-
1Academic Journal
المؤلفون: Chowdhury, Abdullahi, Jahan, Musfera, Kaisar, Shahriar, Khoda, Mahbub E., Rajin, S M Ataul Karim, Naha, Ranesh
المصدر: Electronics (2079-9292); Dec2024, Vol. 13 Issue 24, p5027, 20p
-
2Book
المؤلفون: Chowdhury, Abdullahi, Islam, Mohammad Manzurul, Kaisar, Shahriar, Khoda, Mahbub E., Naha, Ranesh, Khoshkholghi, Mohammad Ali, Aiash, Mahdi
المساهمون: Hu, Jia, Min, Geyong, Wang, Guojun, Georgalas, Nektarios
المصدر: Proceedings of the 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
مصطلحات موضوعية: Ensemble Models, Multi-class Malware Detection, Oversampling Techniques, Smart Home
Relation: Chowdhury, Abdullahi, Islam, Mohammad Manzurul, Kaisar, Shahriar, Khoda, Mahbub E., Naha, Ranesh, Khoshkholghi, Mohammad Ali, & Aiash, Mahdi (2023) Leveraging Oversampling Techniques in Machine Learning Models for Multi-class Malware Detection in Smart Home Applications. In Hu, Jia, Min, Geyong, Wang, Guojun, & Georgalas, Nektarios (Eds.) Proceedings of the 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). Institute of Electrical and Electronics Engineers Inc., United States of America, pp. 2216-2221.; https://eprints.qut.edu.au/251944/
الاتاحة: https://eprints.qut.edu.au/251944/
-
3Academic Journal
المؤلفون: Chowdhury, Abdullahi, Kaisar, Shahriar, Khoda, Mahbub E., Naha, Ranesh, Khoshkholghi, Mohammad Ali, Aiash, Mahdi
المصدر: Sensors
Relation: Chowdhury, Abdullahi, Kaisar, Shahriar, Khoda, Mahbub E., Naha, Ranesh, Khoshkholghi, Mohammad Ali, & Aiash, Mahdi (2023) IoT-Based Emergency Vehicle Services in Intelligent Transportation System. Sensors, 23(11), Article number: 5324.; https://eprints.qut.edu.au/249067/
الاتاحة: https://eprints.qut.edu.au/249067/
-
4Conference
المساهمون: Federation University Australia
المصدر: 2020 16th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) ; page 1-6
-
5Academic Journal
المصدر: Applied Soft Computing ; volume 112, page 107783 ; ISSN 1568-4946
-
6Academic Journal
المؤلفون: KHODA, Mahbub e, UTSUNOMIYA, Keita, HA-KAWA, Sangkil, KANNO, Shohei, KONO, Yumiko, SAWADA, Satoshi
المصدر: Journal of Radiation Research ; volume 53, issue 3, page 361-367 ; ISSN 0449-3060 1349-9157
مصطلحات موضوعية: Health, Toxicology and Mutagenesis, Radiology, Nuclear Medicine and imaging, Radiation
-
7Conference
المصدر: Khoda, ME, Imam, T, Kamruzzaman, J, Gondal, I, Rahman, A, (2019). Selective adversarial learning for mobile malware. 05-08 August 2019, 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), Rotorua, New Zealand, IEEE, Piscataway, NJ, p. 272-279, http://dx.doi.org/10.1109/TrustCom/BigDataSE.2019.00044
مصطلحات موضوعية: Malware, Mobile, 080109 Pattern Recognition and Data Mining, 150301 Business Information Management (incl. Records, Knowledge and Information Management, and Intelligence)
Relation: Proceedings: 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 05-08 August 2019, Rotorua, New Zealand, 2019, p. 272-279; http://hdl.cqu.edu.au/10018/1312063; cqu:18784; http://dx.doi.org/10.1109/TrustCom/BigDataSE.2019.00044; eISSN:2324-9013
-
8Conference
المصدر: Khoda, ME, Kamruzzaman, J, Gondal, I, Imam, T, Rahman, A, (2019). Mobile malware detection: An analysis of deep learning model. 13-15 February 2019, 20th IEEE International Conference on Industrial Technology (ICIT 2019), Melbourne, Australia, IEEE, Piscataway, NJ, p. 1161-1166, http://dx.doi.org/10.1109/ICIT.2019.8755048
مصطلحات موضوعية: Invasive software, Learning (artificial intelligence), Mobile computing, Neural nets, Pattern classification, Smart phones, Malware developers, Malware detection techniques, Malware researchers, Deep learning model, Hyper-parameters, Classifier performance, Deep neural network, Malware classification, Mobile malware detection, Complex relationships, Arbitrary deep networks, Automatic machine learning tools, 080109 Pattern Recognition and Data Mining, 150301 Business Information Management (incl. Records, Knowledge and Information Management, and Intelligence)
Relation: Proceedings, 2019 IEEE International Conference on Industrial Technology (ICIT), 20th IEEE International Conference on Industrial Technology (ICIT 2019), 13-15 February 2019, Melbourne, Australia, 2019, p. 1161-1166; http://hdl.cqu.edu.au/10018/1312049; cqu:18782; http://dx.doi.org/10.1109/ICIT.2019.8755048
-
9Academic Journal
المصدر: Khoda, ME, Imam, T, Kamruzzaman, J, Gondal, I, Rahman, A, (2020). Robust malware defense in industrial IoT applications using machine learning with selective adversarial samples. IEEE Transactions on Industry Applications, Vol. 56, No. 4, p. 4415-4424 http://dx.doi.org/10.1109/tia.2019.2958530
مصطلحات موضوعية: Malware, Feature extraction, Machine learning, Sensors, Servers, Neural networks, Security, 080108 Neural, Evolutionary and Fuzzy Computation
Relation: IEEE Transactions on Industry Applications, 2020, Vol. 56, No. 4, p. 4415-4424; http://hdl.cqu.edu.au/10018/1334810; cqu:20296; http://dx.doi.org/10.1109/tia.2019.2958530; eISSN:1939-9367
-
10Book
المؤلفون: Khoda, Mahbub E., Kamruzzaman, Joarder, Gondal, Iqbal, Imam, Tasadduq
المصدر: Neural Information Processing ; Lecture Notes in Computer Science ; page 486-498 ; ISSN 0302-9743 1611-3349 ; ISBN 9783030042110 9783030042127
-
11Academic Journal
المؤلفون: Khoda, Mahbub E, Razzaque, Md. Abdur, Almogren, Ahmad, Hassan, Mohammad Mehedi, Alamri, Atif, Alelaiwi, Abdulhameed
المصدر: Mobile Networks and Applications ; volume 21, issue 5, page 777-792 ; ISSN 1383-469X 1572-8153
-
12Periodical
المؤلفون: Khoda, Mahbub e, Utsunomiya, Keita, Ha-Kawa, Sangkil, Kanno, Shohei, Kono, Yumiko, Sawada, Satoshi
المصدر: Journal of Radiation Research; 2012, Vol. 53 Issue: 3 p361-367, 7p