A. B. M. Alim Al Islam

Orcid: 0000-0001-8159-6114

Affiliations:
  • Bangladesh University of Engineering and Technology (BUET), Dhaka, Bangladesh


According to our database1, A. B. M. Alim Al Islam authored at least 138 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
EmoBot: Artificial emotion generation through an emotional chatbot during general-purpose conversations.
Cogn. Syst. Res., January, 2024

2023
Orchestrating Image Retrieval and Storage Over a Cloud System.
IEEE Trans. Cloud Comput., 2023

Unmasking the Invisible: Finding Location-Specific Aggregated Air Quality Index with Smartphone-Captured Images.
CoRR, 2023

Sherlock in OSS: A Novel Approach of Content-Based Searching in Object Storage System.
CoRR, 2023

RemOrphan: Object Storage Sustainability Through Removing Offline-Processed Orphan Garbage Data.
IEEE Access, 2023

Leveraging a Smartwatch for Activity Recognition in Salat.
IEEE Access, 2023

Random Data Poisoning Attacks on Nonlinear Regression Learning.
Proceedings of the 10th International Conference on Networking, 2023

Soft-Touch or Hard-Touch: Quantifying Touches through A New System Focusing on A Pool Touchpad for Measuring Timing of Swimmers.
Proceedings of the 10th International Conference on Networking, 2023

Disparity-Aware Federated Learning for Intrusion Detection Systems in Imbalanced Non-IID Settings.
Proceedings of the 10th International Conference on Networking, 2023

Extending Shor's Quantum Error Correction Circuits Using Quantum Adders.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Fault Tolerance Analysis of Car-Following Models for Autonomous Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022

Shashthosheba: Dissecting Perception of Bangladeshi People towards Telemedicine Apps through the Lens of Features of the Apps.
CoRR, 2022

<i>LC-Net</i>: <i>L</i>ocalized <i>C</i>ounting <i>Net</i>work for Extremely Dense Crowds.
Appl. Soft Comput., 2022

Cri-Astrologer: Predicting Demography of Involved Criminals based on Historical Data.
Proceedings of the 2022 9th International Conference on Networking, 2022

Citadel: An Automated Abuse Detection System to Detect And Prevent Abusive Behaviors over Emails.
Proceedings of the 2022 9th International Conference on Networking, 2022

InnerEye: A Tale on Images Filtered Using Instagram Filters - How Do We Interact with them and How Can We Automatically Identify the Extent of Filtering?
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking and Services, 2022

Revealing Mental Disorders Through Stylometric Features in Write-Ups.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking and Services, 2022

Note: Plant Leaf Disease Network (PLeaD-Net): Identifying Plant Leaf Diseases through Leveraging Limited-Resource Deep Convolutional Neural Network.
Proceedings of the COMPASS '22: ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies, Seattle, WA, USA, 29 June 2022, 2022

NOTE: Unavoidable Service to Unnoticeable Risks: A Study on How Healthcare Record Management Opens the Doors of Unnoticeable Vulnerabilities for Rohingya Refugees.
Proceedings of the COMPASS '22: ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies, Seattle, WA, USA, 29 June 2022, 2022

Note: Towards Devising an Efficient VQA in the Bengali Language.
Proceedings of the COMPASS '22: ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies, Seattle, WA, USA, 29 June 2022, 2022

Revealing Influences of Socioeconomic Factors over Disease Outbreaks.
Proceedings of the COMPASS '22: ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies, Seattle, WA, USA, 29 June 2022, 2022

Note: CORONOSIS: Corona Prognosis via a Global Lens to Enable Efficient Policy-making Both at Global and Local Levels.
Proceedings of the COMPASS '22: ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies, Seattle, WA, USA, 29 June 2022, 2022

Investigating Human Factors in Willingness to Donate to the Small-scale Non-profit Organizations in Bangladesh.
Proceedings of the Companion Computer Supported Cooperative Work and Social Computing, 2022

2021
Towards Greening MapReduce Clusters Considering Both Computation Energy and Cooling Energy.
IEEE Trans. Parallel Distributed Syst., 2021

Man-in-the-Middle Attack on Contactless Payment over NFC Communications: Design, Implementation, Experiments and Detection.
IEEE Trans. Dependable Secur. Comput., 2021

Dakter Bari: Introducing Intermediary to Ensure Healthcare Services to Extremely Impoverished People.
Proc. ACM Hum. Comput. Interact., 2021

Towards achieving a delicate blending between rule-based translator and neural machine translator.
Neural Comput. Appl., 2021

Strategizing secured image storing and efficient image retrieval through a new cloud framework.
J. Netw. Comput. Appl., 2021

Human-Survey Interaction (HSI): A Study on Integrity of Human Data Collectors in a Mass-Scale Hajj Pilgrimage Survey.
IEEE Access, 2021

An Intelligent IoT Approach for Analyzing and Managing Crowds.
IEEE Access, 2021

Securing Firearms inside An Arsenal through Using A Remotely-Operated Sensor-Based Safety Mechanism.
Proceedings of the 8th NSysS 2021: 8th International Conference on Networking, Systems and Security, Cox's Bazar, Bangladesh, December 21, 2021

"A Tale on Abuse and Its Detection over Online Platforms, Especially over Emails": From the Context of Bangladesh.
Proceedings of the 8th NSysS 2021: 8th International Conference on Networking, Systems and Security, Cox's Bazar, Bangladesh, December 21, 2021

DhakaNet: Unstructured Vehicle Detection using Limited Computational Resources.
Proceedings of the IEEE International Conference on Data Mining, 2021

2020
Towards simulating non-lane based heterogeneous road traffic of less developed countries using authoritative polygonal GIS map.
Simul. Model. Pract. Theory, 2020

Learning from Tweets: Opportunities and Challenges to Inform Policy Making During Dengue Epidemic.
Proc. ACM Hum. Comput. Interact., 2020

Intelligent Human Counting through Environmental Sensing in Closed Indoor Settings.
Mob. Networks Appl., 2020

Leveraging Free-Hand Sketches for Potential Screening of PTSD.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

Let's Vibrate with Vibration: Augmenting Structural Engineering with Low-Cost Vibration Sensing.
CoRR, 2020

To Lane or Not to Lane? Comparing On-Road Experiences in Developing and Developed Countries using a New Simulator "RoadBird".
CoRR, 2020

The Past, Present, and Future of COVID-19: A Data-Driven Perspective.
CoRR, 2020

An Integrated Digital Platform for Bridging Gaps between General Public, Donors, and Social Welfare Organizations Working for Street Children in Bangladesh.
CoRR, 2020

Solving The Maze of Diagnosing Parkinson's Disease based on Portable EEG Sensing to be Adaptable to Go In-The-Wild.
Proceedings of the 7th NSysS 2020: 7th International Conference on Networking, 2020

Scaling Up Bit-Flip Quantum Error Correction.
Proceedings of the 7th NSysS 2020: 7th International Conference on Networking, 2020

Network Intrusion Detection System based on Conditional Variational Laplace AutoEncoder.
Proceedings of the 7th NSysS 2020: 7th International Conference on Networking, 2020

Enhancing Fidelity of Quantum Cryptography using Maximally Entangled Qubits.
Proceedings of the IEEE Global Communications Conference, 2020


2019
Exploring network-level performances of wireless nanonetworks utilizing gains of different types of nano-antennas with different materials.
Wirel. Networks, 2019

Enhancing throughput in multi-radio cognitive radio networks.
Wirel. Networks, 2019

A new network paradigm for low-cost and lightweight real-time communication between train and rail track to detect missing and faulty rail blocks.
J. Netw. Comput. Appl., 2019

Two Tell-tale Perspectives of PTSD: Neurobiological Abnormalities and Bayesian Regulatory Network of the Underlying Disorder in a Refugee Context.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

A Sweet Recipe for Consolidated Vulnerabilities: Attacking a Live Website by Harnessing a Killer Combination of Vulnerabilities.
CoRR, 2019

Power attack: An imminent security threat in real-time system for detecting missing rail blocks in developing countries.
Comput. Secur., 2019

A hybrid IoT-based approach for emergency evacuation.
Comput. Networks, 2019

A framework for extractive text summarization using semantic graph based approach.
Proceedings of the 6th International Conference on Networking, Systems and Securit, 2019

As you are, so shall you move your head: a system-level analysis between head movements and corresponding traits and emotions.
Proceedings of the 6th International Conference on Networking, Systems and Securit, 2019

Fault-tolerant design method for tizen applications considering core- and API-level faults.
Proceedings of the 6th International Conference on Networking, Systems and Securit, 2019

A generalized mechanism beyond NLP for real-time detection of cyber abuse through facial expression analytics.
Proceedings of the MobiQuitous 2019, 2019

How smart your smartphone is in lie detection?
Proceedings of the MobiQuitous 2019, 2019

HEliOS: huffman coding based lightweight encryption scheme for data transmission.
Proceedings of the MobiQuitous 2019, 2019

2018
Towards Devising a Low-cost and Easy-to-use Arithmetic Learning Framework for Economically Less-privileged Visually Impaired Children.
ACM Trans. Access. Comput., 2018

Exploiting a Synergy between Greedy Approach and NSGA for Scheduling in Computing Clusters.
Proceedings of the 5th International Conference on Networking, Systems and Security, 2018

A New Approach for Selecting Aggregated Multicast Trees to Reduce Forwarding States.
Proceedings of the 5th International Conference on Networking, Systems and Security, 2018

Super-savior: An Independent Open Platform Wearable for Generating Emergency Alarms.
Proceedings of the 5th International Conference on Networking, Systems and Security, 2018

A Tale of a Deep Learning Approach to Image Forgery Detection.
Proceedings of the 5th International Conference on Networking, Systems and Security, 2018

A Sweet Recipe for Consolidated Vulnerabilities: Attacking a Live Website by Harnessing a Killer Combination of Vulnerabilities for Greater Harm.
Proceedings of the 5th International Conference on Networking, Systems and Security, 2018

An Approach Towards Multilingual Translation By Semantic-Based Verb Identification And Root Word Analysis.
Proceedings of the 5th International Conference on Networking, Systems and Security, 2018

Conjugate Congestion Control Based Transport Layer Protocol for Molecular Communication in Body Area Nanonetworks (BANs).
Proceedings of the 5th International Conference on Networking, Systems and Security, 2018

Securing Highly-Sensitive Information in Smart Mobile Devices through Difficult-to-Mimic and Single-Time Usage Analytics.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

Duity: A Low-cost and Pervasive Finger-count Based Hand Gesture Recognition System for Low-literate and Novice Users.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

Predicting Human Count through Environmental Sensing in Closed Indoor Settings.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

Towards Simulating Non-lane Based Heterogeneous Road Traffic of Less Developed Countries.
Proceedings of the 5th International Conference on Information and Communication Technology for Sustainability, 2018

GMC: Greening MapReduce Clusters Considering Both Computational Energy and Cooling Energy.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

svLoad: An Automated Test-Driven Architecture for Load Testing in Cloud Systems.
Proceedings of the IEEE Global Communications Conference, 2018

Design and implementation of loss mitigation in spot instances.
Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering, 2018

2017
Intelligent dynamic spectrum access using hybrid genetic operators.
Swarm Evol. Comput., 2017

Towards defending eavesdropping on NFC.
J. Netw. Comput. Appl., 2017

An approach towards greening the digital display system.
Proceedings of the 4th International Conference on Networking, Systems and Security, 2017

Sparse mat: A tale of devising a low-cost directional system for pedestrian counting.
Proceedings of the International Conference on Networking, Systems and Security, 2017

Network-level performance enhancement in wireless nanosensor networks through multi-layer modifications.
Proceedings of the International Conference on Networking, Systems and Security, 2017

Keystroke/mouse usage based emotion detection and user identification.
Proceedings of the International Conference on Networking, Systems and Security, 2017

Cooling energy integration in SimGrid.
Proceedings of the International Conference on Networking, Systems and Security, 2017

iBuck: Reliable and secured image processing middleware for OpenStack Swift.
Proceedings of the International Conference on Networking, Systems and Security, 2017

Towards devising a solution for generating an alarm in a vehicle on waterways experiencing vulnerable swing.
Proceedings of the International Conference on Networking, Systems and Security, 2017

Efficient UAV deployment strategy for reconnaissance.
Proceedings of the 4th International Conference on Networking, Systems and Security, 2017

Polygot: An approach towards reliable translation by name identification and memory optimization using semantic analysis.
Proceedings of the 4th International Conference on Networking, Systems and Security, 2017

Trusted Worrier: A low-cost and high-accuracy user authentication system for firearm exploiting dynamic hand pressure biometrics.
Proceedings of the International Conference on Networking, Systems and Security, 2017

Towards perceiving and resolving the impediments to reporting for the developing countries.
Proceedings of the 4th International Conference on Networking, Systems and Security, 2017

Salty Secret: Let us secretly salt the secret.
Proceedings of the International Conference on Networking, Systems and Security, 2017

Devising a novel visible light based low-cost ultra-low-power gesture recognition system.
Proceedings of the International Conference on Networking, Systems and Security, 2017

Low-cost finger gesture recognition system for disabled and elderly people.
Proceedings of the International Conference on Networking, Systems and Security, 2017

Automated cost reduction while using multiple SIMs in a single mobile device.
Proceedings of the 4th International Conference on Networking, Systems and Security, 2017

Service-Hub: A better approach for developing the system of online marketing for daily services.
Proceedings of the 4th International Conference on Networking, Systems and Security, 2017

Propagation Loss Aware Routing in Wireless Nanosensor Networks Having Directional Nano-Antennas.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Can You Get into the Middle of Near Field Communication?
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Many-objective performance enhancement in computing clusters.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Fault-tolerant 3D mesh for network-on-chip.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Secure processing-aware media storage (SPMS).
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

FLight: A Low-Cost Reading and Writing System for Economically Less-Privileged Visually-Impaired People Exploiting Ink-based Braille System.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
Interference Aware Reliable Cooperative Cognitive Networks for Real-Time Applications.
IEEE Trans. Cogn. Commun. Netw., 2016

Channel Assignment Techniques for Multi-Radio Wireless Mesh Networks: A Survey.
IEEE Commun. Surv. Tutorials, 2016

A graph coloring based dynamic channel assignment algorithm for cognitive radio vehicular Ad Hoc networks.
Proceedings of the International Conference on Networking Systems and Security, 2016

Chameleon: defending secret information from eavesdropping over physical environment.
Proceedings of the International Conference on Networking Systems and Security, 2016

Supercrypt: a technique for quantum cryptography through simultaneously improving both security level and data rate.
Proceedings of the International Conference on Networking Systems and Security, 2016

Securing app distribution process of iOS exploiting the notion of authentic update.
Proceedings of the International Conference on Networking Systems and Security, 2016

Enhancing security in specialized use of mobile IP.
Proceedings of the International Conference on Networking Systems and Security, 2016

Poster: Power Attack in Body Area Networks: Dream or Reality?
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Poster: Overcoming Throughput Degradation in Multi-Radio Cognitive Radio Networks.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Poster: Infrastructure Independent Indoor Localization for Post-Disaster Rescue Mission.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Poster: RailCop: Detecting Missing Rail on Railway Using Wireless Sensor Networks.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Towards Making an Anonymous and One-Stop Online Reporting System for Third-World Countries.
Proceedings of the 7th Annual Symposium on Computing for Development, 2016

Power Attack: An Emerging Threat in Health-care Applications Using Medical Body Area Networks.
Proceedings of the 7th Annual Symposium on Computing for Development, 2016

AWZone: Ad hoc WiFi Zonification in Post-Disaster Settings.
Proceedings of the 7th Annual Symposium on Computing for Development, 2016

Polygot: Going Beyond Database Driven and Syntax-based Translation.
Proceedings of the 7th Annual Symposium on Computing for Development, 2016

Sporshohin: A Tale of Devising Visible Light Based Low-Cost Robust Touchless Input Device.
Proceedings of the 7th Annual Symposium on Computing for Development, 2016

What We Breathe As We Commute: From the Perspective of a Developing Country.
Proceedings of the 7th Annual Symposium on Computing for Development, 2016

EyePen: Ease of Reading for Less-Privileged Visually-Impaired People.
Proceedings of the 7th Annual Symposium on Computing for Development, 2016

2015
SiAc: simultaneous activation of heterogeneous radios in high data rate multi-hop wireless networks.
Wirel. Networks, 2015

SymCo: Symbiotic Coexistence of Single-hop and Multi-hop Transmissions in Next-generation Wireless Mesh Networks.
Wirel. Networks, 2015

iTCP: an intelligent TCP with neural network based end-to-end congestion control for ad-hoc multi-hop wireless mesh networks.
Wirel. Networks, 2015

General-purpose multi-objective vertical hand-off mechanism exploiting network dynamics.
Proceedings of the 11th IEEE International Conference on Wireless and Mobile Computing, 2015

Towards exploiting a synergy between cognitive and multi-radio networking.
Proceedings of the 11th IEEE International Conference on Wireless and Mobile Computing, 2015

Towards empirical study based mathematical modeling for throughput of MANETs.
Proceedings of the International Conference on Networking Systems and Security, 2015

A study on combining power management and power control for wireless sensor networks.
Proceedings of the International Conference on Networking Systems and Security, 2015

Sign of life: A system for escalating post-disaster rescue missions in ready-made garment factories.
Proceedings of the International Conference on Networking Systems and Security, 2015

Q-Nerve: Propagating signal of a damaged nerve using quantum networking.
Proceedings of the International Conference on Networking Systems and Security, 2015

Digging the innate reliability of wireless networked systems.
Proceedings of the International Conference on Networking Systems and Security, 2015

User identification through usage analysis of electronic devices.
Proceedings of the International Conference on Networking Systems and Security, 2015

Enhancing reliability of real-time traffic via cooperative scheduling in cognitive radio networks.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

2014
Backpacking: Energy-Efficient Deployment of Heterogeneous Radios in Multi-Radio High-Data-Rate Wireless Sensor Networks.
IEEE Access, 2014

2012
QRTT: Stateful Round Trip Time Estimation for Wireless Embedded Systems Using Q-Learning.
IEEE Embed. Syst. Lett., 2012

A Cross-Layer Analytical Model to Estimate the Capacity of a WiMAX Network.
Proceedings of the 20th IEEE International Symposium on Modeling, 2012

Multi-armed Bandit Congestion Control in Multi-hop Infrastructure Wireless Mesh Networks.
Proceedings of the 20th IEEE International Symposium on Modeling, 2012

2011
End-to-end congestion control in wireless mesh networks using a neural network.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Assessing the viability of cross-layer modeling for asynchronous, multi-hop, ad-hoc wireless mesh networks.
Proceedings of the 9th ACM International Workshop on Mobility Management & Wireless Access, 2011

μSETL: A set based programming abstraction for wireless sensor networks.
Proceedings of the 10th International Conference on Information Processing in Sensor Networks, 2011

Backpacking: Deployment of Heterogeneous Radios in High Data Rate Sensor Networks.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

2010
Stable Sensor Network (SSN): A Dynamic Clustering Technique for Maximizing Stability in Wireless Sensor Networks.
Wirel. Sens. Netw., 2010

Finding the Optimal Percentage of Cluster Heads from a New and Complete Mathematical Model on LEACH.
Wirel. Sens. Netw., 2010


  Loading...