Md Delwar Hossain

Orcid: 0000-0002-5968-0704

According to our database1, Md Delwar Hossain authored at least 26 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Electricity Theft Detection for Smart Homes: Harnessing the Power of Machine Learning With Real and Synthetic Attacks.
IEEE Access, 2024

Vision Based Malware Classification Using Deep Neural Network with Hybrid Data Augmentation.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

Banking Malware Detection: Leveraging Federated Learning with Conditional Model Updates and Client Data Heterogeneity.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2023
Towards Autonomous Driving Model Resistant to Adversarial Attack.
Appl. Artif. Intell., December, 2023

Towards evaluating robustness of violence detection in videos using cross-domain transferability.
J. Inf. Secur. Appl., September, 2023

Modbus/RS-485 Attack Detection on Communication Signals with Machine Learning.
IEEE Commun. Mag., June, 2023

Attacker Localization with Machine Learning in RS-485 Industrial Control Networks.
Proceedings of the 19th IEEE International Conference on Factory Communication Systems, 2023

Electricity Theft Detection for Smart Homes with Knowledge-Based Synthetic Attack Data.
Proceedings of the 19th IEEE International Conference on Factory Communication Systems, 2023

A Comparative Performance Analysis of Android Malware Classification Using Supervised and Semi-supervised Deep Learning.
Proceedings of the 16th International Conference on Security of Information and Networks, 2023

Smart Meter Modbus RS-485 Intrusion Detection by Federated Learning Approach.
Proceedings of the 15th International Conference on Computer and Automation Engineering, 2023

A Feature-Aware Semi-Supervised Learning Approach for Automotive Ethernet.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Federated Learning-Based Credit Card Fraud Detection: Performance Analysis with Sampling Methods and Deep Learning Algorithms.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

A Risk Assessment Study: Encircling Docker Container Assets on IaaS Cloud Computing Topology.
Proceedings of the 6th Conference on Cloud and Internet of Things, 2023

2MiCo: A Contrastive Semi-Supervised Method with Double Mixup for Smart Meter Modbus RS-485 Communication Security.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023

2022
Smart Meter Modbus RS-485 Spoofing Attack Detection by LSTM Deep Learning Approach.
Proceedings of the 9th Swiss Conference on Data Science, 2022

Unsupervised Anomaly Detection in RS-485 Traffic using Autoencoders with Unobtrusive Measurement.
Proceedings of the IEEE International Performance, 2022

Autonomous Driving Model Defense Study on Hijacking Adversarial Attack.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022

A Federated Approach for Learning from Electronic Health Records.
Proceedings of the 8th IEEE Intl Conference on Big Data Security on Cloud, 2022

Personalized Federated Learning for Automotive Intrusion Detection Systems.
Proceedings of the 2022 IEEE Future Networks World Forum, 2022

Unauthorized Power Usage Detection Using Gradient Boosting Classifier in Disaggregated Smart Meter Home Network.
Proceedings of the 2022 IEEE Future Networks World Forum, 2022

2020
LSTM-Based Intrusion Detection System for In-Vehicle Can Bus Communications.
IEEE Access, 2020

An Effective In-Vehicle CAN Bus Intrusion Detection System Using CNN Deep Learning Approach.
Proceedings of the IEEE Global Communications Conference, 2020

LSTM-based Network Attack Detection: Performance Comparison by Hyper-parameter Values Tuning.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020

Long Short-Term Memory-Based Intrusion Detection System for In-Vehicle Controller Area Network Bus.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches.
Proceedings of the 5th International Conference on Computer and Communication Systems, 2020

2015
Microwave imaging for the detection and localization of breast tissue malignancies using time reversal beamforming
PhD thesis, 2015


  Loading...