A. B. M. Alim Al Islam
Orcid: 0000-0001-8159-6114Affiliations:
- Bangladesh University of Engineering and Technology (BUET), Dhaka, Bangladesh
According to our database1,
A. B. M. Alim Al Islam
authored at least 144 papers
between 2010 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Towards benchmarking erasure coding schemes in object storage system: A systematic review.
Future Gener. Comput. Syst., 2025
2024
"To Lane or Not to Lane?" - Comparing On-Road Experiences in Developing and Developed Countries Using a New Simulator RoadBird.
IEEE Trans. Intell. Transp. Syst., August, 2024
EmoBot: Artificial emotion generation through an emotional chatbot during general-purpose conversations.
Cogn. Syst. Res., January, 2024
Future Gener. Comput. Syst., 2024
CoRR, 2024
Sherlock in OSS: A Novel Approach of Content-Based Searching in Object Storage System.
IEEE Access, 2024
2023
IEEE Trans. Cloud Comput., 2023
Unmasking the Invisible: Finding Location-Specific Aggregated Air Quality Index with Smartphone-Captured Images.
CoRR, 2023
Sherlock in OSS: A Novel Approach of Content-Based Searching in Object Storage System.
CoRR, 2023
RemOrphan: Object Storage Sustainability Through Removing Offline-Processed Orphan Garbage Data.
IEEE Access, 2023
Proceedings of the 10th International Conference on Networking, 2023
Soft-Touch or Hard-Touch: Quantifying Touches through A New System Focusing on A Pool Touchpad for Measuring Timing of Swimmers.
Proceedings of the 10th International Conference on Networking, 2023
Disparity-Aware Federated Learning for Intrusion Detection Systems in Imbalanced Non-IID Settings.
Proceedings of the 10th International Conference on Networking, 2023
Proceedings of the IEEE Global Communications Conference, 2023
2022
IEEE Trans. Intell. Transp. Syst., 2022
Shashthosheba: Dissecting Perception of Bangladeshi People towards Telemedicine Apps through the Lens of Features of the Apps.
CoRR, 2022
<i>LC-Net</i>: <i>L</i>ocalized <i>C</i>ounting <i>Net</i>work for Extremely Dense Crowds.
Appl. Soft Comput., 2022
Cri-Astrologer: Predicting Demography of Involved Criminals based on Historical Data.
Proceedings of the 2022 9th International Conference on Networking, 2022
Citadel: An Automated Abuse Detection System to Detect And Prevent Abusive Behaviors over Emails.
Proceedings of the 2022 9th International Conference on Networking, 2022
InnerEye: A Tale on Images Filtered Using Instagram Filters - How Do We Interact with them and How Can We Automatically Identify the Extent of Filtering?
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking and Services, 2022
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking and Services, 2022
Note: Plant Leaf Disease Network (PLeaD-Net): Identifying Plant Leaf Diseases through Leveraging Limited-Resource Deep Convolutional Neural Network.
Proceedings of the COMPASS '22: ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies, Seattle, WA, USA, 29 June 2022, 2022
NOTE: Unavoidable Service to Unnoticeable Risks: A Study on How Healthcare Record Management Opens the Doors of Unnoticeable Vulnerabilities for Rohingya Refugees.
Proceedings of the COMPASS '22: ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies, Seattle, WA, USA, 29 June 2022, 2022
Proceedings of the COMPASS '22: ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies, Seattle, WA, USA, 29 June 2022, 2022
Proceedings of the COMPASS '22: ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies, Seattle, WA, USA, 29 June 2022, 2022
Note: CORONOSIS: Corona Prognosis via a Global Lens to Enable Efficient Policy-making Both at Global and Local Levels.
Proceedings of the COMPASS '22: ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies, Seattle, WA, USA, 29 June 2022, 2022
Investigating Human Factors in Willingness to Donate to the Small-scale Non-profit Organizations in Bangladesh.
Proceedings of the Companion Computer Supported Cooperative Work and Social Computing, 2022
2021
Towards Greening MapReduce Clusters Considering Both Computation Energy and Cooling Energy.
IEEE Trans. Parallel Distributed Syst., 2021
Man-in-the-Middle Attack on Contactless Payment over NFC Communications: Design, Implementation, Experiments and Detection.
IEEE Trans. Dependable Secur. Comput., 2021
Dakter Bari: Introducing Intermediary to Ensure Healthcare Services to Extremely Impoverished People.
Proc. ACM Hum. Comput. Interact., 2021
Towards achieving a delicate blending between rule-based translator and neural machine translator.
Neural Comput. Appl., 2021
Strategizing secured image storing and efficient image retrieval through a new cloud framework.
J. Netw. Comput. Appl., 2021
Human-Survey Interaction (HSI): A Study on Integrity of Human Data Collectors in a Mass-Scale Hajj Pilgrimage Survey.
IEEE Access, 2021
Securing Firearms inside An Arsenal through Using A Remotely-Operated Sensor-Based Safety Mechanism.
Proceedings of the 8th NSysS 2021: 8th International Conference on Networking, Systems and Security, Cox's Bazar, Bangladesh, December 21, 2021
"A Tale on Abuse and Its Detection over Online Platforms, Especially over Emails": From the Context of Bangladesh.
Proceedings of the 8th NSysS 2021: 8th International Conference on Networking, Systems and Security, Cox's Bazar, Bangladesh, December 21, 2021
Proceedings of the IEEE International Conference on Data Mining, 2021
2020
Towards simulating non-lane based heterogeneous road traffic of less developed countries using authoritative polygonal GIS map.
Simul. Model. Pract. Theory, 2020
Learning from Tweets: Opportunities and Challenges to Inform Policy Making During Dengue Epidemic.
Proc. ACM Hum. Comput. Interact., 2020
Mob. Networks Appl., 2020
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020
Let's Vibrate with Vibration: Augmenting Structural Engineering with Low-Cost Vibration Sensing.
CoRR, 2020
An Integrated Digital Platform for Bridging Gaps between General Public, Donors, and Social Welfare Organizations Working for Street Children in Bangladesh.
CoRR, 2020
Solving The Maze of Diagnosing Parkinson's Disease based on Portable EEG Sensing to be Adaptable to Go In-The-Wild.
Proceedings of the 7th NSysS 2020: 7th International Conference on Networking, 2020
Proceedings of the 7th NSysS 2020: 7th International Conference on Networking, 2020
Network Intrusion Detection System based on Conditional Variational Laplace AutoEncoder.
Proceedings of the 7th NSysS 2020: 7th International Conference on Networking, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020
2019
Exploring network-level performances of wireless nanonetworks utilizing gains of different types of nano-antennas with different materials.
Wirel. Networks, 2019
A new network paradigm for low-cost and lightweight real-time communication between train and rail track to detect missing and faulty rail blocks.
J. Netw. Comput. Appl., 2019
Two Tell-tale Perspectives of PTSD: Neurobiological Abnormalities and Bayesian Regulatory Network of the Underlying Disorder in a Refugee Context.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019
A Sweet Recipe for Consolidated Vulnerabilities: Attacking a Live Website by Harnessing a Killer Combination of Vulnerabilities.
CoRR, 2019
Power attack: An imminent security threat in real-time system for detecting missing rail blocks in developing countries.
Comput. Secur., 2019
Proceedings of the 6th International Conference on Networking, Systems and Securit, 2019
As you are, so shall you move your head: a system-level analysis between head movements and corresponding traits and emotions.
Proceedings of the 6th International Conference on Networking, Systems and Securit, 2019
Fault-tolerant design method for tizen applications considering core- and API-level faults.
Proceedings of the 6th International Conference on Networking, Systems and Securit, 2019
A generalized mechanism beyond NLP for real-time detection of cyber abuse through facial expression analytics.
Proceedings of the MobiQuitous 2019, 2019
Proceedings of the MobiQuitous 2019, 2019
Proceedings of the MobiQuitous 2019, 2019
2018
Towards Devising a Low-cost and Easy-to-use Arithmetic Learning Framework for Economically Less-privileged Visually Impaired Children.
ACM Trans. Access. Comput., 2018
Exploiting a Synergy between Greedy Approach and NSGA for Scheduling in Computing Clusters.
Proceedings of the 5th International Conference on Networking, Systems and Security, 2018
Proceedings of the 5th International Conference on Networking, Systems and Security, 2018
Proceedings of the 5th International Conference on Networking, Systems and Security, 2018
Proceedings of the 5th International Conference on Networking, Systems and Security, 2018
A Sweet Recipe for Consolidated Vulnerabilities: Attacking a Live Website by Harnessing a Killer Combination of Vulnerabilities for Greater Harm.
Proceedings of the 5th International Conference on Networking, Systems and Security, 2018
An Approach Towards Multilingual Translation By Semantic-Based Verb Identification And Root Word Analysis.
Proceedings of the 5th International Conference on Networking, Systems and Security, 2018
Conjugate Congestion Control Based Transport Layer Protocol for Molecular Communication in Body Area Nanonetworks (BANs).
Proceedings of the 5th International Conference on Networking, Systems and Security, 2018
Securing Highly-Sensitive Information in Smart Mobile Devices through Difficult-to-Mimic and Single-Time Usage Analytics.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018
Duity: A Low-cost and Pervasive Finger-count Based Hand Gesture Recognition System for Low-literate and Novice Users.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018
Towards Simulating Non-lane Based Heterogeneous Road Traffic of Less Developed Countries.
Proceedings of the 5th International Conference on Information and Communication Technology for Sustainability, 2018
GMC: Greening MapReduce Clusters Considering Both Computational Energy and Cooling Energy.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering, 2018
2017
Swarm Evol. Comput., 2017
Proceedings of the 4th International Conference on Networking, Systems and Security, 2017
Sparse mat: A tale of devising a low-cost directional system for pedestrian counting.
Proceedings of the International Conference on Networking, Systems and Security, 2017
Network-level performance enhancement in wireless nanosensor networks through multi-layer modifications.
Proceedings of the International Conference on Networking, Systems and Security, 2017
Proceedings of the International Conference on Networking, Systems and Security, 2017
Proceedings of the International Conference on Networking, Systems and Security, 2017
Proceedings of the International Conference on Networking, Systems and Security, 2017
Towards devising a solution for generating an alarm in a vehicle on waterways experiencing vulnerable swing.
Proceedings of the International Conference on Networking, Systems and Security, 2017
Proceedings of the 4th International Conference on Networking, Systems and Security, 2017
Polygot: An approach towards reliable translation by name identification and memory optimization using semantic analysis.
Proceedings of the 4th International Conference on Networking, Systems and Security, 2017
Trusted Worrier: A low-cost and high-accuracy user authentication system for firearm exploiting dynamic hand pressure biometrics.
Proceedings of the International Conference on Networking, Systems and Security, 2017
Towards perceiving and resolving the impediments to reporting for the developing countries.
Proceedings of the 4th International Conference on Networking, Systems and Security, 2017
Proceedings of the International Conference on Networking, Systems and Security, 2017
Devising a novel visible light based low-cost ultra-low-power gesture recognition system.
Proceedings of the International Conference on Networking, Systems and Security, 2017
Proceedings of the International Conference on Networking, Systems and Security, 2017
Proceedings of the 4th International Conference on Networking, Systems and Security, 2017
Service-Hub: A better approach for developing the system of online marketing for daily services.
Proceedings of the 4th International Conference on Networking, Systems and Security, 2017
Propagation Loss Aware Routing in Wireless Nanosensor Networks Having Directional Nano-Antennas.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017
FLight: A Low-Cost Reading and Writing System for Economically Less-Privileged Visually-Impaired People Exploiting Ink-based Braille System.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
2016
Interference Aware Reliable Cooperative Cognitive Networks for Real-Time Applications.
IEEE Trans. Cogn. Commun. Netw., 2016
IEEE Commun. Surv. Tutorials, 2016
A graph coloring based dynamic channel assignment algorithm for cognitive radio vehicular Ad Hoc networks.
Proceedings of the International Conference on Networking Systems and Security, 2016
Chameleon: defending secret information from eavesdropping over physical environment.
Proceedings of the International Conference on Networking Systems and Security, 2016
Supercrypt: a technique for quantum cryptography through simultaneously improving both security level and data rate.
Proceedings of the International Conference on Networking Systems and Security, 2016
Proceedings of the International Conference on Networking Systems and Security, 2016
Proceedings of the International Conference on Networking Systems and Security, 2016
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016
Poster: Infrastructure Independent Indoor Localization for Post-Disaster Rescue Mission.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016
Towards Making an Anonymous and One-Stop Online Reporting System for Third-World Countries.
Proceedings of the 7th Annual Symposium on Computing for Development, 2016
Power Attack: An Emerging Threat in Health-care Applications Using Medical Body Area Networks.
Proceedings of the 7th Annual Symposium on Computing for Development, 2016
Proceedings of the 7th Annual Symposium on Computing for Development, 2016
Proceedings of the 7th Annual Symposium on Computing for Development, 2016
Sporshohin: A Tale of Devising Visible Light Based Low-Cost Robust Touchless Input Device.
Proceedings of the 7th Annual Symposium on Computing for Development, 2016
Proceedings of the 7th Annual Symposium on Computing for Development, 2016
Proceedings of the 7th Annual Symposium on Computing for Development, 2016
2015
SiAc: simultaneous activation of heterogeneous radios in high data rate multi-hop wireless networks.
Wirel. Networks, 2015
SymCo: Symbiotic Coexistence of Single-hop and Multi-hop Transmissions in Next-generation Wireless Mesh Networks.
Wirel. Networks, 2015
iTCP: an intelligent TCP with neural network based end-to-end congestion control for ad-hoc multi-hop wireless mesh networks.
Wirel. Networks, 2015
General-purpose multi-objective vertical hand-off mechanism exploiting network dynamics.
Proceedings of the 11th IEEE International Conference on Wireless and Mobile Computing, 2015
Proceedings of the 11th IEEE International Conference on Wireless and Mobile Computing, 2015
Proceedings of the International Conference on Networking Systems and Security, 2015
A study on combining power management and power control for wireless sensor networks.
Proceedings of the International Conference on Networking Systems and Security, 2015
Sign of life: A system for escalating post-disaster rescue missions in ready-made garment factories.
Proceedings of the International Conference on Networking Systems and Security, 2015
Proceedings of the International Conference on Networking Systems and Security, 2015
Proceedings of the International Conference on Networking Systems and Security, 2015
Proceedings of the International Conference on Networking Systems and Security, 2015
Enhancing reliability of real-time traffic via cooperative scheduling in cognitive radio networks.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015
2014
Backpacking: Energy-Efficient Deployment of Heterogeneous Radios in Multi-Radio High-Data-Rate Wireless Sensor Networks.
IEEE Access, 2014
2012
QRTT: Stateful Round Trip Time Estimation for Wireless Embedded Systems Using Q-Learning.
IEEE Embed. Syst. Lett., 2012
Proceedings of the 20th IEEE International Symposium on Modeling, 2012
Multi-armed Bandit Congestion Control in Multi-hop Infrastructure Wireless Mesh Networks.
Proceedings of the 20th IEEE International Symposium on Modeling, 2012
2011
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011
Assessing the viability of cross-layer modeling for asynchronous, multi-hop, ad-hoc wireless mesh networks.
Proceedings of the 9th ACM International Workshop on Mobility Management & Wireless Access, 2011
Proceedings of the 10th International Conference on Information Processing in Sensor Networks, 2011
Proceedings of 20th International Conference on Computer Communications and Networks, 2011
2010
Stable Sensor Network (SSN): A Dynamic Clustering Technique for Maximizing Stability in Wireless Sensor Networks.
Wirel. Sens. Netw., 2010
Finding the Optimal Percentage of Cluster Heads from a New and Complete Mathematical Model on LEACH.
Wirel. Sens. Netw., 2010