Ferdous A. Barbhuiya

According to our database1, Ferdous A. Barbhuiya authored at least 23 papers between 2010 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
ABARUAH at SemEval-2019 Task 5 : Bi-directional LSTM for Hate Speech Detection.
Proceedings of the 13th International Workshop on Semantic Evaluation, 2019

Blockchain in Smart Power Grid Infrastructure.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019

A Framework for Maintaining Citizenship Record on Blockchain.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019

2018
ICAuth: A secure and scalable owner delegated inter-cloud authorization.
Future Generation Comp. Syst., 2018

2017
Convolutional neural networks for ocular smartphone-based biometrics.
Pattern Recognition Letters, 2017

A universal cloud user revocation scheme with key-escrow resistance for ciphertext-policy attribute-based access control.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

EyamKayo: Interactive Gaze and Facial Expression Captcha.
Proceedings of the Companion Publication of the 22nd International Conference on Intelligent User Interfaces, 2017

2016
A Secure Re-encryption Scheme for Data Sharing in Unreliable Cloud Environment.
Proceedings of the IEEE World Congress on Services, 2016

A preliminary study of CNNs for iris and periocular verification in the visible spectrum.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

Eye center localization and detection using radial mapping.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

ISURE: User authentication in mobile devices using ocular biometrics in visible spectrum.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

2015
PairVoting: A secure online voting scheme using Pairing-Based Cryptography and Fuzzy Extractor.
Proceedings of the 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2015

2012
An Active Detection Mechanism for Detecting ICMP Based Attacks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Detection and Mitigation of Induced Low Rate TCP-Targeted Denial of Service Attack.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Obfuscated malware detection using API call dependency.
Proceedings of the First International Conference on Security of Internet of Things, 2012

Security in Mobile agent systems with Locator mechanism.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

An Anomaly Based Approach for HID Attack Detection Using Keystroke Dynamics.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

2011
Detecting Metamorphic Virus Using Hidden Markov Model and Genetic Algorithm.
Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011, 2011

An active DES based IDS for ARP spoofing.
Proceedings of the IEEE International Conference on Systems, 2011

Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor Networks.
Proceedings of the Information Systems Security - 7th International Conference, 2011

A host based DES approach for detecting ARP spoofing.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

2010
An Active Intrusion Detection System for LAN Specific Attacks.
Proceedings of the Advances in Computer Science and Information Technology, 2010


  Loading...