SM Zobaed

ORCID: 0000-0003-4711-2491
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • IoT and Edge/Fog Computing
  • Cloud Computing and Resource Management
  • Spam and Phishing Detection
  • Topic Modeling
  • Natural Language Processing Techniques
  • Big Data and Business Intelligence
  • Data Management and Algorithms
  • Advanced Neural Network Applications
  • Face recognition and analysis
  • Adversarial Robustness in Machine Learning
  • Multimodal Machine Learning Applications
  • Advanced Data Storage Technologies
  • Explainable Artificial Intelligence (XAI)
  • Security and Verification in Computing
  • Parallel Computing and Optimization Techniques
  • Digital Media Forensic Detection
  • Genomics and Chromatin Dynamics
  • Cryptographic Implementations and Security
  • Recommender Systems and Techniques
  • Privacy, Security, and Data Protection
  • Telemedicine and Telehealth Implementation
  • Cloud Data Security Solutions

University of Maryland Eastern Shore
2025

University of Louisiana at Lafayette
2018-2022

Islamic University of Technology
2018

Tulane University
2018

The generation volatility of photovoltaics (PVs) has created several control and operation challenges for grid operators. For a secure reliable day or hour-ahead electricity dispatch, the operators need visibility their synchronous asynchronous generators' capacity. It helps them to manage spinning reserve, inertia frequency response during any contingency events. This study attempts provide machine learning-based PV power forecasting both short long-term. chosen Alice Springs, one...

10.1109/access.2021.3066494 article EN cc-by IEEE Access 2021-01-01

ABSTRACT Background Confidential computing has gained prominence due to the escalating volume of data‐driven applications (e.g., machine learning and big data) acute desire for secure processing sensitive data, particularly across distributed environments, such as edge‐to‐cloud continuum. Objective Provided that works accomplished in this emerging area are scattered various research fields, paper aims at surveying fundamental concepts cutting‐edge software hardware solutions developed...

10.1002/spe.3398 article EN Software Practice and Experience 2025-01-03

In this paper, we provide a comprehensive performance evaluation of popular symmetric and asymmetric key encryption algorithms to selecting better utilization on resource constraint mobile devices. We focus AES, RC4, Blowfish, CAST, 3DES, Twofish as DSA ElGamal an algorithms. The is compared using different parameters such size, data blocks, types, encryption/decryption speed. experiments are performed exploit the effectiveness cryptographic use in real life applications where fast execution...

10.1109/iccitechn.2018.8631957 article EN 2018-12-01

Security and confidentiality of big data stored in the cloud are important concerns for many organizations to adopt services. One common approach address is client-side encryption where encrypted on client machine before being cloud. Having cloud, however, limits ability clustering, which a crucial part analytics applications, such as search systems. To overcome limitation, this paper, we present an named ClustCrypt efficient topic-based clustering unstructured dynamically estimates optimal...

10.1109/hpcc/smartcity/dss.2019.00093 article EN 2019-08-01

Word sense disambiguation (WSD) methods identify the most suitable meaning of a word with respect to usage that in specific context. Neural network-based WSD approaches rely on sense-annotated corpus since they do not utilize lexical resources. In this study, we both context and related gloss information target model semantic relationship between set glosses. We propose SensPick, type stacked bidirectional Long Short Term Memory (LSTM) network perform task. The experimental evaluation...

10.1109/icsc50631.2021.00060 article EN 2021-01-01

Smart IoT-based systems often desire continuous execution of multiple latency-sensitive Deep Learning (DL) applications. The edge servers serve as the cornerstone such IoT based systems, however, their resource limitations hamper (multi-tenant) DL challenge is that, applications function on bulky "neural network (NN) models" that cannot be simultaneously maintained in limited memory space edge. Accordingly, main contribution this research to overcome contention challenge, thereby, meeting...

10.1109/ucc56403.2022.00012 article EN 2022-12-01

Cloud service providers offer a low-cost and convenient solution to host unstructured data. However, cloud services act as third-party solutions do not provide control of the data users. This has raised security privacy concerns for many organizations (users) with sensitive utilize cloud-based solutions. User-side encryption can potentially address these by establishing user-centric granting user. Nonetheless, user-side limits ability process (e.g., search) encrypted on cloud. Accordingly,...

10.1109/hpcc/smartcity/dss.2019.00100 article EN 2019-08-01

With the meteoric growth of technology, individuals and organizations are widely adopting cloud services to mitigate burdens maintenance. Despite its scalability ease use, many users who own sensitive data refrain from fully utilizing due confidentiality concerns. Maintaining for at rest in transit has been explored but remains vulnerable while it is use. This vulnerability further elevated once scope computing spans across edge-to-cloud continuum. Accordingly, goal this dissertation enable...

10.48550/arxiv.2301.00928 preprint EN public-domain arXiv (Cornell University) 2023-01-01

Confidential computing has gained prominence due to the escalating volume of data-driven applications (e.g., machine learning and big data) acute desire for secure processing sensitive data, particularly, across distributed environments, such as edge-to-cloud continuum. Provided that works accomplished in this emerging area are scattered various research fields, paper aims at surveying fundamental concepts, cutting-edge software hardware solutions developed confidential using trusted...

10.48550/arxiv.2307.16447 preprint EN other-oa arXiv (Cornell University) 2023-01-01

Cloud services are widely deployed to store and process big data. Organizations who deal with data, especially large document set, prefer utilizing cloud for storage computational efficiency. However, processing text corpus, an inefficient data is computationally expensive real-time systems. In addition, efficient memory utilization important cluster including corpus. Clustering of the corpus component various retrieval systems such as PubMed <sup...

10.1109/iccitechn.2018.8631951 article EN 2018-12-01

Personalized top-N recommendation algorithms are among the most effective techniques providing customized suggestions in information retrieval applications.Most of current methods construct personalized recommendations based on various loss functions such as pairwise ranking and point-wise recovery loss.In this paper, we propose a method non-negative matrix factorization with divergence function.Our finds latent factors from existing data to improve predictions.We formulate learning problem...

10.24251/hicss.2019.055 article EN cc-by-nc-nd Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences 2019-01-01

Summary Cloud‐based enterprise search services (e.g., Amazon Kendra) are enchanting to big data owners by providing them with convenient solutions over their datasets. However, individuals and businesses dealing confidential criminal reports) reluctant fully embrace such cloud due valid privacy concerns. Solutions based on client‐side encryption have been developed mitigate these Nonetheless, hinder processing, especially, clustering, which is pivotal in applications as real‐time large...

10.1002/cpe.7160 article EN Concurrency and Computation Practice and Experience 2022-07-12

Unravelling transcription factor binding sites, popularly known as motifs, is a prime concern in Bioinformatics. Several evolutionary algorithms like Linear PSO are used for motif discovery. However, searches linearly and appears slow. Here, we have clustering algorithm based on k nearest neighbor finding eligible sequence that can be potential motif. The proposed needs no preprocessing reference PSO. Hamming distance taken criteria generate clusters makes the faster. Primarily, neighbors...

10.1109/ic4me2.2018.8465624 article EN 2018 International Conference on Computer, Communication, Chemical, Material and Electronic Engineering (IC4ME2) 2018-02-01

Security and confidentiality of big data stored in the cloud are important concerns for many organizations to adopt services. One common approach address is client-side encryption where encrypted on client machine before being cloud. Having cloud, however, limits ability clustering, which a crucial part analytics applications, such as search systems. To overcome limitation, this paper, we present an named ClustCrypt efficient topic-based clustering unstructured dynamically estimates optimal...

10.48550/arxiv.1908.04960 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Cloud service providers offer a low-cost and convenient solution to host unstructured data. However, cloud services act as third-party solutions do not provide control of the data users. This has raised security privacy concerns for many organizations (users) with sensitive utilize cloud-based solutions. User-side encryption can potentially address these by establishing user-centric granting user. Nonetheless, user-side limits ability process (e.g., search) encrypted on cloud. Accordingly,...

10.48550/arxiv.1908.03668 preprint EN other-oa arXiv (Cornell University) 2019-01-01

An important issue for concurrent garbage collection in virtual machines (VM) is to identify which collector (GC) use during the process. For instance, Java program execution times differ greatly based on employed GC. It has not been possible optimal GC algorithms a specific before exhaustively profiling all available algorithms. In this paper, we present an adaptive and (ACGC) technique that can predict algorithm without going through We implement machine test it using standard benchmark...

10.24251/hicss.2020.211 article EN cc-by-nc-nd Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences 2020-01-01
Coming Soon ...