Ferdous A. Barbhuiya
Orcid: 0000-0001-8247-9171
According to our database1,
Ferdous A. Barbhuiya
authored at least 71 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Soc. Netw. Anal. Min., December, 2024
Analyzing the suitability of IEEE 802.11ah for next generation Internet of Things: A comparative study.
Ad Hoc Networks, 2024
RedgeX: Meta-Learning based Optimal Analytical Model for Programmable Edge Intelligence.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024
2023
Soc. Netw. Anal. Min., December, 2023
SDN-Based Reconfigurable Edge Network Architecture for Industrial Internet of Things.
IEEE Internet Things J., September, 2023
A Role-Based Encryption (RBE) Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context.
IEEE Trans. Serv. Comput., 2023
RMA-CPABE : A multi-authority CPABE scheme with reduced ciphertext size for IoT devices.
Future Gener. Comput. Syst., 2023
OptFog: Optimized Mobility-Aware Task Offloading and Migration Model for Fog Networks.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2023
2022
IEEE Trans. Cloud Comput., 2022
MACFI: A multi-authority access control scheme with efficient ciphertext and secret key size for fog-enhanced IoT.
J. Syst. Archit., 2022
IEEE Internet Things Mag., 2022
IEEE Internet Things J., 2022
A secure and efficient access control scheme with attribute revocation and merging capabilities for fog-enabled IoT.
Comput. Electr. Eng., 2022
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the IEEE Global Communications Conference, 2022
2021
Sustain. Comput. Informatics Syst., 2021
Proceedings of the Companion of The Web Conference 2021, 2021
MOFIT: An Efficient Access Control Scheme with Attribute Merging and Outsourcing Capability for Fog-Enhanced IoT.
Proceedings of the Parallel and Distributed Computing, Applications and Technologies, 2021
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021
Consumption of Hate Speech on Twitter: A Topical Approach to Capture Networks of Hateful Users.
Proceedings of the workshop Reducing Online Misinformation Through Credible Information Retrieval (ROMCIR 2021) co-located with 43rd European Conference on Information Retrieval (ECIR 2021), 2021
Proceedings of the Complex Networks & Their Applications X - Volume 2, Proceedings of the Tenth International Conference on Complex Networks and Their Applications COMPLEX NETWORKS 2021, Madrid, Spain, November 30, 2021
Proceedings of the Complex Networks & Their Applications X - Volume 2, Proceedings of the Tenth International Conference on Complex Networks and Their Applications COMPLEX NETWORKS 2021, Madrid, Spain, November 30, 2021
Proceedings of the Complex Networks & Their Applications X - Volume 2, Proceedings of the Tenth International Conference on Complex Networks and Their Applications COMPLEX NETWORKS 2021, Madrid, Spain, November 30, 2021
Proceedings of the Seventh Workshop on Noisy User-generated Text, 2021
Proceedings of the 4th Workshop on Affective Content Analysis (AffCon 2021) co-located with Thirty-Fifth AAAI Conference on Artificial Intelligence (AAAI 2021), 2021
2020
A Role-Based Encryption Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context.
CoRR, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020
KAFK at SemEval-2020 Task 12: Checkpoint Ensemble of Transformers for Hate Speech Classification.
Proceedings of the Fourteenth Workshop on Semantic Evaluation, 2020
KAFK at SemEval-2020 Task 8: Extracting Features from Pre-trained Neural Networks to Classify Internet Memes.
Proceedings of the Fourteenth Workshop on Semantic Evaluation, 2020
IIITG-ADBU at SemEval-2020 Task 12: Comparison of BERT and BiLSTM in Detecting Offensive Language.
Proceedings of the Fourteenth Workshop on Semantic Evaluation, 2020
IIITG-ADBU at SemEval-2020 Task 9: SVM for Sentiment Analysis of English-Hindi Code-Mixed Text.
Proceedings of the Fourteenth Workshop on Semantic Evaluation, 2020
IIITG-ADBU at SemEval-2020 Task 8: A Multimodal Approach to Detect Offensive, Sarcastic and Humorous Memes.
Proceedings of the Fourteenth Workshop on Semantic Evaluation, 2020
Proceedings of the Pattern Recognition. ICPR International Workshops and Challenges, 2020
Proceedings of the IEEE International Conference on Image Processing, 2020
IIITG-ADBU@HASOC-Dravidian-CodeMix-FIRE2020: Offensive Content Detection in Code-Mixed Dravidian Text.
Proceedings of the Working Notes of FIRE 2020, 2020
Proceedings of the Working Notes of CLEF 2020, 2020
Proceedings of the Working Notes of CLEF 2020, 2020
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020
Aggression Identification in English, Hindi and Bangla Text using BERT, RoBERTa and SVM.
Proceedings of the Second Workshop on Trolling, Aggression and Cyberbullying, 2020
Proceedings of the Second Workshop on Figurative Language Processing, 2020
2019
Proceedings of the 13th International Workshop on Semantic Evaluation, 2019
Team FalsePostive at HASOC 2019: Transfer-Learning for Detection and Classification of Hate Speech.
Proceedings of the Working Notes of FIRE 2019, 2019
IIITG-ADBU at HASOC 2019: Automated Hate Speech and Offensive Content Detection in English and Code-Mixed Hindi Text.
Proceedings of the Working Notes of FIRE 2019, 2019
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019
Proceedings of the 7th International Workshop on Security in Cloud Computing, 2019
2018
Future Gener. Comput. Syst., 2018
2017
Pattern Recognit. Lett., 2017
A universal cloud user revocation scheme with key-escrow resistance for ciphertext-policy attribute-based access control.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017
Proceedings of the Companion Publication of the 22nd International Conference on Intelligent User Interfaces, 2017
2016
Proceedings of the IEEE World Congress on Services, 2016
A preliminary study of CNNs for iris and periocular verification in the visible spectrum.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016
ISURE: User authentication in mobile devices using ocular biometrics in visible spectrum.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016
2015
PairVoting: A secure online voting scheme using Pairing-Based Cryptography and Fuzzy Extractor.
Proceedings of the 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2015
2013
An Active Host-Based Intrusion Detection System for ARP-Related Attacks and its Verification.
CoRR, 2013
2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012
Proceedings of the First International Conference on Security of Internet of Things, 2012
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
2011
Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011, 2011
Proceedings of the IEEE International Conference on Systems, 2011
Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011
An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor Networks.
Proceedings of the Information Systems Security - 7th International Conference, 2011
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011
2010
Proceedings of the Advances in Computer Science and Information Technology, 2010