Ferdous A. Barbhuiya

Orcid: 0000-0001-8247-9171

According to our database1, Ferdous A. Barbhuiya authored at least 69 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Analyzing the suitability of IEEE 802.11ah for next generation Internet of Things: A comparative study.
Ad Hoc Networks, 2024

2023
Towards more robust hate speech detection: using social context and user data.
Soc. Netw. Anal. Min., December, 2023

SDN-Based Reconfigurable Edge Network Architecture for Industrial Internet of Things.
IEEE Internet Things J., September, 2023

A Role-Based Encryption (RBE) Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context.
IEEE Trans. Serv. Comput., 2023

RMA-CPABE : A multi-authority CPABE scheme with reduced ciphertext size for IoT devices.
Future Gener. Comput. Syst., 2023

OptFog: Optimized Mobility-Aware Task Offloading and Migration Model for Fog Networks.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2023

2022
Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment.
IEEE Trans. Cloud Comput., 2022

MACFI: A multi-authority access control scheme with efficient ciphertext and secret key size for fog-enhanced IoT.
J. Syst. Archit., 2022

IEEE 802.11ah-Enabled Internet of Drone Architecture.
IEEE Internet Things Mag., 2022

MAC Protocols for IEEE 802.11ah-Based Internet of Things: A Survey.
IEEE Internet Things J., 2022

A secure and efficient access control scheme with attribute revocation and merging capabilities for fog-enabled IoT.
Comput. Electr. Eng., 2022

L3Fog: Fog Node Selection and Task Offloading Framework for Mobile IoT.
Proceedings of the IEEE INFOCOM 2022, 2022

Mobility-aware Task Offloading in Fog-Assisted Networks.
Proceedings of the IEEE Global Communications Conference, 2022

2021
PAC-FIT: An efficient privacy preserving access control scheme for fog-enabled IoT.
Sustain. Comput. Informatics Syst., 2021

Predicting Popularity of Images Over 30 Days.
CoRR, 2021

Affect Classification in Tweets using Multitask Deep Neural Networks.
Proceedings of the Companion of The Web Conference 2021, 2021

MOFIT: An Efficient Access Control Scheme with Attribute Merging and Outsourcing Capability for Fog-Enhanced IoT.
Proceedings of the Parallel and Distributed Computing, Applications and Technologies, 2021

ioFog: Prediction-based Fog Computing Architecture for Offline IoT.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

Consumption of Hate Speech on Twitter: A Topical Approach to Capture Networks of Hateful Users.
Proceedings of the workshop Reducing Online Misinformation Through Credible Information Retrieval (ROMCIR 2021) co-located with 43rd European Conference on Information Retrieval (ECIR 2021), 2021

Capturing the Spread of Hate on Twitter Using Spreading Activation Models.
Proceedings of the Complex Networks & Their Applications X - Volume 2, Proceedings of the Tenth International Conference on Complex Networks and Their Applications COMPLEX NETWORKS 2021, Madrid, Spain, November 30, 2021

Homophily - a Driving Factor for Hate Speech on Twitter.
Proceedings of the Complex Networks & Their Applications X - Volume 2, Proceedings of the Tenth International Conference on Complex Networks and Their Applications COMPLEX NETWORKS 2021, Madrid, Spain, November 30, 2021

Hate Speech Detection on Social Media Using Graph Convolutional Networks.
Proceedings of the Complex Networks & Their Applications X - Volume 2, Proceedings of the Tenth International Conference on Complex Networks and Their Applications COMPLEX NETWORKS 2021, Madrid, Spain, November 30, 2021

Text Simplification for Comprehension-based Question-Answering.
Proceedings of the Seventh Workshop on Noisy User-generated Text, 2021

Empirical Assessment and Characterization of Homophily in Classes of Hate Speeches.
Proceedings of the 4th Workshop on Affective Content Analysis (AffCon 2021) co-located with Thirty-Fifth AAAI Conference on Artificial Intelligence (AAAI 2021), 2021

2020
A Role-Based Encryption Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context.
CoRR, 2020

Analysis and modelling of multi-stage attacks.
Proceedings of the 19th IEEE International Conference on Trust, 2020

ACS-FIT: A Secure and Efficient Access Control Scheme for Fog-enabled IoT.
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020

KAFK at SemEval-2020 Task 12: Checkpoint Ensemble of Transformers for Hate Speech Classification.
Proceedings of the Fourteenth Workshop on Semantic Evaluation, 2020

KAFK at SemEval-2020 Task 8: Extracting Features from Pre-trained Neural Networks to Classify Internet Memes.
Proceedings of the Fourteenth Workshop on Semantic Evaluation, 2020

IIITG-ADBU at SemEval-2020 Task 12: Comparison of BERT and BiLSTM in Detecting Offensive Language.
Proceedings of the Fourteenth Workshop on Semantic Evaluation, 2020

IIITG-ADBU at SemEval-2020 Task 9: SVM for Sentiment Analysis of English-Hindi Code-Mixed Text.
Proceedings of the Fourteenth Workshop on Semantic Evaluation, 2020

IIITG-ADBU at SemEval-2020 Task 8: A Multimodal Approach to Detect Offensive, Sarcastic and Humorous Memes.
Proceedings of the Fourteenth Workshop on Semantic Evaluation, 2020

Efficient Detection of Lesions During Endoscopy.
Proceedings of the Pattern Recognition. ICPR International Workshops and Challenges, 2020

Handloom Design Generation Using Generative Networks.
Proceedings of the IEEE International Conference on Image Processing, 2020

IIITG-ADBU@HASOC-Dravidian-CodeMix-FIRE2020: Offensive Content Detection in Code-Mixed Dravidian Text.
Proceedings of the Working Notes of FIRE 2020, 2020

Ensemble of ELECTRA for Profiling Fake News Spreaders.
Proceedings of the Working Notes of CLEF 2020, 2020

Automatic Detection of Fake News Spreaders Using BERT.
Proceedings of the Working Notes of CLEF 2020, 2020

Document Management System using Blockchain and Inter Planetary File System.
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020

Aggression Identification in English, Hindi and Bangla Text using BERT, RoBERTa and SVM.
Proceedings of the Second Workshop on Trolling, Aggression and Cyberbullying, 2020

Context-Aware Sarcasm Detection Using BERT.
Proceedings of the Second Workshop on Figurative Language Processing, 2020

2019
Cloud Based Weather Station using IoT Devices.
Proceedings of the TENCON 2019, 2019

ABARUAH at SemEval-2019 Task 5 : Bi-directional LSTM for Hate Speech Detection.
Proceedings of the 13th International Workshop on Semantic Evaluation, 2019

Team FalsePostive at HASOC 2019: Transfer-Learning for Detection and Classification of Hate Speech.
Proceedings of the Working Notes of FIRE 2019, 2019

IIITG-ADBU at HASOC 2019: Automated Hate Speech and Offensive Content Detection in English and Code-Mixed Hindi Text.
Proceedings of the Working Notes of FIRE 2019, 2019

Blockchain in Smart Power Grid Infrastructure.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019

A Framework for Maintaining Citizenship Record on Blockchain.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019

Cloud Data Provenance using IPFS and Blockchain Technology.
Proceedings of the 7th International Workshop on Security in Cloud Computing, 2019

2018
ICAuth: A secure and scalable owner delegated inter-cloud authorization.
Future Gener. Comput. Syst., 2018

2017
Convolutional neural networks for ocular smartphone-based biometrics.
Pattern Recognit. Lett., 2017

A universal cloud user revocation scheme with key-escrow resistance for ciphertext-policy attribute-based access control.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

EyamKayo: Interactive Gaze and Facial Expression Captcha.
Proceedings of the Companion Publication of the 22nd International Conference on Intelligent User Interfaces, 2017

2016
SenTion: A framework for Sensing Facial Expressions.
CoRR, 2016

A Secure Re-encryption Scheme for Data Sharing in Unreliable Cloud Environment.
Proceedings of the IEEE World Congress on Services, 2016

A preliminary study of CNNs for iris and periocular verification in the visible spectrum.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

Eye center localization and detection using radial mapping.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

ISURE: User authentication in mobile devices using ocular biometrics in visible spectrum.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

2015
PairVoting: A secure online voting scheme using Pairing-Based Cryptography and Fuzzy Extractor.
Proceedings of the 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2015

2013
An Active Host-Based Intrusion Detection System for ARP-Related Attacks and its Verification.
CoRR, 2013

2012
An Active Detection Mechanism for Detecting ICMP Based Attacks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Detection and Mitigation of Induced Low Rate TCP-Targeted Denial of Service Attack.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Obfuscated malware detection using API call dependency.
Proceedings of the First International Conference on Security of Internet of Things, 2012

Security in Mobile agent systems with Locator mechanism.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

An Anomaly Based Approach for HID Attack Detection Using Keystroke Dynamics.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

2011
Detecting Metamorphic Virus Using Hidden Markov Model and Genetic Algorithm.
Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011, 2011

An active DES based IDS for ARP spoofing.
Proceedings of the IEEE International Conference on Systems, 2011

Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor Networks.
Proceedings of the Information Systems Security - 7th International Conference, 2011

A host based DES approach for detecting ARP spoofing.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

2010
An Active Intrusion Detection System for LAN Specific Attacks.
Proceedings of the Advances in Computer Science and Information Technology, 2010


  Loading...