Rajkumar Das

ORCID: 0000-0003-3042-0631
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Opinion Dynamics and Social Influence
  • Complex Network Analysis Techniques
  • Social Media and Politics
  • Opportunistic and Delay-Tolerant Networks
  • Caching and Content Delivery
  • Mobile Ad Hoc Networks
  • Internet Traffic Analysis and Secure E-voting
  • Smart Grid Security and Resilience
  • Spam and Phishing Detection
  • Diversity and Impact of Dance
  • IoT and Edge/Fog Computing
  • Autonomous Vehicle Technology and Safety
  • Network Security and Intrusion Detection
  • Vehicular Ad Hoc Networks (VANETs)
  • Physical education and sports games research
  • Misinformation and Its Impacts
  • Sport and Mega-Event Impacts
  • Advanced Malware Detection Techniques
  • Traffic control and management
  • UAV Applications and Optimization
  • Liver Disease Diagnosis and Treatment
  • Security and Verification in Computing
  • Traffic Prediction and Management Techniques
  • Privacy-Preserving Technologies in Data
  • Electricity Theft Detection Techniques

Federation University
2019-2025

Bangladesh University of Engineering and Technology
2011-2018

Monash University
2015-2017

Intelligent Traffic Systems (ITS) are currently evolving in the form of a cooperative ITS or connected vehicles. Both forms use data communications between Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I/I2V) and other on-road entities, accelerating adoption self-driving cars. The development cyber-physical systems containing advanced sensors, sub-systems, smart driving assistance applications over past decade is equipping unmanned aerial road vehicles with autonomous...

10.1109/access.2020.3037705 article EN cc-by IEEE Access 2020-01-01

10.1016/j.jnca.2011.05.005 article EN Journal of Network and Computer Applications 2011-05-25

The increasing adoption of driverless cars already providing a shift to move away from traditional transportation systems automated ones in many industrial and commercial applications. Recent research has justified that vehicles will considerably reduce traffic congestions, accidents, carbon emissions, enhance the accessibility driving wider cross-section people lifestyle choices. However, at present, people's main concerns are about its privacy security. Since protocol layers based security...

10.1109/tits.2021.3059261 article EN IEEE Transactions on Intelligent Transportation Systems 2021-02-24

Fake news has become a significant challenge on online social platforms, increasing uncertainty and unwanted tension in society. The negative impact of fake political processes, public health, harmony underscores the urgency developing more effective detection systems. Existing methods for often focus solely one platform, potentially missing important clues that arise from multiple platforms. Another consideration is domain changes rapidly, making cross-domain analysis difficult than...

10.3390/fi17020061 article EN cc-by Future Internet 2025-02-03

Internet of Things (IoT) applications are increasingly being adopted for innovative and cost-effective services. However, the IoT devices data susceptible to various attacks, including cyberattacks, which emphasizes need pervasive security measure like trust evaluation on fly. There exist several numerical trustworthiness measures based quality information (QoI) correlations. The QoI measurement techniques excessively exploit heuristics, while correlation-based approaches predict temporal...

10.1109/jiot.2019.2957201 article EN IEEE Internet of Things Journal 2019-12-03

Smart grids use Internet of Things (IoT) devices and play a vital role in promoting sustainable environment by balancing energies received from different sources. Like other IoT-based systems, cybersecurity smart meters is an important issue, as data breaches can cause imbalanced load distribution increased electricity cost. Therefore, protection for advance energy systems. A notable recent approach assessing meters' trustworthiness assumes the difference between arithmetic harmonic means...

10.1109/jestie.2022.3144966 article EN IEEE Journal of Emerging and Selected Topics in Industrial Electronics 2022-01-25

The challenging but intriguing problem of modeling opinion formation dynamics in online social networks (OSNs) has attracted many researchers recent years because the inherent complexities present human update process are yet to be clearly understood. Although existing works adopt distance-based homophily principle model neighbors' influences on an agent's opinion, they ignore several other key factors that govern process. Explicitly, we consider two essential aspects real-world were not...

10.1109/tcss.2019.2914264 article EN IEEE Transactions on Computational Social Systems 2019-05-15

Progressive fibrosis and cirrhosis, clinically presenting as end-stage liver disease are common outcomes in alcoholic Liver (ALD) patients. A variety of laboratory tests available to assist the progression diagnosis cirrhosis end stage disease. The aim this study is identify potential novel biomarkers for cirrhosis. evaluated included function indicators including serum ferritin, prothrombin time, albumin, total bilirubin, alanine aminotransferase (ALT), aspartate (AST),...

10.12691/jnh-2-2-3 article EN World Journal of Nutrition and Health 2014-01-23

Trustworthiness in an online environment is essential because individuals and organizations can easily be misled by false malicious information receiving from untrustworthy users. Though existing methods assess users' trustworthiness exploiting Twitter account properties, their efficacy inadequate of Twitter's restriction on profile tweet size, the existence missing or insufficient profiles, ease to create fake accounts relationships pretend as trustworthy. In this paper, we present a...

10.1109/tdsc.2019.2929782 article EN IEEE Transactions on Dependable and Secure Computing 2019-07-18

The increasing attacks on traffic signals worldwide indicate the importance of intrusion detection. existing signal Intrusion Detection Systems (IDSs) that rely inputs from connected vehicles and image analysis techniques can only detect intrusions created by spoofed vehicles. However, these approaches fail to in-road sensors, controllers, signals. In this paper, we proposed an IDS based detecting anomalies associated with flow rate, phase time, vehicle speed, which is a significant...

10.3390/s23104646 article EN cc-by Sensors 2023-05-10

Routing in an Opportunistic Network (OppNet) is a challenging problem due to the absence of complete end-to-end path from source destination. Consequently, Opp-Net routing protocols use store and forward with multiple copies or replicas message network achieve higher delivery ratios. Although flooding many improves chances delivery, it causes contention latency. Quota based deal this by placing upper bound on number per network. However, resource saving solution achieved at cost performance....

10.1109/pacrim.2011.6032884 article EN 2011-08-01

Internet of Things (IoT) is enabling us to introduce cost-effective, innovative and intelligent services in business, industrial, government application domains. Despite these huge potential benefits IoT applications, since the backbone connects numerous heterogeneous devices, vulnerable many different attacks thus has been a honey pot cybercriminals hackers. For this reason, against devices are increasing sharply recent years. To prevent detect attacks, ethical hacking paramount importance....

10.1109/csde56538.2022.10089255 article EN 2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) 2022-12-18

Transmission Control Protocol (TCP) congestion control algorithm works well for the wired networks where most of timeouts and 3-dupacks are result congestion. In wireless networks, random segment loss due to bit errors is a dominant concern, arrival duplicate acknowledgements or even retransmission do not necessarily denote those cases, throttling transmission rate necessary rather detrimental. For this reason, existing TCP algorithms fail perform in networks. paper, we propose new NewReno+...

10.1109/nsyss.2015.7042948 article EN 2015-01-01

Due to limited storage capacity in the DTN nodes, congestion occurs when too many bundles are contending for this scarce resource. As a result, bundle loss increases and delivery ratio of network suffers. In proactive scheme, node can decide whether accept or reject custody new based on its current status. paper, we propose novel control scheme DTN. Our ranks incoming using their priority TTL. When occurs, accepts rejects ranks. We also use concept head line blocking, confidence level,...

10.1109/icost.2011.6085839 article EN 2011-10-01

Opinion formation in social networks has changed a more rigorous way due to the inception of Online Social Networks (OSNs) as platform generating and sharing huge amount contents well easy ubiquitous access varied information sources. Our opinions are not only updated through interactions with our neighbours OSNs, but also shaped by received from sources external native OSNs. Current models consider neighbours' influence opinion evolution, thus lack impact other sources, e.g., news media,...

10.1109/ijcnn.2015.7280844 article EN 2022 International Joint Conference on Neural Networks (IJCNN) 2015-07-01

Mass participation of the members a society in discussions to resolve issues related topic leads forming public opinion. The timeline underlying dynamics goes through several distinguishable phases, and experiences transition from one another. After initiated by concerned individuals, it draws active attention almost everyone, with time progression, people's starts declining as are resolved or lost attraction. existing works literature capture opinion formation process pay model its phase...

10.1109/aina.2017.140 article EN 2017-03-01

The smart grids make the electricity power systems automated and intelligent by using advanced technologies such as IoT sensors meters, communication technologies. This automation processing render more vulnerable to different types of severe cyberattacks like DDoS, man-in-the-middle desynchronization attacks. Making robust against attacks requires use strong access control encryption techniques. existing models in focus on user authentication data encryption, limiting model's ability...

10.1109/aupec59354.2023.10502520 article EN 2023-09-25
Coming Soon ...