Mohammad Ashiqur Rahman
Orcid: 0000-0002-2963-7430
According to our database1,
Mohammad Ashiqur Rahman
authored at least 143 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
SHEATH: Defending Horizontal Collaboration for Distributed CNNs against Adversarial Noise.
CoRR, 2024
Formal threat analysis of machine learning-based control systems: A study on smart healthcare systems.
Comput. Secur., 2024
Detection and Mitigation of Subtle Feature-map Attacks in Pseudo Parallel Collaborative CNN Models for Distributed Edge Intelligence.
Proceedings of the 100th IEEE Vehicular Technology Conference, 2024
Secured UAV Navigation: A Novel Intrusion Detection System Based on PWM Signal Analysis.
Proceedings of the 11th IEEE Swiss Conference on Data Science, 2024
Side-Channel-Driven Intrusion Detection System for Mission Critical Unmanned Aerial Vehicles.
Proceedings of the 25th International Symposium on Quality Electronic Design, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
An Intelligent Hierarchical Framework for Efficient Fault Detection and Diagnosis in Nuclear Power Plants.
Proceedings of the Sixth Workshop on CPS&IoT Security and Privacy, 2024
ConFIDe: A PWM-Driven Control-Fused Intrusion Detection System for Hardware Security in Unmanned Aerial Vehicles.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Evaluating LSTM Time Series Prediction Performance on Benchmark CPUs and GPUs in Cloud Environments.
Proceedings of the 2024 ACM Southeast Conference, 2024
2023
Distributed Ledger Technol. Res. Pract., December, 2023
Deep learning-based energy harvesting with intelligent deployment of RIS-assisted UAV-CFmMIMOs.
Comput. Networks, June, 2023
IEEE Trans. Smart Grid, March, 2023
IEEE Trans. Netw. Serv. Manag., March, 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection.
CoRR, 2023
Adaptive Neuro-Fuzzy Inference System-based Lightweight Intrusion Detection System for UAVs.
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023
Q-SECURE: A Quantum Resistant Security for Resource Constrained IoT Device Encryption.
Proceedings of the 10th International Conference on Internet of Things: Systems, 2023
SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Proceedings of the IEEE Conference on Communications and Network Security, 2023
Proceedings of the IEEE Conference on Communications and Network Security, 2023
Adversarial Data-Augmented Resilient Intrusion Detection System for Unmanned Aerial Vehicles.
Proceedings of the IEEE International Conference on Big Data, 2023
Secure the 5G and Beyond Networks with Zero Trust and Access Control Systems for Cloud Native Architectures.
Proceedings of the 20th ACS/IEEE International Conference on Computer Systems and Applications, 2023
2022
Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection.
CoRR, 2022
Secure Spectrum and Resource Sharing for 5G Networks using a Blockchain-based Decentralized Trusted Computing Platform.
CoRR, 2022
Proceedings of the 14th IFIP Wireless and Mobile Networking Conference, 2022
Proceedings of the IEEE Military Communications Conference, 2022
DeepCAD: A Stand-alone Deep Neural Network-based Framework for Classification and Anomaly Detection in Smart Healthcare Systems.
Proceedings of the IEEE International Conference on Digital Health, 2022
PHASE: Security Analyzer for Next-Generation Smart Personalized Smart Healthcare System.
Proceedings of the IEEE International Conference on Digital Health, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the IEEE Industry Applications Society Annual Meeting, 2022
A Literature Review on Blockchain-enabled Security and Operation of Cyber-Physical Systems.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
FED-UP: Federated Deep Reinforcement Learning-based UAV Path Planning against Hostile Defense System.
Proceedings of the 18th International Conference on Network and Service Management, 2022
Poster: A Novel Formal Threat Analyzer for Activity Monitoring-based Smart Home Heating, Ventilation, and Cooling Control System.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IEEE Trans. Netw. Serv. Manag., 2021
IEEE Trans. Netw. Sci. Eng., 2021
EAI Endorsed Trans. Security Safety, 2021
A Survey on Security and Privacy Issues in Modern Healthcare Systems: Attacks and Defenses.
ACM Trans. Comput. Heal., 2021
A Literature Review on Blockchain-enabled Security and Operation of Cyber-Physical Systems.
CoRR, 2021
A Novel Framework for Threat Analysis of Machine Learning-based Smart Healthcare Systems.
CoRR, 2021
Proceedings of the IEEE International Conference on Smart Computing, 2021
iDDAF: An Intelligent Deceptive Data Acquisition Framework for Secure Cyber-Physical Systems.
Proceedings of the Security and Privacy in Communication Networks, 2021
Proceedings of the 18th Annual IEEE International Conference on Sensing, 2021
CURE: Enabling RF Energy Harvesting Using Cell-Free Massive MIMO UAVs Assisted by RIS.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
BIOCAD: Bio-Inspired Optimization for Classification and Anomaly Detection in Digital Healthcare Systems.
Proceedings of the IEEE International Conference on Digital Health, 2021
Proceedings of the IEEE International Conference on Digital Health, 2021
DDAF: Deceptive Data Acquisition Framework against Stealthy Attacks in Cyber-Physical Systems.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
iAttackGen: Generative Synthesis of False Data Injection Attacks in Cyber-physical Systems.
Proceedings of the IEEE Conference on Communications and Network Security, 2021
Ride-Hailing for Autonomous Vehicles: Hyperledger Fabric-Based Secure and Decentralize Blockchain Platform.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
J. Inf. Secur. Appl., 2020
A signaling game approach to mitigate co-resident attacks in an IaaS cloud environment.
J. Inf. Secur. Appl., 2020
Machine Learning in Generation, Detection, and Mitigation of Cyberattacks in Smart Grid: A Survey.
CoRR, 2020
CoRR, 2020
Automated Trajectory Synthesis for UAV Swarms Based on Resilient Data Collection Objectives.
CoRR, 2020
CoRR, 2020
Formal Synthesis of Trajectories for Unmanned Aerial Vehicles to Perform Resilient Surveillance of Critical Power Transmission Lines.
Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
2019
IEEE Trans. Netw. Serv. Manag., 2019
Trajectory Synthesis for a UAV Swarm to Perform Resilient Requirement-Aware Surveillance: A Smart Grid-based Study.
CoRR, 2019
Toward a Secure and Decentralized Blockchain-based Ride-Hailing Platform for Autonomous Vehicles.
CoRR, 2019
A Formal Approach for Efficient Navigation Management of Hybrid Electric Vehicles on Long Trips.
CoRR, 2019
Security design against stealthy attacks on power system state estimation: A formal approach.
Comput. Secur., 2019
Comput. Networks, 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019
HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems.
Proceedings of the Sixth International Conference on Social Networks Analysis, 2019
Proceedings of the 10th International Conference on Computing, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Hands-on File Inclusion Vulnerablity and Proactive Control for Secure Software Development.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the 15th International Conference on Network and Service Management, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
Blockchain-Based Charging Coordination Mechanism for Smart Grid Energy Storage Units.
Proceedings of the IEEE International Conference on Blockchain, 2019
2018
Blockchain-based Privacy-Preserving Charging Coordination Mechanism for Energy Storage Units.
CoRR, 2018
CoRR, 2018
Proceedings of the Fifth International Conference on Software Defined Systems, 2018
A scalable and flexible DDoS mitigation system using network function virtualization.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Privacy Preserving Fine-Grained Data Distribution Aggregation for Smart Grid AMI Networks.
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018
Poster Abstract: Chained of Things: A Secure and Dependable Design of Autonomous Vehicle Services.
Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
2017
Automated Synthesis of Distributed Network Access Controls: A Formal Framework with Refinement.
IEEE Trans. Parallel Distributed Syst., 2017
Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids.
IEEE Trans. Dependable Secur. Comput., 2017
Secure and efficient protection of consumer privacy in Advanced Metering Infrastructure supporting fine-grained data analysis.
J. Comput. Syst. Sci., 2017
Comput. Secur., 2017
A cost-effective security management for clouds: A game-theoretic deception mechanism.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017
Formal Modelling and Verification of Requirements of Adaptive Routing Protocol for Mobile Ad-Hoc Network.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2017
Proceedings of the 13th International Conference on Network and Service Management, 2017
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
Protection by Detection: A Signaling Game Approach to Mitigate Co-Resident Attacks in Cloud.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
2016
Advances in Information Security 67, Springer, ISBN: 978-3-319-32871-3, 2016
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016
Formal Analysis for Dependable Supervisory Control and Data Acquisition in Smart Grids.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Proceedings of the 8th International Conference on Communication Systems and Networks, 2016
A Novel Secure and Efficient Policy Management Framework for Software Defined Network.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
VFence: A Defense against Distributed Denial of Service Attacks Using Network Function Virtualization.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
2015
Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in Cyberwarfare.
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Impact Analysis of Topology Poisoning Attacks on Economic Operation of the Smart Power Grid.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014
A formal model for verifying the impact of stealthy attacks on optimal power flow in power grids.
Proceedings of the ACM/IEEE International Conference on Cyber-Physical Systems, 2014
Security Threat Analytics and Countermeasure Synthesis for Power System State Estimation.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
Moving Target Defense for Hardening the Security of the Power System State Estimation.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014
2013
IEEE Trans. Smart Grid, 2013
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
A formal approach for network security management based on qualitative risk analysis.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013
Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems (with CPS Week 2013), 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the SEGS'13, 2013
2012
J. Comput., 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
A Declarative Logic-Based Approach for Threat Analysis of Advanced Metering Infrastructure.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
2011
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011
A declarative approach for global network security configuration verification and evaluation.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
2010
Ad Hoc Networks, 2010
2007
A Quorum Based Distributed Mutual Exclusion Algorithm for Multi-Level Clustered Network Architecture.
Proceedings of the Workshop on Algorithms and Computation 2007, 2007