Farzana Rahman

Orcid: 0000-0002-4785-5845

According to our database1, Farzana Rahman authored at least 84 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
MetaLLM: Residue-Wise Metal Ion Prediction Using Deep Transformer Model.
Proceedings of the Bioinformatics and Biomedical Engineering, 2023

2022
Low-Cost Real-Time PPP GNSS Aided INS for CAV Applications.
IEEE Trans. Intell. Transp. Syst., 2022

Diversifying the Face of Computing through Re-entry Initiatives for Returning Women.
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022

Identifying Effective Re-entry Pathways for Returning Women to Transition into Computing and Tech Education and Workforce.
Proceedings of the IEEE Frontiers in Education Conference, 2022

2021
Outlier Accommodation in Nonlinear State Estimation: A Risk-Averse Performance- Specified Approach.
IEEE Trans. Control. Syst. Technol., 2021

Re-Entering Computing through Emerging Technology: Current State and Special Issue Introduction.
ACM Trans. Comput. Educ., 2021

Vehicle ECEF Position Accuracy and Reliability in the Presence of DGNSS Communication Latency.
IEEE Intell. Transp. Syst. Mag., 2021

Investigating the Role of Different Prep Pathways on CS2 Performance Across Three Different Majors.
Proceedings of the SIGITE '21: The 22nd Annual Conference on Information Technology Education, SnowBird, UT, USA, October 6, 2021

Equipping and Empowering Faculty through Professional Development to Create a Future-Ready Workforce in Emerging Technologies.
Proceedings of the SIGITE '21: The 22nd Annual Conference on Information Technology Education, SnowBird, UT, USA, October 6, 2021

Debugging the Diversity Tech's Gap through (Re-)entry Initiatives in Emerging Technologies for Women.
Proceedings of the SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education, 2021

2020
Cultivating Next Generation Emerging Technology Workforce through Academia-Industry Partnerships.
Proceedings of the SIGITE '20: The 21st Annual Conference on Information Technology Education, 2020

Understanding Barriers and Motivations of Non-Traditional Students Learning Programming in an Online CS1 Course.
Proceedings of the SIGITE '20: The 21st Annual Conference on Information Technology Education, 2020

Debugging the Gender Gap: (Re-)entry Initiatives in Emerging Technologies for Women.
Proceedings of the SIGITE '20: The 21st Annual Conference on Information Technology Education, 2020

Transforming the Learning Experience of Non-Traditional Students in an Online CS1 Course through Peer-Instruction.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

RESET (Re-Enter STEM through Emerging Technology): Finding Re-Entry Pathways for Women.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

Through the Looking-Glass: Barriers, Motivations, and Desires of Non-Traditional Students Learning Programming in an Online CS1 Course.
Proceedings of the Research on Equity and Sustained Participation in Engineering, 2020

Role of Academia to Create Re-entry Pathways in Computing.
Proceedings of the Research on Equity and Sustained Participation in Engineering, 2020

A Framework to Figure Out Breast Cancer Cells Using Ultrasound Images.
Proceedings of the 11th International Conference on Computing, 2020

2019
Challenges in Partially-Automated Roadway Feature Mapping Using Mobile Laser Scanning and Vehicle Trajectory Data.
CoRR, 2019

Cloud-based Low-cost Energy Monitoring System through Internet of Things.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

Graph Based Image Matching Using the Fusion of Several Kinds of Features.
Proceedings of the 4th International Conference on Multimedia Systems and Signal Processing, 2019

Earth-Centered Earth-Fixed (ECEF) Vehicle State Estimation Performance.
Proceedings of the 2019 IEEE Conference on Control Technology and Applications, 2019

2018
The ISCB Student Council Internship Program: Expanding computational biology capacity worldwide.
PLoS Comput. Biol., 2018

Reflections on a journey: a retrospective of the ISCB Student Council symposium series.
BMC Bioinform., 2018

Designing Creative Assessments for Online Computer Science and IT Courses.
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018

Leveraging Visual Programming Language and Collaborative Learning to Broaden Participation in Computer Science.
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018

Fostering Undergraduate Research through Mobile Development Course in PUIs.
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018

Integrating Project-Based Learning in Mobile Development Course to Enhance Student Learning Experience.
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018

How to Build a Student-Centered Research Culture for the Benefit of Undergraduate Students: (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Effective POGIL Implementation Approaches in Computer Science Courses: (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

ECEF position accuracy and reliability in the presence of differential correction latency.
Proceedings of the IEEE/ION Position, Location and Navigation Symposium, 2018

Outlier accommodation for meter-level positioning: Risk-averse performance-specified state estimation.
Proceedings of the IEEE/ION Position, Location and Navigation Symposium, 2018

Super-savior: An Independent Open Platform Wearable for Generating Emergency Alarms.
Proceedings of the 5th International Conference on Networking, Systems and Security, 2018

Securing Highly-Sensitive Information in Smart Mobile Devices through Difficult-to-Mimic and Single-Time Usage Analytics.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

Healthy Hankerings: Motivating Adolescents to Combat Obesity with a Mobile Application.
Proceedings of the Human-Computer Interaction. Interaction in Context, 2018

Outlier Accommodation By Risk-Averse Performance-Specified Nonlinear State Estimation: GNSS Aided INS.
Proceedings of the 57th IEEE Conference on Decision and Control, 2018

Outlier Accommodation By Risk-Averse Performance-Specified Linear State Estimation.
Proceedings of the 57th IEEE Conference on Decision and Control, 2018

2017
AnonPri: A secure anonymous private authentication protocol for RFID systems.
Inf. Sci., 2017

A privacy preserving framework for RFID based healthcare systems.
Future Gener. Comput. Syst., 2017

Can we really do it?: Conducting Significant Computer Science Research in Primarily Undergraduate Institutions (PUIs) (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

Bringing Undergraduate Research Experience in Non-R1 Institutions.
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

A wireless IoT system towards gait detection in stroke patients.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

Roadway feature mapping from point cloud data: A graph-based clustering approach.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2017

2016
Highlights from the 11th ISCB Student Council Symposium 2015: Dublin, Ireland. 10 July 2015.
BMC Bioinform., February, 2016

Privacy Challenges and Goals in mHealth Systems.
Adv. Comput., 2016

Securing app distribution process of iOS exploiting the notion of authentic update.
Proceedings of the International Conference on Networking Systems and Security, 2016

2015
Highlights from the 1st Student Symposium on Computational Biology and Life Sciences, organised by ISCB Regional Student Group, UK.
PeerJ Prepr., 2015

Highlights from the tenth ISCB Student Council Symposium 2014.
BMC Bioinform., 2015

Juggling the Jigsaw: Enabling CS1 Growing Enrollment and Diversity at Undergraduate Institutions (Abstract Only).
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

CS 4 Everyone: Diversifying the K-12 Pipeline for CS at College and High School Level (Abstract Only).
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

Message from the STPSA 2015 Workshop Organizers.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

2014
Efficient detection of counterfeit products in large-scale RFID systems using batch authentication protocols.
Pers. Ubiquitous Comput., 2014

A semi-automated technique for labeling and counting of apoptosing retinal cells.
BMC Bioinform., 2014

Seeing Beyond Visibility: A Four Way Fusion of User Authentication for Efficient Usable Security on Mobile Devices.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

PriSN: a privacy protection framework for healthcare social networking sites.
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 2014

PriDaC: Privacy Preserving Data Collection in Sensor Enabled RFID Based Healthcare Services.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014

2013
Preserving User Privacy in Pervasive Environments with a Collaborative Model.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

<i>iPrevention</i>: towards a novel real-time smartphone-based fall prevention system.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

PriGen: A Generic Framework to Preserve Privacy of Healthcare Data in the Cloud.
Proceedings of the Inclusive Society: Health and Wellbeing in the Community, and Care at Home, 2013

Towards Improving Reliability of Computational RFID Based Smart Healthcare Monitoring Systems.
Proceedings of the Inclusive Society: Health and Wellbeing in the Community, and Care at Home, 2013

2012
Evolution of Energy Awareness Using an Open Carbon Footprint Calculation Platform.
Proceedings of the Handbook of Energy-Aware and Green Computing - Two Volume Set., 2012

User privacy protection in pervasive social networking applications using PCO.
Int. J. Soc. Comput. Cyber Phys. Syst., 2012

Let EcoDrive be your guide: development of a mobile tool to reduce carbon footprint and promote green transport.
Proceedings of the ACM Symposium on Applied Computing, 2012

DRAP: a Robust Authentication protocol to ensure survivability of computational RFID networks.
Proceedings of the ACM Symposium on Applied Computing, 2012

<i>MonAC</i>: detecting missing tags for improved accuracy in computational RFID based assisted environments.
Proceedings of the Research in Applied Computation Symposium, 2012

Looking for needles in a haystack: Detecting counterfeits in large scale RFID systems using batch authentication protocol.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

I am not a goldfish in a bowl: A privacy preserving framework for RFID based healthcare systems.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

2011
Design and implementation of an open framework for ubiquitous carbon footprint calculator applications.
Sustain. Comput. Informatics Syst., 2011

An approach to open carbon footprint calculation platform design.
Proceedings of the 2011 IEEE International Conference on Service-Oriented Computing and Applications, 2011

ProQuPri: towards anonymity protection with privacy quantification for context-aware applications.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

REBIVE: a reliable private data aggregation scheme for wireless sensor networks.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

AnonPri: An efficient anonymous private authentication protocol.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

2010
Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments.
Wirel. Pers. Commun., 2010

Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments.
J. Syst. Softw., 2010

Preserve Your Privacy with PCO: A Privacy Sensitive Architecture for Context Obfuscation for Pervasive E-Community Based Applications.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

S-search: finding RFID tags using scalable and secure search protocol.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

UCFC - Ubiquitous personal Carbon Footprint Calculation Platform.
Proceedings of the International Green Computing Conference 2010, 2010

2009
Enhanced Partial Dominant Pruning (EPDP) Based Broadcasting in Ad hoc Wireless Networks.
J. Networks, 2009

Trust based security auto-configuration for smart assisted living environments.
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, 2009

Supporting recovery, privacy and security in RFID systems using a robust authentication protocol.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

An Adaptive Initial Trust and Demand Aware Secure Resource Discovery (AID-SRD) Model for Pervasive Environments.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

2008
Secured tag identification using EDSA (enhanced distributed scalable architecture).
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Towards Secure Trust Bootstrapping in Pervasive Computing Environment.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

ERAP: ECC Based RFID Authentication Protocol.
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008


  Loading...