default search action
Shahriar Badsha
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c25]Abdur R. Shahid, Syed Mhamudul Hasan, Ahmed Imteaj, Shahriar Badsha:
Context-Aware Spatiotemporal Poisoning Attacks on Wearable-Based Activity Recognition. INFOCOM (Workshops) 2024: 1-2 - 2023
- [j24]Shafkat Islam, Shahriar Badsha, Ibrahim Khalil, Mohammed Atiquzzaman, Charalambos Konstantinou:
A Triggerless Backdoor Attack and Defense Mechanism for Intelligent Task Offloading in Multi-UAV Systems. IEEE Internet Things J. 10(7): 5719-5732 (2023) - [j23]Shafkat Islam, Shahriar Badsha, Shamik Sengupta, Ibrahim Khalil, Mohammed Atiquzzaman:
An Intelligent Privacy Preservation Scheme for EV Charging Infrastructure. IEEE Trans. Ind. Informatics 19(2): 1238-1247 (2023) - [j22]Neda Bugshan, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman, Xun Yi, Shahriar Badsha:
Toward Trustworthy and Privacy-Preserving Federated Deep Learning Service Framework for Industrial Internet of Things. IEEE Trans. Ind. Informatics 19(2): 1535-1547 (2023) - [c24]Md Tamjid Hossain, Hung Manh La, Shahriar Badsha, Anton Netchaev:
BRNES: Enabling Security and Privacy-Aware Experience Sharing in Multiagent Robotic and Autonomous Systems. IROS 2023: 9269-9276 - [c23]Shafkat Islam, Ioannis Zografopoulos, Md Tamjid Hossain, Shahriar Badsha, Charalambos Konstantinou:
A Resource Allocation Scheme for Energy Demand Management in 6G-enabled Smart Grid. ISGT 2023: 1-5 - [c22]Abdur R. Shahid, Ahmed Imteaj, Shahriar Badsha, Md. Zarif Hossain:
Assessing Wearable Human Activity Recognition Systems Against Data Poisoning Attacks in Differentially-Private Federated Learning. SMARTCOMP 2023: 355-360 - [i9]Md Tamjid Hossain, Hung Manh La, Shahriar Badsha, Anton Netchaev:
BRNES: Enabling Security and Privacy-aware Experience Sharing in Multiagent Robotic and Autonomous Systems. CoRR abs/2308.01274 (2023) - 2022
- [j21]Sergio Cantillo-Luna, Ricardo Moreno-Chuquen, Harold R. Chamorro, Vijay K. Sood, Shahriar Badsha, Charalambos Konstantinou:
Blockchain for Distributed Energy Resources Management and Integration. IEEE Access 10: 68598-68617 (2022) - [j20]Md Didarul Islam, Haoting Shen, Shahriar Badsha:
Integrating blockchain into supply chain safeguarded by PUF-enabled RFID. Internet Things 18: 100505 (2022) - [p1]Shafkat Islam, Arpan Bhattacharjee, Shahriar Badsha:
Toward Secure Cyber Infrastructure for Smart Cities: Learning-Based Intelligent Solutions. IoT and WSN based Smart Cities 2022: 215-224 - [i8]Md Tamjid Hossain, Shahriar Badsha, Hung M. La, Haoting Shen, Shafkat Islam, Ibrahim Khalil, Xun Yi:
Adversarial Analysis of the Differentially-Private Federated Learning in Cyber-Physical Critical Infrastructures. CoRR abs/2204.02654 (2022) - [i7]Shafkat Islam, Ioannis Zografopoulos, Md Tamjid Hossain, Shahriar Badsha, Charalambos Konstantinou:
A Resource Allocation Scheme for Energy Demand Management in 6G-enabled Smart Grid. CoRR abs/2207.00154 (2022) - 2021
- [j19]Shirshak Raja Maskey, Shahriar Badsha, Shamik Sengupta, Ibrahim Khalil:
Reputation-Based Miner Node Selection in Blockchain-Based Vehicular Edge Computing. IEEE Consumer Electron. Mag. 10(5): 14-22 (2021) - [j18]Shirshak Raja Maskey, Shahriar Badsha, Shamik Sengupta, Ibrahim Khalil:
ALICIA: Applied Intelligence in blockchain based VANET: Accident Validation as a Case Study. Inf. Process. Manag. 58(3): 102508 (2021) - [j17]Sowmya Kudva, Shahriar Badsha, Shamik Sengupta, Ibrahim Khalil, Albert Y. Zomaya:
Towards secure and practical consensus for blockchain based VANET. Inf. Sci. 545: 170-187 (2021) - [j16]Sowmya Kudva, Shahriar Badsha, Shamik Sengupta, Hung Manh La, Ibrahim Khalil, Mohammed Atiquzzaman:
A scalable blockchain based trust management in VANET routing protocol. J. Parallel Distributed Comput. 152: 144-156 (2021) - [j15]Shafkat Islam, Shahriar Badsha, Shamik Sengupta, Hung M. La, Ibrahim Khalil, Mohammed Atiquzzaman:
Blockchain-Enabled Intelligent Vehicular Edge Computing. IEEE Netw. 35(3): 125-131 (2021) - [j14]Shahriar Badsha, Xun Yi, Ibrahim Khalil, Dongxi Liu, Surya Nepal, Elisa Bertino, Kwok-Yan Lam:
Privacy Preserving Location-Aware Personalized Web Service Recommendations. IEEE Trans. Serv. Comput. 14(3): 791-804 (2021) - [c21]Md Tamjid Hossain, Shahriar Badsha, Haoting Shen:
Privacy, Security, and Utility Analysis of Differentially Private CPES Data. CNS 2021: 65-73 - [c20]Arpan Bhattacharjee, Shahriar Badsha, Shamik Sengupta:
Personalized Privacy Preservation for Smart Grid. ISC2 2021: 1-7 - [c19]Arpan Bhattacharjee, Shahriar Badsha, Md Tamjid Hossain, Charalambos Konstantinou, Xueping Liang:
Vulnerability Characterization and Privacy Quantification for Cyber-Physical Systems. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2021: 217-223 - [c18]Md Tamjid Hossain, Shafkat Islam, Shahriar Badsha, Haoting Shen:
DeSMP: Differential Privacy-exploited Stealthy Model Poisoning Attacks in Federated Learning. MSN 2021: 167-174 - [c17]Shafkat Islam, Shahriar Badsha, Shamik Sengupta:
Context-Aware Fine-Grained Task Scheduling at Vehicular Edges: An Extreme Reinforcement Learning based Dynamic Approach. WOWMOM 2021: 31-40 - [i6]Farhan Sadique, Ignacio Astaburuaga, Raghav Kaul, Shamik Sengupta, Shahriar Badsha, James Schnebly, Adam Cassell, Jeff Springer, Nancy Latourrette, Sergiu M. Dascalu:
Cybersecurity Information Exchange with Privacy (CYBEX-P) and TAHOE - A Cyberthreat Language. CoRR abs/2106.01632 (2021) - [i5]Md Tamjid Hossain, Shafkat Islam, Shahriar Badsha, Haoting Shen:
DeSMP: Differential Privacy-exploited Stealthy Model Poisoning Attacks in Federated Learning. CoRR abs/2109.09955 (2021) - [i4]Md Tamjid Hossain, Shahriar Badsha, Haoting Shen:
Privacy, Security, and Utility Analysis of Differentially Private CPES Data. CoRR abs/2109.09963 (2021) - [i3]Md Tamjid Hossain, Shahriar Badsha, Haoting Shen:
PoRCH: A Novel Consensus Mechanism for Blockchain-Enabled Future SCADA Systems in Smart Grids and Industry 4.0. CoRR abs/2109.09966 (2021) - [i2]Arpan Bhattacharjee, Shahriar Badsha, Md Tamjid Hossain, Charalambos Konstantinou, Xueping Liang:
Vulnerability Characterization and Privacy Quantification for Cyber-Physical Systems. CoRR abs/2110.15417 (2021) - 2020
- [j13]Rongjun Xie, Ibrahim Khalil, Shahriar Badsha, Mohammed Atiquzzaman:
An intelligent healthcare system with data priority based on multi vital biosignals. Comput. Methods Programs Biomed. 185: 105126 (2020) - [j12]Iqbal H. Sarker, A. S. M. Kayes, Shahriar Badsha, Hamed AlQahtani, Paul A. Watters, Alex Ng:
Cybersecurity data science: an overview from machine learning perspective. J. Big Data 7(1): 41 (2020) - [j11]A. S. M. Kayes, Rudri Kalaria, Iqbal H. Sarker, Md. Saiful Islam, Paul A. Watters, Alex Ng, Mohammad Hammoudeh, Shahriar Badsha, Indika Kumara:
A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues. Sensors 20(9): 2464 (2020) - [c16]Ankita Thakkar, Shahriar Badsha, Shamik Sengupta:
Game theoretic approach applied in cybersecurity information exchange framework. CCNC 2020: 1-7 - [c15]Shahriar Badsha, Iman Vakilinia, Shamik Sengupta:
BloCyNfo-Share: Blockchain based Cybersecurity Information Sharing with Fine Grained Access Control. CCWC 2020: 317-323 - [c14]Farhan Sadique, Raghav Kaul, Shahriar Badsha, Shamik Sengupta:
An Automated Framework for Real-time Phishing URL Detection. CCWC 2020: 335-341 - [c13]Sowmya Kudva, Renat Norderhaug, Shahriar Badsha, Shamik Sengupta, A. S. M. Kayes:
PEBERS: Practical Ethereum Blockchain based Efficient Ride Hailing Service. ICIoT 2020: 422-428 - [c12]A. S. M. Kayes, Mohammad Hammoudeh, Shahriar Badsha, Paul A. Watters, Alex Ng, Fatma Mohammed, Mofakharul Islam:
Responsibility Attribution Against Data Breaches. ICIoT 2020: 498-503 - [c11]Tauhidul Alam, Jarrett Taylor, Jonathan Taylor, Shahriar Badsha, Abdur Rahman Bin Shahid, A. S. M. Kayes:
Leveraging Blockchain for Spoof-Resilient Robot Networks. ICIRA 2020: 207-216 - [c10]Shafkat Islam, Shahriar Badsha, Shamik Sengupta:
A Light-weight Blockchain Architecture for V2V Knowledge Sharing at Vehicular Edges. ISC2 2020: 1-8 - [c9]Arpan Bhattacharjee, Shahriar Badsha, Shamik Sengupta:
Blockchain-based Secure and Reliable Manufacturing System. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 228-233 - [c8]Shirshak Raja Maskey, Shahriar Badsha, Shamik Sengupta, Ibrahim Khalil:
BITS: Blockchain based Intelligent Transportation System with Outlier Detection for Smart City. PerCom Workshops 2020: 1-6
2010 – 2019
- 2019
- [j10]Rongjun Xie, Ibrahim Khalil, Shahriar Badsha, Mohammed Atiquzzaman:
Collaborative extreme learning machine with a confidence interval for P2P learning in healthcare. Comput. Networks 149: 127-143 (2019) - [j9]Andrei Kelarev, Xun Yi, Shahriar Badsha, Xuechao Yang, Leanne Rylands, Jennifer Seberry:
A multistage protocol for aggregated queries in distributed cloud databases with privacy protection. Future Gener. Comput. Syst. 90: 368-380 (2019) - [c7]Shahriar Badsha, Iman Vakilinia, Shamik Sengupta:
Privacy Preserving Cyber Threat Information Sharing and Learning for Cyber Defense. CCWC 2019: 708-714 - [c6]Iman Vakilinia, Shahin Vakilinia, Shahriar Badsha, Engin Arslan, Shamik Sengupta:
Pooling Approach for Task Allocation in the Blockchain Based Decentralized Storage Network. CNSM 2019: 1-6 - 2018
- [j8]Shahriar Badsha, Ibrahim Khalil, Xun Yi, Mohammed Atiquzzaman:
Designing Privacy-Preserving Protocols for Content Sharing and Aggregation in Content Centric Networking. IEEE Access 6: 42119-42130 (2018) - [j7]Shahriar Badsha, Xun Yi, Ibrahim Khalil, Dongxi Liu, Surya Nepal, Kwok-Yan Lam:
Privacy Preserving User Based Web Service Recommendations. IEEE Access 6: 56647-56657 (2018) - [j6]Rongjun Xie, Ibrahim Khalil, Shahriar Badsha, Mohammed Atiquzzaman:
Fast and peer-to-peer vital signal learning system for cloud-based healthcare. Future Gener. Comput. Syst. 88: 220-233 (2018) - [c5]Farhan Sadique, Sui Cheung, Iman Vakilinia, Shahriar Badsha, Shamik Sengupta:
Automated Structured Threat Information Expression (STIX) Document Generation with Privacy Preservation. UEMCON 2018: 847-853 - [c4]Iman Vakilinia, Shahriar Badsha, Shamik Sengupta:
Crowdfunding the Insurance of a Cyber-Product Using Blockchain. UEMCON 2018: 964-970 - 2017
- [c3]Shahriar Badsha, Xun Yi, Ibrahim Khalil, Elisa Bertino:
Privacy Preserving User-Based Recommender System. ICDCS 2017: 1074-1083 - [c2]Shahriar Badsha, Xun Yi, Ibrahim Khalil, Andrei Kelarev:
Private Recommendations Generation for Vertically Partitioned Datasets. PACIS 2017: 163 - [c1]Shahriar Badsha, Xun Yi, Ibrahim Khalil, Dongxi Liu, Surya Nepal, Elisa Bertino:
Privacy Preserving Location Recommendations. WISE (2) 2017: 502-516 - 2016
- [j5]Shahriar Badsha, Xun Yi, Ibrahim Khalil:
A Practical Privacy-Preserving Recommender System. Data Sci. Eng. 1(3): 161-177 (2016) - 2015
- [j4]Shahriar Badsha, Hamzah Arof, Norrima Mokhtar, Yvonne Ai Lian Lim, Marizan Mubin, Mahazani Mohamad:
Segmentation of overlapping Cryptosporidium and Giardia (oo)cysts using bidirectional contour tracing. Biomed. Signal Process. Control. 18: 161-168 (2015) - 2013
- [j3]Shahriar Badsha, Norrima Mokhtar, Hamzah Arof, Yvonne Ai Lim, Marizan Mubin, Zuwairie Ibrahim:
Automatic Cryptosporidium and Giardia viability detection in treated water. EURASIP J. Image Video Process. 2013: 56 (2013) - [j2]Shahriar Badsha, Ahmed Wasif Reza, Kim Geok Tan, Kaharudin Dimyati:
A New Blood Vessel Extraction Technique Using Edge Enhancement and Object Classification. J. Digit. Imaging 26(6): 1107-1115 (2013) - [j1]Ahmed Faisal, Sharmin Parveen, Shahriar Badsha, Hasan Sarwar, Ahmed Wasif Reza:
Computer Assisted Diagnostic System in Tumor Radiography. J. Medical Syst. 37(3): 9938 (2013) - 2012
- [i1]Abdur Rahman Bin Shahid, Shahriar Badsha, Md. Rethwan Kabeer, Junaid Ahsan, Mufti Mahmud:
A Non-Blind Watermarking Scheme for Gray Scale Images in Discrete Wavelet Transform Domain using Two Subbands. CoRR abs/1211.2699 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint