Abdur Rahman Bin Shahid
Orcid: 0000-0002-3168-8907
According to our database1,
Abdur Rahman Bin Shahid
authored at least 41 papers
between 2012 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Evaluating Apple Intelligence's Writing Tools for Privacy Against Large Language Model-Based Inference Attacks: Insights from Early Datasets.
CoRR, June, 2025
Sponge Attacks on Sensing AI: Energy-Latency Vulnerabilities and Defense via Model Pruning.
CoRR, May, 2025
Evaluating Sustainability and Social Costs of Adversarial Training in Machine Learning.
IEEE Consumer Electron. Mag., May, 2025
Sticks and stones may break my bones, but words will never hurt me! - Navigating the cybersecurity risks of generative AI.
AI Soc., March, 2025
Exploring Audio Editing Features as User-Centric Privacy Defenses Against Emotion Inference Attacks.
CoRR, January, 2025
Towards Trustworthy Autonomous Vehicles with Vision-Language Models Under Targeted and Untargeted Adversarial Attacks.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2025
Benchmarking Large-Language Models for Resource-Efficient Medical AI for Edge Deployment.
Proceedings of the 2025 AAAI Spring Symposium Series, 2025
2024
Securing User Privacy in Cloud-Based Whiteboard Services Against Health Attribute Inference Attacks.
IEEE Trans. Artif. Intell., August, 2024
IEEE Consumer Electron. Mag., March, 2024
Context-Aware Spatiotemporal Poisoning Attacks on Wearable-Based Activity Recognition.
Proceedings of the IEEE INFOCOM 2024, 2024
Zero-Shot Detection and Sanitization of Data Poisoning Attacks in Wearable AI Using Large Language Models.
Proceedings of the International Conference on Machine Learning and Applications, 2024
Intelligent Fall Detection and Emergency Response for Smart Homes Using Language Models.
Proceedings of the International Conference on Machine Learning and Applications, 2024
TriplePlay: Enhancing Federated Learning with CLIP for Non-IID Data and Resource Efficiency.
Proceedings of the International Conference on Machine Learning and Applications, 2024
FLAMINGO: Adaptive and Resilient Federated Meta-Learning against Adversarial Attacks.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, ICDCS 2024, 2024
Towards Sustainable SecureML: Quantifying Carbon Footprint of Adversarial Machine Learning.
Proceedings of the IEEE International Conference on Communications Workshops, 2024
WatchOverGPT: A Framework for Real-Time Crime Detection and Response Using Wearable Camera and Large Language Model.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
Enhancing Road Safety Through Cost-Effective, Real-Time Monitoring of Driver Awareness with Resource-Constrained IoT Devices.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
FedAVO: Improving Communication Efficiency in Federated Learning with African Vultures Optimizer.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
Distributed Threat Intelligence at the Edge Devices: A Large Language Model-Driven Approach.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
2023
Assessing Wearable Human Activity Recognition Systems Against Data Poisoning Attacks in Differentially-Private Federated Learning.
Proceedings of the 2023 IEEE International Conference on Smart Computing, 2023
FLID: Intrusion Attack and Defense Mechanism for Federated Learning Empowered Connected Autonomous Vehicles (CAVs) Application.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023
2022
Facilitating Internet of Things (IoT) Experience in Computer and Information Systems Education.
J. Comput. Sci. Coll., 2022
Proceedings of the IEEE International Conference on Trust, 2022
Label Flipping Data Poisoning Attack Against Wearable Human Activity Recognition System.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2022
2021
Applying local differential privacy in handwriting recognition-based systems: faculty poster abstract.
J. Comput. Sci. Coll., 2021
Enhancing alternative proof of work for cryptocurrencies using machine learning: faculty poster abstract.
J. Comput. Sci. Coll., 2021
J. Comput. Sci. Coll., 2021
Evaluation of privacy-preserving Logistic Regression and Naive Bayes classifiers in healthcare: faculty poster abstract.
J. Comput. Sci. Coll., 2021
Delay-aware privacy-preserving location-based services under spatiotemporal constraints.
Int. J. Commun. Syst., 2021
2020
Proceedings of the Intelligent Robotics and Applications - 13th International Conference, 2020
2019
CoRR, 2019
Quantifying location privacy in permissioned blockchain-based internet of things (IoT).
Proceedings of the MobiQuitous 2019, 2019
Demo: Towards the Development of a Differentially Private Lightweight and Scalable Blockchain for IoT.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems Workshops, 2019
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019
2018
Check-ins and Photos: Spatiotemporal Correlation-Based Location Inference Attack and Defense in Location-Based Social Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 2018 IEEE World Congress on Services, 2018
Reputation-Aware Data Fusion and Malicious Participant Detection in Mobile Crowdsensing.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
2017
Proceedings of the 2017 International Conference on Computing, 2017
2012
A Non-Blind Watermarking Scheme for Gray Scale Images in Discrete Wavelet Transform Domain using Two Subbands
CoRR, 2012