Ferdous Ahmed Barbhuiya

ORCID: 0000-0001-8247-9171
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Hate Speech and Cyberbullying Detection
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • IoT and Edge/Fog Computing
  • Cloud Data Security Solutions
  • Advanced Malware Detection Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Blockchain Technology Applications and Security
  • IPv6, Mobility, Handover, Networks, Security
  • IoT Networks and Protocols
  • Topic Modeling
  • Energy Efficient Wireless Sensor Networks
  • Advanced Authentication Protocols Security
  • Misinformation and Its Impacts
  • Software-Defined Networks and 5G
  • Natural Language Processing Techniques
  • Face recognition and analysis
  • Energy Harvesting in Wireless Networks
  • Network Packet Processing and Optimization
  • Security in Wireless Sensor Networks
  • User Authentication and Security Systems
  • Social Media and Politics
  • Spam and Phishing Detection
  • Advanced Memory and Neural Computing

Indian Institute of Information Technology Guwahati
2015-2024

Indian Institute of Technology Kharagpur
2021

Indian Institute of Technology Guwahati
2010-2021

Accenture (Switzerland)
2021

Nanjing University of Information Science and Technology
2021

Indian Institute of Technology Hyderabad
2021

IBM Research - India
2021

Indian Institute of Technology Indore
2010-2013

Conference Board
2011

Land is an immovable and non-liquid asset having high value. The integrity proper track of ownership/transfer records land a highly challenging task. As the ownership can constantly change over time that too sometimes very frequently, it poses daunting task keeping elaborate long transfer records. problem further escalates due to presence fraudulent or incomplete registries which are difficult trace back through time. Thus disputes in system, lead litigation running for years, leading...

10.1109/isea-isap49340.2020.235011 article EN 2020-02-01

In this paper, we present the results obtained by BERT, BiLSTM and SVM classifiers on shared task Sarcasm Detection held as part of The Second Workshop Figurative Language Processing. required use conversational context to detect sarcasm. We experimented varying amount used along with response (response is text be classified). includes (i) zero context, (ii) last one, two or three utterances, (iii) all utterances. It was found that including utterance in dialogue improved performance...

10.18653/v1/2020.figlang-1.12 article EN cc-by 2020-01-01

Internet of Things (IoT) with edge computing capability enhances efficiency, availability, and improves latency an industrial automation system. However, to provide dynamic services at the resource-constrained device, reconfiguration is necessary. This article proposes a programmable network (re)configure different IoT, that employs layers for reconfiguring sensor/actuator application services. The lowermost layer allows communication-related parameters middle consists software-defined...

10.1109/jiot.2023.3268375 article EN IEEE Internet of Things Journal 2023-04-19

Using Cryptography and Steganography at the same time, we try to provide Biometric as well Password security voter accounts. The scheme uses images cover objects for keys Cryptography. key image is a measure, such fingerprint image. Proper use of greatly reduces risks in these systems hackers have find both secret template. basic idea merge with on basis result this process produces stego which looks quite similar but not detectable by human eye. system targets authentication requirement...

10.1109/eait.2011.70 article EN 2011-02-01

This paper proposes a smart system cloud based weather station. The uses Raspberry Pi, for collecting and observing data. storing processing of the obtained data is done in to predicting effect this change. designed effectively monitor ambient conditions such as temperature, humidity, wind speed, pressure, rainfall etc. objective design which low cost, requires less maintenance, involved minimal manual intervention. built using commodity hardware various sensors WiFi communication medium...

10.1109/tencon.2019.8929528 article EN TENCON 2021 - 2021 IEEE Region 10 Conference (TENCON) 2019-10-01

The IEEE 802.11ah, also known as WiFi HaLow, is a scalable solution for medium-range communication in Internet of Things (IoT). While provisioning support the IoT and machine-to-machine (M2M) communication, 802.11ah leverages various innovative medium access control (MAC) layer concepts, such restricted window (RAW), hierarchical association identification (AID), traffic indication map (TIM) segmentation, etc. This article presents survey on MAC protocols 802.11ah. discussing essential...

10.1109/jiot.2021.3104388 article EN IEEE Internet of Things Journal 2021-08-12

Cloud is widely used for data storage. A user who has uploaded his/her private or commercial to the cloud always keen know whether that he/she stored secure not. Access logs of can be trace integrity data. are also known as provenance Provenance contains information users. As check so, it becomes very important securely store The should immutable and unreachable adversaries, users will assured their data, Storage Providers use this implementation improve brand value performance. This paper...

10.1145/3327962.3331457 article EN 2019-07-02

With the increase in number of hosts Internet, there is also a rise demand for IP address space. To cater to this issue, version 6 (IPv6) succeeded IPv4. Compared 32 bit space IPv4, IPv6 composed 128 bits. In when host wants communicate with another an LAN, it needs know MAC target host, which was possible through Address Resolution Protocol (ARP). As ARP stateless and due lack authorization messages, many attacks like request spoofing, response Man-in-the-Middle (MiTM), Denial-of- Service...

10.1145/2070425.2070444 article EN 2011-11-14

For better data availability and accessibility while ensuring secrecy, end-users often tend to outsource their the cloud servers in an encrypted form. However, this brings a major challenge perform search for some keywords over content without disclosing any information unintended entities. This paper proposes novel expressive authorized keyword scheme relying on concept of ciphertext-policy attribute-based encryption. The originality proposed is multifold. First, it supports generic...

10.1109/tcc.2019.2931896 article EN IEEE Transactions on Cloud Computing 2019-07-30

Address Resolution Protocol (ARP) based attacks are caused by compromised hosts in the LAN and mainly involve spoofing with falsified IP-MAC pairs. Since ARP is a stateless protocol such possible. Neither there signatures available for these nor any significant statistical behavior change can be observed. So existing signature or anomaly intrusion detection systems unable to detect type of attacks. Several schemes have been proposed literature circumvent attacks, however, techniques either...

10.1109/cicybs.2011.5949401 article EN 2011-04-01

Ocular biometrics in the visible spectrum has emerged as an area of significant research activity. In this paper, we propose two convolution-based models for verifying a pair periocular images containing iris, and compare approaches amongst each other well with baseline model. first approach, perform deep learning unsupervised manner using stacked convolutional architecture, external learned a-priori on facial data, top model applied provided apply different score fusion models. second again...

10.1109/icpr.2016.7899630 article EN 2016-12-01

In this paper, we present the results obtained using bi-directional long short-term memory (BiLSTM) with and without attention Logistic Regression (LR) models for SemEval-2019 Task 5 titled ”HatEval: Multilingual Detection of Hate Speech Against Immigrants Women in Twitter”. This paper presents Subtask A English language. The BiLSTM LR are compared two different types preprocessing. One no stemming performed stopwords removed. other model best first test, while character n-grams second test....

10.18653/v1/s19-2065 article EN cc-by 2019-01-01

Role-Based Encryption (RBE) is an emerging new technique that integrates role based access control (RBAC) model with encryption. RBE embeds RBAC policies in encrypted data itself so only users belonging to appropriate roles are able decrypt and the data. However, existing schemes have been focusing on single-organization cloud storage system, where stored can be accessed by of same organization. This paper presents a novel scheme efficient user revocation for multi-organization from multiple...

10.1109/tsc.2022.3194252 article EN IEEE Transactions on Services Computing 2022-08-02

Wireless Local Area Networks (WLANs) are acquiring their hold in all the verticals of life. WLANs have gone through rapid changes with respect to security standards near time. Man-in-the-Middle (MITM) attack is one most catastrophic attacks WLAN. Stealth MITM (SMITM) a new way doing based on Address Resolution Protocol (ARP) poisoning. In this attack, ARP poisoning done directly victim by forging frame response protocol structure and exploiting WPA2 key management. paper we propose Intrusion...

10.1109/pdgc.2012.6449834 article EN 2012-12-01

A Man-In-The-Middle(MITM) attack is one of the most well known on computer networks. Out several variations MITM, Address Resolution Protocol(ARP) Spoofing/Poisoning widely used in packet interception and on-the-fly manipulation. Traditional MITM attacks by ARP Poisoning expose attacker's identity thereby physical location. In this paper, to best our knowledge it for first time that an has been added with stealth capabilities. We propose two new namely Stealth MITM(SMITM) Semi-Stealth...

10.1109/pdgc.2012.6449847 article EN 2012-12-01

In this paper, we propose a supervised learning based model for ocular biometrics. Using Speeded-Up Robust Features (SURF) detecting local features of the eye region, create feature descriptor vector each image. We cluster these vectors, representing an image as normalized histogram membership to various clusters, thereby creating bag-of-visual-words model. conduct multiphase training, first performing fast Multinomial Naïve Bayes learning, and subsequently using pyramid-up topology use top...

10.1109/icip.2016.7532374 article EN 2022 IEEE International Conference on Image Processing (ICIP) 2016-08-17

We propose a geometrical method, applied over eye-specific features, to improve the accuracy of art eye-center localization. Our solution is built upon: (a) checking radially constrained gradient vectors, (b) adding weightage iris specific features and (c) considering bi-directional image gradients eliminate errors due reflection on pupil. system outperforms state methods, when compared collectively across multiple benchmark databases, such as BioID FERET. process lightweight, robust...

10.1109/icip.2016.7532934 article EN 2022 IEEE International Conference on Image Processing (ICIP) 2016-08-17
Coming Soon ...