Md. Zakirul Alam Bhuiyan

According to our database1, Md. Zakirul Alam Bhuiyan
  • authored at least 85 papers between 2009 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Nearest neighbor search with locally weighted linear regression for heartbeat classification.
Soft Comput., 2018

Privacy Issues in Big Data Mining Infrastructure, Platforms, and Applications.
Security and Communication Networks, 2018

HotML: A DSM-based machine learning system for social networks.
J. Comput. Science, 2018

L-CAQ: Joint link-oriented channel-availability and channel-quality based channel selection for mobile cognitive radio networks.
J. Network and Computer Applications, 2018

A connection probability model for communications networks under regional failures.
IJCIP, 2018

Fog-based storage technology to fight with cyber threat.
Future Generation Comp. Syst., 2018

Gait-based Human identification using acoustic sensor and deep neural network.
Future Generation Comp. Syst., 2018

Incremental term representation learning for social network analysis.
Future Generation Comp. Syst., 2018

Hardware design and modeling of lightweight block ciphers for secure communications.
Future Generation Comp. Syst., 2018

Acoustic sensor networks in the Internet of Things applications.
Future Generation Comp. Syst., 2018

Key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage.
Future Generation Comp. Syst., 2018

Improving risk assessment model of cyber security using fuzzy logic inference system.
Computers & Security, 2018

Energy-efficient relay tracking with multiple mobile camera sensors.
Computer Networks, 2018

Big Data Reduction for a Smart City's Critical Infrastructural Health Monitoring.
IEEE Communications Magazine, 2018

PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems.
IEEE Communications Magazine, 2018

Reliable Decision Making of Accepting Friend Request on Online Social Networks.
IEEE Access, 2018

2017
SafeDrive: Online Driving Anomaly Detection From Large-Scale Vehicle Data.
IEEE Trans. Industrial Informatics, 2017

Quality-Guaranteed Event-Sensitive Data Collection and Monitoring in Vibration Sensor Networks.
IEEE Trans. Industrial Informatics, 2017

Dependable Structural Health Monitoring Using Wireless Sensor Networks.
IEEE Trans. Dependable Sec. Comput., 2017

Towards Cyber-Physical Systems Design for Structural Health Monitoring: Hurdles and Opportunities.
TCPS, 2017

e-Sampling: Event-Sensitive Autonomous Adaptive Sensing and Low-Cost Monitoring in Networked Sensing Systems.
TAAS, 2017

Privacy-Preserving Electrocardiogram Monitoring for Intelligent Arrhythmia Detection.
Sensors, 2017

Hypergraph partitioning for social networks based on information entropy modularity.
J. Network and Computer Applications, 2017

Privacy-friendly secure bidding for smart grid demand-response.
Inf. Sci., 2017

Special issue on dependability in parallel and distributed systems and applications.
Inf. Sci., 2017

A privacy preserving framework for RFID based healthcare systems.
Future Generation Comp. Syst., 2017

A new outsourcing conditional proxy re-encryption suitable for mobile cloud environment.
Concurrency and Computation: Practice and Experience, 2017

Interoperable localization for mobile group users.
Computer Communications, 2017

PB-MII: replacing static RSUs with public buses-based mobile intermediary infrastructure in urban VANET-based clouds.
Cluster Computing, 2017

Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services.
IEEE Access, 2017

Naturalistic driving data for a smart cloud-based abnormal driving detector.
Proceedings of the 2017 IEEE SmartWorld, 2017

An FPGA-Based Algorithm to Accelerate Regular Expression Matching.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

RPS-TSM: A Robot Perception System Based on Temporal Semantic Map.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

The Art of Using Cross-Layer Design in Cognitive Radio Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Security on "A Lightweight Authentication Scheme with User Untraceability".
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Research on Coupling Reliability Problem in Sensor-Cloud System.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

A Framework for Preventing the Exploitation of IoT Smart Toys for Reconnaissance and Exfiltration.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Attacks on the Anti-collusion Data Sharing Scheme for Dynamic Groups in the Cloud.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Security and Attack Vector Analysis of IoT Devices.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Password Recovery for ZIP Files Based on ARM-FPGA Cluster.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Privacy-Protected Data Collection in Wireless Medical Sensor Networks.
Proceedings of the 2017 International Conference on Networking, Architecture, and Storage, 2017

DPS: A DSM-based Parameter Server for Machine Learning.
Proceedings of the 14th International Symposium on Pervasive Systems, 2017

The Strength of Dithering in Recommender System.
Proceedings of the 14th International Symposium on Pervasive Systems, 2017

Key-Aggregate Authentication Cryptosystem for Data Sharing in Dynamic Cloud Storage.
Proceedings of the 14th International Symposium on Pervasive Systems, 2017

A Fog-Based Hierarchical Trust Mechanism for Sensor-Cloud Underlying Structure.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Wi-Fi Signal Coverage Distance Estimation in Collapsed Structures.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

MAPP: A Modular Arithmetic Algorithm for Privacy Preserving in IoT.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Content-Centric Event-Insensitive Big Data Reduction in Internet of Things.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A Hierarchic Secure Cloud Storage Scheme Based on Fog Computing.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

A 3D-Collaborative Wireless Network: Towards Resilient Communication for Rescuing Flood Victims.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

A Secure and Dependable Connected Smart Home System for Elderly.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

A Survey on Deep Learning in Big Data.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Cooperative relay tracking with multiple mobile camera sensors.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
Unsupervised learning of indoor localization based on received signal strength.
Wireless Communications and Mobile Computing, 2016

Following Targets for Mobile Tracking in Wireless Sensor Networks.
TOSN, 2016

Sensing and Decision Making in Cyber-Physical Systems: The Case of Structural Event Monitoring.
IEEE Trans. Industrial Informatics, 2016

Understanding Graph-Based Trust Evaluation in Online Social Networks: Methodologies and Challenges.
ACM Comput. Surv., 2016

Improving the Localization Probability and Decreasing Communication Cost for Mobile Users.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

Trustworthy and protected data collection for event detection using networked sensing systems.
Proceedings of the 2016 37th IEEE Sarnoff Symposium, Newark, NJ, USA, 2016

Event Detection through Differential Pattern Mining in Internet of Things.
Proceedings of the 13th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2016

Secured Data Collection for a Cloud-Enabled Structural Health Monitoring System.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Collusion Attack Detection in Networked Systems.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

2015
Local Area Prediction-Based Mobile Target Tracking in Wireless Sensor Networks.
IEEE Trans. Computers, 2015

Deploying Wireless Sensor Networks with Fault-Tolerance for Structural Health Monitoring.
IEEE Trans. Computers, 2015

Energy-efficient healthcare monitoring with smartphones and IoT technologies.
IJHPCN, 2015

Shared-node IoT network architecture with ubiquitous homomorphic encryption for healthcare monitoring.
IJES, 2015

Dependable Structural Helath Monitoring Using Wireless Sensor Networks.
CoRR, 2015

Application-Oriented Sensor Network Architecture for Dependable Structural Health Monitoring.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

Partitioning of Hypergraph Modeled Complex Networks Based on Information Entropy.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Dependable Cascading Target Tracking in Heterogeneous Mobile Camera Sensor Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Resource-Efficient Vibration Data Collection in Cyber-Physical Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Detecting Movements of a Target Using Face Tracking in Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2014

Sensor Placement with Multiple Objectives for Structural Health Monitoring.
TOSN, 2014

Auction-based adaptive sensor activation algorithm for target tracking in wireless sensor networks.
Future Generation Comp. Syst., 2014

Reliable Shortest Paths in Wireless Sensor Networks: Refocusing on Link Failure Scenarios from Applications.
Proceedings of the 20th IEEE Pacific Rim International Symposium on Dependable Computing, 2014

2013
Local Monitoring and Maintenance for Operational Wireless Sensor Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Energy and bandwidth-efficient Wireless Sensor Networks for monitoring high-frequency events.
Proceedings of the 10th Annual IEEE Communications Society Conference on Sensor, 2013

2012
Energy-Efficient and Fault-Tolerant Structural Health Monitoring in Wireless Sensor Networks.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Sensor Placement with Multiple Objectives for Structural Health Monitoring in WSNs.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012

Deploying Wireless Sensor Networks with Fault Tolerance for Structural Health Monitoring.
Proceedings of the IEEE 8th International Conference on Distributed Computing in Sensor Systems, 2012

2011
Auction-Based Adaptive Sensor Activation Algorithm for Target Tracking in WSNs.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2010
Two-level cooperative and energy-efficient tracking algorithm in wireless sensor networks.
Concurrency and Computation: Practice and Experience, 2010

2009
Polygon-Based Tracking Framework in Surveillance Wireless Sensor Networks.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

Target Tracking with Monitor and Backup Sensors in Wireless Sensor Networks.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

An Algorithm for Determining Neural Network Architecture Using Differential Evolution.
Proceedings of the Business Intelligence: Artificial Intelligence in Business, 2009


  Loading...