Skip to main content

Showing 1–14 of 14 results for author: Faruk, M J H

.
  1. arXiv:2311.13422  [pdf

    cs.CR cs.CY cs.IR

    A Comparative Analysis Between SciTokens, Verifiable Credentials, and Smart Contracts: Novel Approaches for Authentication and Secure Access to Scientific Data

    Authors: Md Jobair Hossain Faruk, Bilash Saha, Jim Basney

    Abstract: Managing and exchanging sensitive information securely is a paramount concern for the scientific and cybersecurity community. The increasing reliance on computing workflows and digital data transactions requires ensuring that sensitive information is protected from unauthorized access, tampering, or misuse. This research paper presents a comparative analysis of three novel approaches for authentic… ▽ More

    Submitted 28 August, 2023; originally announced November 2023.

    Comments: ACM Practice & Experience in Advanced Research Computing (PEARC) 2023

  2. Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms

    Authors: Mst Shapna Akter, Md Jobair Hossain Faruk, Nafisa Anjum, Mohammad Masum, Hossain Shahriar, Akond Rahman, Fan Wu, Alfredo Cuzzocrea

    Abstract: The software supply chain (SSC) attack has become one of the crucial issues that are being increased rapidly with the advancement of the software development domain. In general, SSC attacks execute during the software development processes lead to vulnerabilities in software products targeting downstream customers and even involved stakeholders. Machine Learning approaches are proven in detecting… ▽ More

    Submitted 31 May, 2023; originally announced June 2023.

  3. Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection

    Authors: Mohammad Masum, Hossain Shahriar, Hisham Haddad, Md Jobair Hossain Faruk, Maria Valero, Md Abdullah Khan, Mohammad A. Rahman, Muhaiminul I. Adnan, Alfredo Cuzzocrea

    Abstract: Traditional network intrusion detection approaches encounter feasibility and sustainability issues to combat modern, sophisticated, and unpredictable security attacks. Deep neural networks (DNN) have been successfully applied for intrusion detection problems. The optimal use of DNN-based classifiers requires careful tuning of the hyper-parameters. Manually tuning the hyperparameters is tedious, ti… ▽ More

    Submitted 7 July, 2022; originally announced July 2022.

    Journal ref: 2021 IEEE International Conference on Big Data (Big Data)

  4. arXiv:2207.06914  [pdf

    eess.SP cs.AI cs.CY cs.HC cs.LG q-bio.NC

    An Investigation on Non-Invasive Brain-Computer Interfaces: Emotiv Epoc+ Neuroheadset and Its Effectiveness

    Authors: Md Jobair Hossain Faruk, Maria Valero, Hossain Shahriar

    Abstract: In this study, we illustrate the progress of BCI research and present scores of unveiled contemporary approaches. First, we explore a decoding natural speech approach that is designed to decode human speech directly from the human brain onto a digital screen introduced by Facebook Reality Lab and University of California San Francisco. Then, we study a recently presented visionary project to contr… ▽ More

    Submitted 24 June, 2022; originally announced July 2022.

    Journal ref: 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC)

  5. arXiv:2207.03555  [pdf

    cs.HC cs.CR cs.DC

    Blockchain-based Medical Image Sharing and Automated Critical-results Notification: A Novel Framework

    Authors: Jiyoun Randolph, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Liang Zhao, Nazmus Sakib, Bilash Saha

    Abstract: In teleradiology, medical images are transmitted to offsite radiologists for interpretation and the dictation report is sent back to the original site to aid timely diagnosis and proper patient care. Although teleradiology offers great benefits including time and cost efficiency, after-hour coverages, and staffing shortage management, there are some technical and operational limitations to overcom… ▽ More

    Submitted 7 July, 2022; originally announced July 2022.

    Report number: IEEE COMPSAC 2022 -- Computers, Software & Applications

  6. arXiv:2207.03534  [pdf

    cs.CR cs.DC

    A Review of Quantum Cybersecurity: Threats, Risks and Opportunities

    Authors: Md Jobair Hossain Faruk, Sharaban Tahora, Masrura Tasnim, Hossain Shahriar, Nazmus Sakib

    Abstract: The promise of quantum computing is not speeding up conventional computing rather delivering an exponential advantage for certain classes of problems, with profound implications for cybersecurity for instance. With the advent and development of quantum computers, cyberspace security can surely become the most critical problem for the Internet in near future. On contrary, prosaic quantum technology… ▽ More

    Submitted 7 July, 2022; originally announced July 2022.

    Journal ref: 1st International Conference on AI in Cybersecurity (ICAIC), 2022

  7. arXiv:2207.03529  [pdf

    cs.LG eess.SP

    A Novel IoT-based Framework for Non-Invasive Human Hygiene Monitoring using Machine Learning Techniques

    Authors: Md Jobair Hossain Faruk, Shashank Trivedi, Mohammad Masum, Maria Valero, Hossain Shahriar, Sheikh Iqbal Ahamed

    Abstract: People's personal hygiene habits speak volumes about the condition of taking care of their bodies and health in daily lifestyle. Maintaining good hygiene practices not only reduces the chances of contracting a disease but could also reduce the risk of spreading illness within the community. Given the current pandemic, daily habits such as washing hands or taking regular showers have taken primary… ▽ More

    Submitted 7 July, 2022; originally announced July 2022.

    Journal ref: ICHI 2022 : 10th IEEE International Conference on Healthcare Informatics

  8. Ride-Hailing for Autonomous Vehicles: Hyperledger Fabric-Based Secure and Decentralize Blockchain Platform

    Authors: Ryan Shivers, Mohammad Ashiqur Rahman, Md Jobair Hossain Faruk, Hossain Shahriar, Alfredo Cuzzocrea, Victor Clincy

    Abstract: Ride-hailing and ride-sharing applications have recently gained popularity as a convenient alternative to traditional modes of travel. Current research into autonomous vehicles is accelerating rapidly and will soon become a critical component of a ride-hailing platforms architecture. Implementing an autonomous vehicle ride-hailing platform proves a difficult challenge due to the centralized nature… ▽ More

    Submitted 7 July, 2022; originally announced July 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:1910.00715

    Journal ref: 2021 IEEE International Conference on Big Data (Big Data)

  9. Ransomware Classification and Detection With Machine Learning Algorithms

    Authors: Mohammad Masum, Md Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan Lo, Muhaiminul Islam Adnan

    Abstract: Malicious attacks, malware, and ransomware families pose critical security issues to cybersecurity, and it may cause catastrophic damages to computer systems, data centers, web, and mobile applications across various industries and businesses. Traditional anti-ransomware systems struggle to fight against newly created sophisticated attacks. Therefore, state-of-the-art techniques like traditional a… ▽ More

    Submitted 2 July, 2022; originally announced July 2022.

    Journal ref: 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)

  10. Software Engineering Process and Methodology in Blockchain-Oriented Software Development: A Systematic Study

    Authors: Md Jobair Hossain Faruk, Santhiya Subramanian, Hossain Shahriar, Maria Valero, Xia Li, Masrura Tasnim

    Abstract: Software Engineering is the process of a systematic, disciplined, quantifiable approach that has significant impact on large-scale and complex software development. Scores of well-established software process models have long been adopted in the software development life cycle that pour stakeholders towards the completion of final software product development. Within the boundary of advanced techn… ▽ More

    Submitted 2 July, 2022; originally announced July 2022.

    Journal ref: 2022 IEEE/ACIS 20th International Conference on Software Engineering Research, Management and Applications (SERA)

  11. Malware Detection and Prevention using Artificial Intelligence Techniques

    Authors: Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Farhat Lamia Barsha, Shahriar Sobhan, Md Abdullah Khan, Michael Whitman, Alfredo Cuzzocreak, Dan Lo, Akond Rahman, Fan Wu

    Abstract: With the rapid technological advancement, security has become a major issue due to the increase in malware activity that poses a serious threat to the security and safety of both computer systems and stakeholders. To maintain stakeholders, particularly, end users security, protecting the data from fraudulent efforts is one of the most pressing concerns. A set of malicious programming code, scripts… ▽ More

    Submitted 25 June, 2022; originally announced June 2022.

    Journal ref: 2021 IEEE International Conference on Big Data (Big Data)

  12. Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring

    Authors: Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Sweta Sneha, Sheikh I. Ahamed Mohammad Rahman

    Abstract: Traditional data collection, storage and processing of Electronic Health Records (EHR) utilize centralized techniques that pose several risks of single point of failure and lean the systems to a number of internal and external data breaches that compromise their reliability and availability. Blockchain is an emerging distributed technology that can solve these issues due to its immutability and ar… ▽ More

    Submitted 25 June, 2022; originally announced June 2022.

    Journal ref: 2021 IEEE International Conference on Digital Health (ICDH)

  13. arXiv:2204.02784  [pdf

    quant-ph cs.SE

    Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go?

    Authors: Mohammad Masum, Mohammad Nazim, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Md Abdullah Hafiz Khan, Gias Uddin, Shabir Barzanjeh, Erhan Saglamyurek, Akond Rahman, Sheikh Iqbal Ahamed

    Abstract: Quantum Computing (QC) has gained immense popularity as a potential solution to deal with the ever-increasing size of data and associated challenges leveraging the concept of quantum random access memory (QRAM). QC promises quadratic or exponential increases in computational time with quantum parallelism and thus offer a huge leap forward in the computation of Machine Learning algorithms. This pap… ▽ More

    Submitted 4 April, 2022; originally announced April 2022.

    Comments: 2022 IEEE Computers, Software, and Applications Conference

  14. arXiv:2204.01856  [pdf

    cs.SE quant-ph

    Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing Tools

    Authors: Paramita Basak Upama, Md Jobair Hossain Faruk, Mohammad Nazim, Mohammad Masum, Hossain Shahriar, Gias Uddin, Shabir Barzanjeh, Sheikh Iqbal Ahamed, Akond Rahman

    Abstract: Quantum Computing (QC) refers to an emerging paradigm that inherits and builds with the concepts and phenomena of Quantum Mechanic (QM) with the significant potential to unlock a remarkable opportunity to solve complex and computationally intractable problems that scientists could not tackle previously. In recent years, tremendous efforts and progress in QC mark a significant milestone in solving… ▽ More

    Submitted 4 April, 2022; originally announced April 2022.

    Comments: 2022 IEEE Computers, Software, and Applications Conference