheme for Upgrading Smart Contracts in Ethereum Blockchain | 2024 23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
- M Mia, MMA Pritom, T Islam, K Hasan; Visually Analyze SHAP Plots to Diagnose Misclassifications in ML-based Intrusion Detection | 2024 IEEE International Conference on Data Mining📄 PDF
- A Amin, K Hasan, S Zein-Sabatto, L Hong, S Shetty, I Ahmed, T Islam; Advancing Healthcare: Innovative ML Approaches for Improved Medical Imaging in Data-Constrained Environments | 2024 IEEE Global Communications Conference (GLOBECOM)📄 PDF
- FH Bappy, T Islam, K Hasan, MSI Sajid, MMA Pritom; Securing Proof of Stake Blockchains: Leveraging Multi-Agent Reinforcement Learning for Detecting and Mitigating Malicious Nodes | 2024 IEEE Global Communications Conference (GLOBECOM)📄 PDF
- FH Bappy, T Islam, K Hasan, JS Park, C Caicedo; Impact of Conflicting Transactions in Blockchain: Detecting and Mitigating Potential Attacks | 2024 IEEE Global Communications Conference (GLOBECOM)📄 PDF
- FH Bappy, TS Zaman, MSI Sajid, MMA Pritom, T Islam; Maximizing Blockchain Performance: Mitigating Conflicting Transactions through Parallelism and Dependency Management | 2024 IEEE International Conference on Blockchain (Blockchain)📄 PDF❝ Bibtex🌐 Proceedings
- T Islam, FH Bappy, MNUH Shifat, F Ahmad, K Hasan, TS Zaman; An Efficient and Scalable Auditing Scheme for Cloud Data Storage using an Enhanced B-tree | 2024 IEEE International Conference on Communications📄 PDF🌐 Proceedings
- E Haque, K Hasan, I Ahmed, MS Alam, T Islam; Enhancing UAV Security Through Zero Trust Architecture: An Advanced Deep Learning and Explainable AI Analysis | 2024 International Conference on Computing, Networking and Communications (ICNC)📄 PDF
- A Amin, K Hasan, S Zein-Sabatto, D Chimba, L Hong, I Ahmed, T Islam; Empowering Healthcare through Privacy-Preserving MRI Analysis | 2024 IEEE SoutheastCon📄 PDF
- T Islam, FH Bappy, TS Zaman, MSI Sajid, MMA Pritom; MRL-PoS: A Multi-agent Reinforcement Learning based Proof of Stake Consensus Algorithm for Blockchain | 2024 IEEE 14th Annual Computing and Communication Workshop and Conference📄 PDF❝ Bibtex🌐 Proceedings
- E Haque, K Hasan, I Ahmed, MS Alam, T Islam; Towards an Interpretable AI Framework for Advanced Classification of Unmanned Aerial Vehicles (UAVs) | 2024 IEEE Consumer Communications & Networking Conference📄 PDF🌐 Proceedings
- FH Bappy, T Islam, TS Zaman, MSI Sajid, MMA Pritom; ConChain: A Scheme for Contention-free and Attack Resilient BlockChain | 2024 IEEE Consumer Communications & Networking Conference📄 PDF
- S Ahmed, M Nahiduzzaman, T Islam, FH Bappy, TS Zaman, R Hasan; FASTEN: Towards a FAult-tolerant and STorage EfficieNt Cloud: Balancing Between Replication and Deduplication | 2024 IEEE Consumer Communications & Networking Conference📄 PDF
2023
- FH Bappy, S Zaman, T Islam, RA Rizvee, JS Park, K Hasan; Towards Immutability: A Secure and Efficient Auditing Framework for Cloud Supporting Data Integrity and File Version Control | 2023 IEEE Global Communications Conference📄 PDF❝ Bibtex🌐 Proceedings
- A Amin, K Hasan, S Zein-Sabatto, D Chimba, I Ahmed, T Islam; An Explainable AI Framework for Artificial Intelligence of Medical Things | 2023 IEEE Globecom Workshops (GC Wkshps)📄 PDF❝ Bibtex🌐 Proceedings
- FH Bappy, T Islam, TS Zaman, R Hasan, C Caicedo; A Deep Dive into the Google Cluster Workload Traces: Analyzing the Application Failure Characteristics and User Behaviors | 2023 10th International Conference on Future Internet of Things and Cloud📄 PDF❝ Bibtex🌐 Proceedings
- GR Sathi, L Vedullapalli, MH Kishan, TS Zaman, MT Islam, MM Badr; NetMiner: Identifying Failure-Inducing Patterns in the Logs Generated by Network Monitoring Software | 2023 14th International Conference on Computing Communication and Networking Technologies📄 PDF❝ Bibtex🌐 Proceedings
- MKB Shuhan, T Islam, EA Shuvo, FH Bappy, K Hasan, C Caicedo; Quarks: A Secure and Decentralized Blockchain-Based Messaging Network | 2023 IEEE 10th International Conference on Cyber Security and Cloud Computing📄 PDF❝ Bibtex🌐 Proceedings
- TS Zaman, T Islam, SR Vadla, UK Rangu; WasteMiner: An Efficient Waste Collection System for Smart Cities Leveraging IoT and Data Mining Technique | IEEE SoutheastCon 2023📄 PDF❝ Bibtex🌐 Proceedings
- MS Munir, SH Dipro, K Hasan, T Islam, S Shetty; Artificial Intelligence-Enabled Exploratory Cyber-Physical Safety Analyzer Framework for Civilian Urban Air Mobility | Applied Sciences 13 (2), 755, 2023📄 PDF❝ Bibtex🌐 Proceedings
2022
- K Hasan, S Shetty, T Islam, I Ahmed; Predictive Cyber Defense Remediation against Advanced Persistent Threat in Cyber-Physical Systems | 2022 International Conference on Computer Communications and Networks (ICCCN), 2022📄 PDF❝ Bibtex🌐 Proceedings
- T Islam, K Hasan, S Singh, JS Park; A Secure and Decentralized Auditing Scheme for Cloud Ensuring Data Integrity and Fairness in Auditing | 2022 IEEE 9th International Conference on Cyber Security and Cloud Computing, 2022📄 PDF❝ Bibtex🌐 Proceedings
- TS Zaman, T Islam; ReDPro: an automated technique to detect and regenerate process-level concurrency failures | Proceedings of the 2022 ACM Southeast Conference, 106-112, 2022📄 PDF❝ Bibtex🌐 Proceedings
2021
- K Hasan, S Shetty, S Ullah, A Hassanzadeh, T Islam; Criticality based Optimal Cyber Defense Remediation in Energy Delivery Systems | EAI Endorsed Transactions on Security and Safety 8 (28), 2021📄 PDF❝ Bibtex🌐 Proceedings
- MH Ashik, T Islam, K Hasan, K Lim; A Blockchain-Based Secure Fog-Cloud Architecture for Internet of Things | IEEE International Conference on Cybersecurity and Cloud Computing, 2021📄 PDF❝ Bibtex🌐 Proceedings
- H Mistareehi, T Islam, D Manivannan; A Secure and Distributed Architecture for Vehicular Cloud (Extended Version) | Internet of Things 13 (March, 2021), 2021📄 PDF❝ Bibtex🌐 Proceedings
2020
- T Islam; Algorithms for Achieving Fault-tolerance and Ensuring Security in Cloud Computing Systems (2020) | Theses and Dissertations– Computer Science 99 (Oct, 2020), University of Kentucky🌐 Proceedings
- T Islam, K Lim, D Manivannan; Blending Convergent Encryption and Access Control Scheme for Achieving A Secure and Storage Efficient Cloud | 2020 IEEE Consumer Communications & Networking Conference❝ Bibtex🌐 Proceedings
- K Lim, T Islam, K Hyunbum, J Jingon; A Sybil Attack Detection Scheme based on ADAS Sensors for Vehicular Networks | 2020 IEEE Consumer Communications & Networking Conference❝ Bibtex🌐 Proceedings
2019
- T Islam, H Mistareehi, D Manivannan; SecReS: A Secure and Reliable Storage Scheme for Cloud with Client-side Data Deduplication | 2019 IEEE Global Communications Conference❝ Bibtex🌐 Proceedings
- H Mistareehi, T Islam, K Lim, D Manivannan; A Secure and Distributed Architecture for Vehicular Cloud | 209 14th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing📄 PDF❝ Bibtex🌐 Proceedings
- T Islam, D Manivannan; FaCS: Toward a Fault-Tolerant Cloud Scheduler Leveraging Long Short-Term Memory Network | 2019 IEEE International Conference on Cybersecurity and Cloud Computing❝ Bibtex🌐 Proceedings
2017
- T Islam, D Manivannan; Predicting Application Failure in Cloud: A Machine Learning Approach | 2017 IEEE International Conference on Cognitive Computing📄 PDF❝ Bibtex🌐 Proceedings
2016
- T Islam, D Manivannan, S Zeadally; A classification and characterization of security threats in cloud computing | International Journal of Next-Generation Computing📄 PDF
Copyright © 2024
Last updated on December 6, 2024
Last updated on December 6, 2024