Monowar H. Bhuyan

Orcid: 0000-0002-9842-7840

According to our database1, Monowar H. Bhuyan authored at least 55 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
MetaVSID: A Robust Meta-Reinforced Learning Approach for VSI-DDoS Detection on the Edge.
IEEE Trans. Netw. Serv. Manag., June, 2023

Semi-Supervised Range-Based Anomaly Detection for Cloud Systems.
IEEE Trans. Netw. Serv. Manag., June, 2023

Few-shot Anomaly Detection in Text with Deviation Learning.
CoRR, 2023

Anomaly Detection and Resolution on the Edge: Solutions and Future Directions.
Proceedings of the IEEE International Conference on Service-Oriented System Engineering, 2023

Few-Shot Anomaly Detection in Text with Deviation Learning.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

ADCluster: Adaptive Deep Clustering for Unsupervised Learning from Unlabeled Documents.
Proceedings of the 6th International Conference on Natural Language and Speech Processing (ICNLSP 2023), 2023

Towards Post-disaster Damage Assessment using Deep Transfer Learning and GAN-based Data Augmentation.
Proceedings of the 24th International Conference on Distributed Computing and Networking, 2023


Towards a Workload Mapping Model for Tuning Backing Services in Cloud Systems.
Proceedings of the Database and Expert Systems Applications, 2023

Bottleneck identification and failure prevention with procedural learning in 5G RAN.
Proceedings of the 23rd IEEE/ACM International Symposium on Cluster, 2023

Combining Block Bootstrap with Exponential Smoothing for Reinforcing Non-Emergency Urban Service Prediction.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
A survey on blockchain, SDN and NFV for the smart-home security.
Internet Things, 2022

Reinforced Transformer Learning for VSI-DDoS Detection in Edge Clouds.
IEEE Access, 2022

Optimized and Adaptive Federated Learning for Straggler-Resilient Device Selection.
Proceedings of the International Joint Conference on Neural Networks, 2022

Argumentation-Based Adversarial Regression with Multiple Learners.
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022

DELA: A Deep Ensemble Learning Approach for Cross-layer VSI-DDoS Detection on the Edge.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Uncovering latency anomalies in 5G RAN - A combination learner approach.
Proceedings of the 14th International Conference on COMmunication Systems & NETworkS, 2022

Unsupervised root-cause identification of software bugs in 5G RAN.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

The 6G Computing Continuum (6GCC): Meeting the 6G computing challenges.
Proceedings of the 1st International Conference on 6G Networking, 2022

2021
DeL-IoT: A deep ensemble learning approach to uncover anomalies in IoT.
Internet Things, 2021

A 1D-CNN Based Deep Learning for Detecting VSI-DDoS Attacks in IoT Applications.
Proceedings of the Advances and Trends in Artificial Intelligence. Artificial Intelligence Practices, 2021

Fed-FiS: a Novel Information-Theoretic Federated Feature Selection for Learning Stability.
Proceedings of the Neural Information Processing - 28th International Conference, 2021

D-LBAH: Dynamic Load Balancing Algorithm for HEC-SDN systems.
Proceedings of the 8th International Conference on Future Internet of Things and Cloud, 2021

Cformer: Semi-Supervised Text Clustering Based on Pseudo Labeling.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

Detection of VSI-DDoS Attacks on the Edge: A Sequential Modeling Approach.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Hierarchical Load Balancing and Clustering Technique for Home Edge Computing.
IEEE Access, 2020

End-to-End Analysis for Text Detection and Recognition in Natural Scene Images.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

SDN-Enabled IoT Anomaly Detection Using Ensemble Learning.
Proceedings of the Artificial Intelligence Applications and Innovations, 2020

Boosted Ensemble Learning for Anomaly Detection in 5G RAN.
Proceedings of the Artificial Intelligence Applications and Innovations, 2020

Identification and Classification of Cyberbullying Posts: A Recurrent Neural Network Approach Using Under-Sampling and Class Weighting.
Proceedings of the Neural Information Processing - 27th International Conference, 2020

Multi-diseases Classification from Chest-X-ray: A Federated Deep Learning Approach.
Proceedings of the AI 2020: Advances in Artificial Intelligence, 2020

2019
SURE-H: A Secure IoT Enabled Smart Home System.
Proceedings of the 5th IEEE World Forum on Internet of Things, 2019

Adversarial Impact on Anomaly Detection in Cloud Datacenters.
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019

Information-Theoretic Ensemble Learning for DDoS Detection with Adaptive Boosting.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019

2018
Multi-scale Low-Rate DDoS Attack Detection Using the Generalized Total Variation Metric.
Proceedings of the 17th IEEE International Conference on Machine Learning and Applications, 2018

2017
Network Traffic Anomaly Detection and Prevention - Concepts, Techniques, and Tools
Computer Communications and Networks, Springer, ISBN: 978-3-319-65186-6, 2017

2016
E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric.
Secur. Commun. Networks, 2016

A multi-step outlier-based anomaly detection approach to network-wide traffic.
Inf. Sci., 2016

Rank Correlation for Low-Rate DDoS Attack Detection: An Empirical Evaluation.
Int. J. Netw. Secur., 2016

BRC-KEP: A secure biometric and reversible CA based 2-party key exchange protocol.
Proceedings of the Ninth International Conference on Contemporary Computing, 2016

2015
An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection.
Pattern Recognit. Lett., 2015

Towards Generating Real-life Datasets for Network Intrusion Detection.
Int. J. Netw. Secur., 2015

2014
Network attacks: Taxonomy, tools and systems.
J. Netw. Comput. Appl., 2014

Network Anomaly Detection: Methods, Systems and Tools.
IEEE Commun. Surv. Tutorials, 2014

Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions.
Comput. J., 2014

Towards an Unsupervised Method for Network Anomaly Detection in Large Datasets.
Comput. Informatics, 2014

Information metrics for low-rate DDoS attack detection: A comparative evaluation.
Proceedings of the Seventh International Conference on Contemporary Computing, 2014

2012
AOCD: An Adaptive Outlier Based Coordinated Scan Detection Approach.
Int. J. Netw. Secur., 2012

An Effective Fingerprint Classification and Search Method
CoRR, 2012

An effective unsupervised network anomaly detection method.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

Packet and Flow Based Network Intrusion Dataset.
Proceedings of the Contemporary Computing - 5th International Conference, 2012

2011
Survey on Incremental Approaches for Network Anomaly Detection.
Int. J. Commun. Networks Inf. Secur., 2011

Surveying Port Scans and Their Detection Methodologies.
Comput. J., 2011

NADO: network anomaly detection using outlier approach.
Proceedings of the 2011 International Conference on Communication, 2011

2010
An Effective Method for Fingerprint Classification.
Int. Arab. J. e Technol., 2010


  Loading...