Mohammad Saiful Islam Mamun

Orcid: 0000-0001-8444-8926

Affiliations:
  • Cybersecurity, National Research Council Canada, Ottawa, ON, Canada


According to our database1, Mohammad Saiful Islam Mamun authored at least 46 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Effect of Text Augmentation and Adversarial Training on Fake News Detection.
IEEE Trans. Comput. Soc. Syst., August, 2024

Federated Supervised Principal Component Analysis.
IEEE Trans. Inf. Forensics Secur., 2024

WeightedSim: privacy-preserving weighted similarity query over encrypted healthcare data.
Int. J. Appl. Cryptogr., 2024

An Efficient Multicast Authenticated Encryption Scheme for Smart Elderly Care Systems.
Proceedings of the IEEE International Conference on Communications, 2024

2023
A Framework for Synthetic Agetech Attack Data Generation.
J. Cybersecur. Priv., October, 2023

SeniorSentry: Correlation and Mutual Information-Based Contextual Anomaly Detection for Aging in Place.
Sensors, August, 2023

Ensemble Siamese Network (ESN) Using ECG Signals for Human Authentication in Smart Healthcare System.
Sensors, 2023

On Statistical Learning of Branch and Bound for Vehicle Routing Optimization.
CoRR, 2023

Evaluating Permissioned Blockchain Using Stochastic Modeling and Chaos Engineering.
CoRR, 2023

Detecting BrakTooth Attacks.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Trustworthy Decentralized Last-Mile Delivery Framework Using Blockchain.
Proceedings of the 20th International Conference on Smart Business Technologies, 2023

A Lightweight Mutual Authentication Scheme with Fault Tolerance in Smart Elderly Care System.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

An Efficient Dynamic Key Management Scheme for IoT Devices in Aging in Place Systems.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

2022
Using Machine Learning for Dynamic Authentication in Telehealth: A Tutorial.
Sensors, 2022

Towards a robust and trustworthy machine learning system development: An engineering perspective.
J. Inf. Secur. Appl., 2022

TapTree: Process-Tree Based Host Behavior Modeling and Threat Detection Framework via Sequential Pattern Mining.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

2021
Machine learning in precision medicine to preserve privacy via encryption.
Pattern Recognit. Lett., 2021

A lightweight multi-party authentication in insecure reader-server channel in RFID-based IoT.
Peer-to-Peer Netw. Appl., 2021

Multifactor authentication scheme using physically unclonable functions.
Internet Things, 2021

Automated detection of unstructured context-dependent sensitive information using deep learning.
Internet Things, 2021

Towards a Robust and Trustworthy Machine Learning System Development.
CoRR, 2021

DeepTaskAPT: Insider APT detection using Task-tree based Deep Learning.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Chaos Engineering For Understanding Consensus Algorithms Performance in Permissioned Blockchains.
Proceedings of the IEEE Intl Conf on Dependable, 2021

2020
Privacy-Preserving Computation Offloading for Time-Series Activities Classification in eHealthcare.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Tell Them from Me: An Encrypted Application Profiler.
Proceedings of the Network and System Security - 13th International Conference, 2019

2018
OTP-IoT: An ownership transfer protocol for the Internet of Things.
J. Inf. Secur. Appl., 2018

SupAUTH: A new approach to supply chain authentication for the IoT.
Comput. Intell., 2018

2017
Characterization of Tor Traffic using Time based Features.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2016
Detecting Malicious URLs Using Lexical Analysis.
Proceedings of the Network and System Security - 10th International Conference, 2016

Characterization of Encrypted and VPN Traffic using Time-related Features.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

2015
An efficient batch verification system and its effect in a real time VANET environment.
Secur. Commun. Networks, 2015

A privacy-preserving efficient RFID authentication protocol from SLPN assumption.
Int. J. Comput. Sci. Eng., 2015

An Entropy Based Encrypted Traffic Classifier.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

2014
Secure VANET applications with a refined group signature.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

A Multi-purpose Group Signature for Vehicular Network Security.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

A Scalable and Secure RFID Ownership Transfer Protocol.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

RFID Path Authentication, Revisited.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
Group Signature with relaxed-privacy and revocability for VANET.
IACR Cryptol. ePrint Arch., 2013

A Fully-Secure RFID Authentication Protocol from Exact LPN Assumption.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2012
Policy based intrusion detection and response system in hierarchical WSN architecture
CoRR, 2012

An Optimized Signature Verification System for Vehicle Ad hoc NETwork
CoRR, 2012

Graphical Query Builder in Opportunistic Sensor Networks to discover Sensor Information
CoRR, 2012

Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network
CoRR, 2012

A Novel Overlay IDS For Wireless Sensor Networks
CoRR, 2012

WiMAX or Wi-Fi: The Best Suited Candidate Technology for Building Wireless Access Infrastructure
CoRR, 2012

A Secure and Private RFID Authentication Protocol under SLPN Problem.
Proceedings of the Network and System Security - 6th International Conference, 2012


  Loading...