Skip to main content

Showing 1–14 of 14 results for author: Akter, M S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.07716  [pdf

    cs.CV

    Unleashing the Power of Transfer Learning Model for Sophisticated Insect Detection: Revolutionizing Insect Classification

    Authors: Md. Mahmudul Hasan, SM Shaqib, Ms. Sharmin Akter, Rabiul Alam, Afraz Ul Haque, Shahrun akter khushbu

    Abstract: The purpose of the Insect Detection System for Crop and Plant Health is to keep an eye out for and identify insect infestations in farming areas. By utilizing cutting-edge technology like computer vision and machine learning, the system seeks to identify hazardous insects early and accurately. This would enable prompt response to save crops and maintain optimal plant health. The Method of this stu… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

  2. arXiv:2311.16944  [pdf

    cs.CR

    Teaching DevOps Security Education with Hands-on Labware: Automated Detection of Security Weakness in Python

    Authors: Mst Shapna Akter, Juanjose Rodriguez-Cardenas, Md Mostafizur Rahman, Hossain Shahriar, Akond Rahman, Fan Wu

    Abstract: The field of DevOps security education necessitates innovative approaches to effectively address the ever-evolving challenges of cybersecurity. In adopting a student-centered ap-proach, there is the need for the design and development of a comprehensive set of hands-on learning modules. In this paper, we introduce hands-on learning modules that enable learners to be familiar with identifying known… ▽ More

    Submitted 3 April, 2024; v1 submitted 14 August, 2023; originally announced November 2023.

  3. arXiv:2308.09722  [pdf

    cs.LG cs.CL cs.SI

    A Trustable LSTM-Autoencoder Network for Cyberbullying Detection on Social Media Using Synthetic Data

    Authors: Mst Shapna Akter, Hossain Shahriar, Alfredo Cuzzocrea

    Abstract: Social media cyberbullying has a detrimental effect on human life. As online social networking grows daily, the amount of hate speech also increases. Such terrible content can cause depression and actions related to suicide. This paper proposes a trustable LSTM-Autoencoder Network for cyberbullying detection on social media using synthetic data. We have demonstrated a cutting-edge method to addres… ▽ More

    Submitted 15 August, 2023; originally announced August 2023.

    Comments: arXiv admin note: text overlap with arXiv:2303.07484

  4. arXiv:2306.09248  [pdf

    cs.CR

    Quantum Cryptography for Enhanced Network Security: A Comprehensive Survey of Research, Developments, and Future Directions

    Authors: Mst Shapna Akter

    Abstract: With the ever-growing concern for internet security, the field of quantum cryptography emerges as a promising solution for enhancing the security of networking systems. In this paper, 20 notable papers from leading conferences and journals are reviewed and categorized based on their focus on various aspects of quantum cryptography, including key distribution, quantum bit commitment, post quantum c… ▽ More

    Submitted 2 June, 2023; originally announced June 2023.

  5. Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms

    Authors: Mst Shapna Akter, Md Jobair Hossain Faruk, Nafisa Anjum, Mohammad Masum, Hossain Shahriar, Akond Rahman, Fan Wu, Alfredo Cuzzocrea

    Abstract: The software supply chain (SSC) attack has become one of the crucial issues that are being increased rapidly with the advancement of the software development domain. In general, SSC attacks execute during the software development processes lead to vulnerabilities in software products targeting downstream customers and even involved stakeholders. Machine Learning approaches are proven in detecting… ▽ More

    Submitted 31 May, 2023; originally announced June 2023.

  6. arXiv:2306.07981  [pdf

    cs.CR cs.LG cs.SE

    Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks

    Authors: Mst Shapna Akter, Hossain Shahriar, Juan Rodriguez Cardenas, Sheikh Iqbal Ahamed, Alfredo Cuzzocrea

    Abstract: One of the most significant challenges in the field of software code auditing is the presence of vulnerabilities in software source code. Every year, more and more software flaws are discovered, either internally in proprietary code or publicly disclosed. These flaws are highly likely to be exploited and can lead to system compromise, data leakage, or denial of service. To create a large-scale mac… ▽ More

    Submitted 31 May, 2023; originally announced June 2023.

  7. arXiv:2306.00284  [pdf

    cs.CR cs.LG quant-ph

    Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection

    Authors: Mst Shapna Akter, Hossain Shahriar, Sheikh Iqbal Ahamed, Kishor Datta Gupta, Muhammad Rahman, Atef Mohamed, Mohammad Rahman, Akond Rahman, Fan Wu

    Abstract: Quantum machine learning (QML) is an emerging field of research that leverages quantum computing to improve the classical machine learning approach to solve complex real world problems. QML has the potential to address cybersecurity related challenges. Considering the novelty and complex architecture of QML, resources are not yet explicitly available that can pave cybersecurity learners to instill… ▽ More

    Submitted 31 May, 2023; originally announced June 2023.

  8. arXiv:2306.00283  [pdf

    cs.CV

    Autism Disease Detection Using Transfer Learning Techniques: Performance Comparison Between Central Processing Unit vs Graphics Processing Unit Functions for Neural Networks

    Authors: Mst Shapna Akter, Hossain Shahriar, Alfredo Cuzzocrea

    Abstract: Neural network approaches are machine learning methods that are widely used in various domains, such as healthcare and cybersecurity. Neural networks are especially renowned for their ability to deal with image datasets. During the training process with images, various fundamental mathematical operations are performed in the neural network. These operations include several algebraic and mathematic… ▽ More

    Submitted 31 May, 2023; originally announced June 2023.

  9. arXiv:2305.19593  [pdf

    cs.LG quant-ph

    Exploring the Vulnerabilities of Machine Learning and Quantum Machine Learning to Adversarial Attacks using a Malware Dataset: A Comparative Analysis

    Authors: Mst Shapna Akter, Hossain Shahriar, Iysa Iqbal, MD Hossain, M. A. Karim, Victor Clincy, Razvan Voicu

    Abstract: The burgeoning fields of machine learning (ML) and quantum machine learning (QML) have shown remarkable potential in tackling complex problems across various domains. However, their susceptibility to adversarial attacks raises concerns when deploying these systems in security sensitive applications. In this study, we present a comparative analysis of the vulnerability of ML and QML models, specifi… ▽ More

    Submitted 31 May, 2023; originally announced May 2023.

  10. Towards Unsupervised Learning based Denoising of Cyber Physical System Data to Mitigate Security Concerns

    Authors: Mst Shapna Akter, Hossain Shahriar

    Abstract: A dataset, collected under an industrial setting, often contains a significant portion of noises. In many cases, using trivial filters is not enough to retrieve useful information i.e., accurate value without the noise. One such data is time-series sensor readings collected from moving vehicles containing fuel information. Due to the noisy dynamics and mobile environment, the sensor readings can b… ▽ More

    Submitted 13 March, 2023; originally announced March 2023.

  11. arXiv:2303.07525  [pdf

    cs.LG cs.CV

    Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing

    Authors: Mst Shapna Akter, Hossain Shahriar, Zakirul Alam Bhuiya

    Abstract: One of the most important challenges in the field of software code audit is the presence of vulnerabilities in software source code. These flaws are highly likely ex-ploited and lead to system compromise, data leakage, or denial of ser-vice. C and C++ open source code are now available in order to create a large-scale, classical machine-learning and quantum machine-learning system for function-lev… ▽ More

    Submitted 13 March, 2023; originally announced March 2023.

  12. Multi-class Skin Cancer Classification Architecture Based on Deep Convolutional Neural Network

    Authors: Mst Shapna Akter, Hossain Shahriar, Sweta Sneha, Alfredo Cuzzocrea

    Abstract: Skin cancer detection is challenging since different types of skin lesions share high similarities. This paper proposes a computer-based deep learning approach that will accurately identify different kinds of skin lesions. Deep learning approaches can detect skin cancer very accurately since the models learn each pixel of an image. Sometimes humans can get confused by the similarities of the skin… ▽ More

    Submitted 13 March, 2023; originally announced March 2023.

  13. Handwritten Word Recognition using Deep Learning Approach: A Novel Way of Generating Handwritten Words

    Authors: Mst Shapna Akter, Hossain Shahriar, Alfredo Cuzzocrea, Nova Ahmed, Carson Leung

    Abstract: A handwritten word recognition system comes with issues such as lack of large and diverse datasets. It is necessary to resolve such issues since millions of official documents can be digitized by training deep learning models using a large and diverse dataset. Due to the lack of data availability, the trained model does not give the expected result. Thus, it has a high chance of showing poor resul… ▽ More

    Submitted 13 March, 2023; originally announced March 2023.

  14. Deep Learning Approach for Classifying the Aggressive Comments on Social Media: Machine Translated Data Vs Real Life Data

    Authors: Mst Shapna Akter, Hossain Shahriar, Nova Ahmed, Alfredo Cuzzocrea

    Abstract: Aggressive comments on social media negatively impact human life. Such offensive contents are responsible for depression and suicidal-related activities. Since online social networking is increasing day by day, the hate content is also increasing. Several investigations have been done on the domain of cyberbullying, cyberaggression, hate speech, etc. The majority of the inquiry has been done in th… ▽ More

    Submitted 13 March, 2023; originally announced March 2023.