Skip to main content

Showing 1–15 of 15 results for author: Uddin, M A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.21016  [pdf, other

    cs.CV

    MpoxSLDNet: A Novel CNN Model for Detecting Monkeypox Lesions and Performance Comparison with Pre-trained Models

    Authors: Fatema Jannat Dihan, Saydul Akbar Murad, Abu Jafar Md Muzahid, K. M. Aslam Uddin, Mohammed J. F. Alenazi, Anupam Kumar Bairagi, Sujit Biswas

    Abstract: Monkeypox virus (MPXV) is a zoonotic virus that poses a significant threat to public health, particularly in remote parts of Central and West Africa. Early detection of monkeypox lesions is crucial for effective treatment. However, due to its similarity with other skin diseases, monkeypox lesion detection is a challenging task. To detect monkeypox, many researchers used various deep-learning model… ▽ More

    Submitted 31 May, 2024; originally announced May 2024.

  2. arXiv:2405.08026  [pdf, other

    cs.LG

    ExplainableDetector: Exploring Transformer-based Language Modeling Approach for SMS Spam Detection with Explainability Analysis

    Authors: Mohammad Amaz Uddin, Muhammad Nazrul Islam, Leandros Maglaras, Helge Janicke, Iqbal H. Sarker

    Abstract: SMS, or short messaging service, is a widely used and cost-effective communication medium that has sadly turned into a haven for unwanted messages, commonly known as SMS spam. With the rapid adoption of smartphones and Internet connectivity, SMS spam has emerged as a prevalent threat. Spammers have taken notice of the significance of SMS for mobile phone users. Consequently, with the emergence of… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

  3. arXiv:2403.13013  [pdf, other

    cs.CR cs.LG

    Hierarchical Classification for Intrusion Detection System: Effective Design and Empirical Analysis

    Authors: Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder

    Abstract: With the increased use of network technologies like Internet of Things (IoT) in many real-world applications, new types of cyberattacks have been emerging. To safeguard critical infrastructures from these emerging threats, it is crucial to deploy an Intrusion Detection System (IDS) that can detect different types of attacks accurately while minimizing false alarms. Machine learning approaches have… ▽ More

    Submitted 17 March, 2024; originally announced March 2024.

    Comments: Deakin University, Australia | This material is based upon work supported by the Air Force Office of Scientific Research under award number FA2386-23-1-4003

  4. arXiv:2403.13010  [pdf, other

    cs.CR cs.LG

    A Dual-Tier Adaptive One-Class Classification IDS for Emerging Cyberthreats

    Authors: Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder

    Abstract: In today's digital age, our dependence on IoT (Internet of Things) and IIoT (Industrial IoT) systems has grown immensely, which facilitates sensitive activities such as banking transactions and personal, enterprise data, and legal document exchanges. Cyberattackers consistently exploit weak security measures and tools. The Network Intrusion Detection System (IDS) acts as a primary tool against suc… ▽ More

    Submitted 17 March, 2024; originally announced March 2024.

    Comments: Deakin University, Australia | This material is based upon work supported by the Air Force Office of Scientific Research under award number FA2386-23-1-4003

  5. arXiv:2403.11180  [pdf, other

    cs.CR cs.LG

    usfAD Based Effective Unknown Attack Detection Focused IDS Framework

    Authors: Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder

    Abstract: The rapid expansion of varied network systems, including the Internet of Things (IoT) and Industrial Internet of Things (IIoT), has led to an increasing range of cyber threats. Ensuring robust protection against these threats necessitates the implementation of an effective Intrusion Detection System (IDS). For more than a decade, researchers have delved into supervised machine learning techniques… ▽ More

    Submitted 17 March, 2024; originally announced March 2024.

    Comments: Deakin University, Australia | This material is based upon work supported by the Air Force Office of Scientific Research under award number FA2386-23-1-4003

  6. Hybridized Convolutional Neural Networks and Long Short-Term Memory for Improved Alzheimer's Disease Diagnosis from MRI Scans

    Authors: Maleka Khatun, Md Manowarul Islam, Habibur Rahman Rifat, Md. Shamim Bin Shahid, Md. Alamin Talukder, Md Ashraf Uddin

    Abstract: Brain-related diseases are more sensitive than other diseases due to several factors, including the complexity of surgical procedures, high costs, and other challenges. Alzheimer's disease is a common brain disorder that causes memory loss and the shrinking of brain cells. Early detection is critical for providing proper treatment to patients. However, identifying Alzheimer's at an early stage usi… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

    Comments: Accepted In The 26th International Conference on Computer and Information Technology (ICCIT) On 13-15 December 2023

  7. arXiv:2402.17807  [pdf, other

    q-bio.GN cs.LG

    Exploring Gene Regulatory Interaction Networks and predicting therapeutic molecules for Hypopharyngeal Cancer and EGFR-mutated lung adenocarcinoma

    Authors: Abanti Bhattacharjya, Md Manowarul Islam, Md Ashraf Uddin, Md. Alamin Talukder, AKM Azad, Sunil Aryal, Bikash Kumar Paul, Wahia Tasnim, Muhammad Ali Abdulllah Almoyad, Mohammad Ali Moni

    Abstract: With the advent of Information technology, the Bioinformatics research field is becoming increasingly attractive to researchers and academicians. The recent development of various Bioinformatics toolkits has facilitated the rapid processing and analysis of vast quantities of biological data for human perception. Most studies focus on locating two connected diseases and making some observations to… ▽ More

    Submitted 27 February, 2024; originally announced February 2024.

    Comments: Accepted In The FEBS OPEN BIO (Q2, SCOPUS, SCIE, IF: 2.6, CS: 4.7), Wiley Journal, On FEB 25, 2024

  8. arXiv:2402.14389  [pdf, other

    cs.LG q-fin.GN

    Securing Transactions: A Hybrid Dependable Ensemble Machine Learning Model using IHT-LR and Grid Search

    Authors: Md. Alamin Talukder, Rakib Hossen, Md Ashraf Uddin, Mohammed Nasir Uddin, Uzzal Kumar Acharjee

    Abstract: Financial institutions and businesses face an ongoing challenge from fraudulent transactions, prompting the need for effective detection methods. Detecting credit card fraud is crucial for identifying and preventing unauthorized transactions.Timely detection of fraud enables investigators to take swift actions to mitigate further losses. However, the investigation process is often time-consuming,… ▽ More

    Submitted 22 February, 2024; originally announced February 2024.

    Comments: Q1, Scopus, ISI, ESCI, IF: 4.8 (Accepted on Jan 19, 2024 - Cybersecurity, Springer Open Journal)

  9. arXiv:2402.13871  [pdf, other

    cs.LG cs.AI cs.CR

    An Explainable Transformer-based Model for Phishing Email Detection: A Large Language Model Approach

    Authors: Mohammad Amaz Uddin, Iqbal H. Sarker

    Abstract: Phishing email is a serious cyber threat that tries to deceive users by sending false emails with the intention of stealing confidential information or causing financial harm. Attackers, often posing as trustworthy entities, exploit technological advancements and sophistication to make detection and prevention of phishing more challenging. Despite extensive academic research, phishing detection re… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

  10. arXiv:2402.13277  [pdf, other

    cs.CR cs.LG

    MLSTL-WSN: Machine Learning-based Intrusion Detection using SMOTETomek in WSNs

    Authors: Md. Alamin Talukder, Selina Sharmin, Md Ashraf Uddin, Md Manowarul Islam, Sunil Aryal

    Abstract: Wireless Sensor Networks (WSNs) play a pivotal role as infrastructures, encompassing both stationary and mobile sensors. These sensors self-organize and establish multi-hop connections for communication, collectively sensing, gathering, processing, and transmitting data about their surroundings. Despite their significance, WSNs face rapid and detrimental attacks that can disrupt functionality. Exi… ▽ More

    Submitted 22 February, 2024; v1 submitted 17 February, 2024; originally announced February 2024.

    Comments: International Journal of Information Security, Springer Journal - Q1, Scopus, ISI, SCIE, IF: 3.2 - Accepted on Jan 17, 2024

  11. arXiv:2401.12262  [pdf, other

    cs.CR cs.LG

    Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction

    Authors: Md. Alamin Talukder, Md. Manowarul Islam, Md Ashraf Uddin, Khondokar Fida Hasan, Selina Sharmin, Salem A. Alyami, Mohammad Ali Moni

    Abstract: Cybersecurity has emerged as a critical global concern. Intrusion Detection Systems (IDS) play a critical role in protecting interconnected networks by detecting malicious actors and activities. Machine Learning (ML)-based behavior analysis within the IDS has considerable potential for detecting dynamic cyber threats, identifying abnormalities, and identifying malicious conduct within the network.… ▽ More

    Submitted 22 January, 2024; originally announced January 2024.

    Comments: Accepted in Journal of Big Data (Q1, IF: 8.1, SCIE) on Jan 19, 2024

  12. arXiv:2311.16593  [pdf, other

    eess.IV cs.CV cs.LG

    Empowering COVID-19 Detection: Optimizing Performance Through Fine-Tuned EfficientNet Deep Learning Architecture

    Authors: Md. Alamin Talukder, Md. Abu Layek, Mohsin Kazi, Md Ashraf Uddin, Sunil Aryal

    Abstract: The worldwide COVID-19 pandemic has profoundly influenced the health and everyday experiences of individuals across the planet. It is a highly contagious respiratory disease requiring early and accurate detection to curb its rapid transmission. Initial testing methods primarily revolved around identifying the genetic composition of the coronavirus, exhibiting a relatively low detection rate and re… ▽ More

    Submitted 28 November, 2023; originally announced November 2023.

    Comments: Computers in Biology and Medicine [Q1, IF: 7.7, CS: 9.2]

    Journal ref: Computers in Biology and Medicine, Elsevier 2023

  13. arXiv:2305.12844  [pdf, other

    eess.IV cs.CV cs.LG

    An Optimized Ensemble Deep Learning Model For Brain Tumor Classification

    Authors: Md. Alamin Talukder, Md. Manowarul Islam, Md Ashraf Uddin

    Abstract: Brain tumors present a grave risk to human life, demanding precise and timely diagnosis for effective treatment. Inaccurate identification of brain tumors can significantly diminish life expectancy, underscoring the critical need for precise diagnostic methods. Manual identification of brain tumors within vast Magnetic Resonance Imaging (MRI) image datasets is arduous and time-consuming. Thus, the… ▽ More

    Submitted 6 May, 2024; v1 submitted 22 May, 2023; originally announced May 2023.

  14. A Dependable Hybrid Machine Learning Model for Network Intrusion Detection

    Authors: Md. Alamin Talukder, Khondokar Fida Hasan, Md. Manowarul Islam, Md Ashraf Uddin, Arnisha Akhter, Mohammad Abu Yousuf, Fares Alharbi, Mohammad Ali Moni

    Abstract: Network intrusion detection systems (NIDSs) play an important role in computer network security. There are several detection mechanisms where anomaly-based automated detection outperforms others significantly. Amid the sophistication and growing number of attacks, dealing with large amounts of data is a recognized issue in the development of anomaly-based NIDS. However, do current models meet the… ▽ More

    Submitted 27 January, 2023; v1 submitted 8 December, 2022; originally announced December 2022.

    Comments: Accepted in the Journal of Information Security and Applications (Scopus, Web of Science (SCIE) Journal, Quartile: Q1, Site Score: 7.6, Impact Factor: 4.96) on 7 December 2022

    Journal ref: Journal of Information Security and Applications, Volume 72, Pages 103405, Year 2023, ISSN 2214-2126

  15. arXiv:2206.01088  [pdf, other

    eess.IV cs.CV cs.LG

    Machine Learning-based Lung and Colon Cancer Detection using Deep Feature Extraction and Ensemble Learning

    Authors: Md. Alamin Talukder, Md. Manowarul Islam, Md Ashraf Uddin, Arnisha Akhter, Khondokar Fida Hasan, Mohammad Ali Moni

    Abstract: Cancer is a fatal disease caused by a combination of genetic diseases and a variety of biochemical abnormalities. Lung and colon cancer have emerged as two of the leading causes of death and disability in humans. The histopathological detection of such malignancies is usually the most important component in determining the best course of action. Early detection of the ailment on either front consi… ▽ More

    Submitted 3 June, 2022; v1 submitted 2 June, 2022; originally announced June 2022.

    Comments: Accepted for publication in the Special Issue of Expert Systems with Applications (IF:6.954, Cite:12.70) How to Cite: Md. Alamin Talukder, Md. Manowarul Islam, Md Ashraf Uddin, Arnisha Akhter, Khondokar Fida Hasan, Mohammad Ali Moni. "Machine Learning-based Lung and Colon Cancer Detection using Deep Feature Extraction and Ensemble Learning", Expert Systems with Applications. 2022 Jun 1