Skip to content
Publications
Journals
Manimurugan S, Almutairi S, Aborokbah MM, Narmatha C, Ganesan S, Chilamkurti N , Alzaheb RA, Almoamari H. Two-Stage Classification Model for the Prediction of Heart Disease Using IoMT and Artificial Intelligence. Sensors 22(2). 1 Jan 2022 Desai S, Sabar NR , Alhadad R , Mahmood A , Chilamkurti N . Mitigating consumer privacy breach in smart grid using obfuscation-based generative adversarial network . American Institute of Mathematical Sciences (AIMS). 19(4):3350-3368. 2022 Saifuzzaman M, Ananna TN, Chowdhury MJM , Ferdous MS, Chowdhury F. A systematic literature review on wearable health data publishing under differential privacy . International Journal of Information Security. 1 Jan 2022 Maniriho P , Mahmood AN , Chowdhury MJM. A study on malicious software behaviour analysis and detection techniques: Taxonomy, current trends and challenges . Future Generation Computer Systems. 130:1-18. 1 May 2022Anwar A, Mahmood AN , Tari Z, Kalam A. Measurement-driven blind topology estimation for sparse date injection attack in energy system . Electric Power Systems Research. 202. 1 Jan 2022 Alsaedi A, Tari Z, Mahmud R, Moustafa N, Mahmood AN , Anwar A. USMD: Unsupervised Misbehaviour Detection for Multi-Sensor Data . IEEE Transactions on Dependable and Secure Computing. 1 Jan 2022. Naz S , Phan KT , Chen YPP . A comprehensive review of federated learning for COVID-19 detection . International Journal of Intelligent Systems. 37(3):2371-2392. 1 March 2022.McIntosh T, Kayes ASM , Chen Y-PP, Ng A, Watters P. Ransomware Mitigation in the Modern Era: a Comprehensive Review, Research Challenges and Future Directions . ACM Computing Surveys 54(9): 36 pages ACM. 1 Dec 2022 Kayesh H, Islam MS, Wang J, Kayes ASM , Watters P. A deep learning model for mining and detecting causally related events in tweets . Concurrency Computation Practice and Experience 34(2):1-15 (15 pages) Wiley. 25 Jan 2022.Doan Q-T, Kayes ASM , Rahayu W, Nguyen K. A Framework for IoT Streaming Data Indexing and Query Optimisation . IEEE Sensors Journal13 pages Institute of Electrical and Electronics Engineers (IEEE). 2022 Ahmed I, Kumara I, Reshadat V, Kayes ASM, van den Heuvel WJ, Tamburri DA. Travel time prediction and explanation with spatio-temporal features: A comparative study. Electronics (Switzerland) 11(1). 1 Jan 2022 Halgamuge MN , Guruge D. Fair rewarding mechanism in music industry using smart contracts on public-permissionless blockchain . Multimedia Tools and Applications 81(2):1523-1544. 1 Jan 2022 Chen C, Wang P, Chen H, Wang X, Halgamuge MN , Chen C, Song T. Smart Magnetotactic Bacteria Enable the Inhibition of Neuroblastoma under an Alternating Magnetic Field . ACS Applied Materials and Interfaces 14(12):10 pages. American Chemical Society. 2022. Diro A , Chilamkurti N , Nguyen VD , Heyne W. A comprehensive study of anomaly detection schemes in iot networks using machine learning algorithms . Sensors 21 24. 1 Dec 2021Poongodi M, Sharma A, Hamdi M, Maode M, Chilamkurti N . Smart healthcare in smart cities: wireless patient monitoring system using IoT . Journal of Supercomputing 77 (11):12230-12255. 1 Nov 2021 Park SJ, Kim BG, Chilamkurti N . A robust facial expression recognition algorithm based on multi-rate feature fusion scheme . Sensors 21 (21). 1 Nov 2021 Gunawardena P, Amila O, Sudarshana H, Nawaratne B , Luhach AK, Alahakoon L , Perera AS, Chitraranjan C, Chilamkurti N , De Silva D . Real-time automated video highlight generation with dual-stream hierarchical growing self-organizing maps . Journal of Real-Time Image Processing 18(5):1457-1475 (19 pages) Springer. 1 Oct 2021 Hsu CH, Manogaran G, Srivastava G, Chilamkurti N. Guest Editorial: 6G-Enabled Network in Box (NIB) for Industrial Applications and Services . IEEE Transactions on Industrial Informatics. 17(10):7141-7144 Kansal L, Gaba GS, Chilamkurti N, Kim BG. Efficient and robust image communication techniques for 5g applications in smart cities. Energies14(13). 1 Jul 2021 Manogaran G, Chilamkurti N , Hsu CH. Internet of Things for Electronic Markets . Electronic Markets31(1):13-15. 1 Mar 2021. Hettiarachchi P, Nawaratne R, Alahakoon D, De Silva D, Chilamkurti N . Rain streak removal for single images using conditional generative adversarial networks . Applied Sciences (Switzerland)11(5):1-11. 1 Mar 2021. Park JH, Younas M Arabnia HR, Chilamkurti N . Emerging ICT applications and services—Big data, IoT, and cloud computing . International Journal of Communication Systems. 34. 2021 Baniata M Reda HT Chilamkurti N, Abuadbba A. Energy-Efficient Hybrid Routing Protocol for IoT Communication Systems in 5G and Beyond . Sensors. 21:537-537. 2021 Ibaida A Abuadbba A, Chilamkurti N . Privacy-preserving compression model for efficient IoMT ECG sharing . Computer Communications. 166:1-8. 2021 Halgamuge MN. Optimization framework for Best Approver Selection Method (BASM) and Best Tip Selection Method (BTSM) for IOTA tangle network: Blockchain-enabled next generation Industrial IoT . Computer Networks 199. 9 Nov 2021.Halgamuge MN , Bojovschi A, Fisher PMJ, Le TC, Adeloju S, Murphy S. Internet of Things and autonomous control for vertical cultivation walls towards smart food growing: A review . Urban Forestry and Urban Greening 61. 1 Jun 2021Ekanayake OAS, Halgamuge MN . Lightweight Blockchain Framework using Enhanced Master-Slave Blockchain Paradigm: Fair Rewarding Mechanism using Reward Accuracy Model . Information Processing and Management. 58(3). 1 May 2021 Indrasiri PL, Halgamuge MN , Mohammad A. Robust Ensemble Machine Learning Model for Filtering Phishing URLs: Expandable Random Gradient Stacked Voting Classifier (ERG-SVC) . 1 Jan 2021. IEEE Access. 9:150142-150161. 1 Jan 2021. Reda HT , Ray B, Peidaee P, Anwar A, Mahmood A , Kalam A, Islam N. Vulnerability and impact analysis of the iec 61850 goose protocol in the smart grid . Sensors21(4):1-20N. 2021Abdella J, Tari Z, Anwar A, Mahmood A , Han F. An Architecture and Performance Evaluation of Blockchain-based Peer-to-Peer Energy Trading . IEEE Transactions 0n Smart Grid 10.1109/TSG.2021.3056147 . 2021 Phan KT , Huynh P, Nguyen DN, Ngo DT, Hong Y, Le-Ngoc T. Energy-Efficient Dual-Hop Internet of Things Communications Network with Delay-Outage Constraints . IEEE Transactions on Industrial Informatics17(7):4892-4903. 1 Jul 2021Kalaria R, Kayes ASM, Rahayu W, Pardede E. A Secure Mutual Authentication Approach to Fog Computing Environment . Computers and Security111:13 pages. Elsevier. 1 Dec 2021 McIntosh T, Kayes ASM , Phoebe Chen Y-P, Ng A, Watters P. Dynamic User-Centric Access Control for Detection of Ransomware Attacks. Computers & Security111:22 pages Elsevier BV. 4 Sep 2021 Forhad MSA, Arefin MS, Kayes ASM, Ahmed K, Chowdhury MJM , Kumara. An effective hotel recommendation system through processing heterogeneous data. Electronics (Switzerland). 10(16). 2 Aug 2021. Hammoudeh M, Watters P, Epiphaniou G, Kayes ASM , Pinto P. Security Threats and Countermeasures in Cyber-Physical Systems . Journal of Sensor and Actuator Networks MDPI. 20 Jul 2021. Akhter AFMS, Ahmed M, Shah AFMS, Anwar A, Kayes ASM et al . A Blockchain-Based Authentication Protocol for Cooperative Vehicular Ad Hoc Network . Sensors . 21:1273-1273. 2021 Mahbub S , Pardede E , Kayes ASM . Detection of Harassment type of Cyberbullying: A Dictionary of Approach Words and Its Impact . Security and Communication Networks2021:1-12 (12 pages) Wiley-Hindawi. 4 June 2021.Rashida M, Islam K, Kayes ASM , Hammoudeh M, Arefin MS, Habib MA. Towards Developing a Framework to Analyze the Qualities of the University Websites . Computers10(5):1-16 (16 pages) MDPI. 27 Apr 2021 Iffath F, Kayes ASM , Rahman MT, Ferdows J, Arefin MS, Hossain MS. Online judging platform utilizing dynamic plagiarism detection facilities . Computers 10(4):1-15 (15 pages) MDP. 8 Apr 2021 Abir SMAA, Anwar A, Choi J, Kayes ASM . IoT-enabled smart energy grid: applications and challenges . IEEE Access 9:50961-50981 (21 pages) IEEE. 19 Mar 2021 Akhter AFMS, Ahmed M, Shah AFMS, Anwar A, Kayes ASM , Zengin A, A Blockchain-Based Authentication Protocol for Cooperative Vehicular Ad Hoc Network . Sensors21(4):1-21 (21 pages) MDPI AG. 11 Feb 2021. McIntosh T, Watters P, Kayes ASM , Ng A , Chen P . Enforcing situation-aware access control to build malware-resilient file systems . Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 115:568-582. 2021 Ferdous MS, Chowdhury MJM , Hoque MA. A survey of consensus algorithms in public blockchain systems for crypto-currencies . Journal of Network and Computer Applications182. 15 May 2021 Paul TK, Chowdhury MJM , Lau MF. A new disjunctive literal insertion fault detection strategy in boolean specifications . Journal of Software: Evolution and Process 33(5). 1 May 2021 Chowdhury MJM , Usman M, Ferdous MS, Chowdhury N, Harun AI, Jannat US, Biswas K. A Cross-Layer Trust-based Consensus Protocol for Peer-to-Peer Energy Trading Using Fuzzy Logic . IEEE Internet of Things Journal. 1 Jan 2021Munivel KV, Samraj T, Kandasamy V, Chilamkurti N . Improving the lifetime of an out-patient implanted medical device using a novel flower pollination-based optimization algorithm in wban systems . Mathematics. 8:1-16. 2020Chilamkurti NK , Singh KK, Balamurugan B, Smieee NC, Rawal Kshatriya BS. Machine Learning approaches for convergence of IoT and Blockchain . Open Computer Science. 10:459-460. 2020 Sharma A, SarishmaTomar R, Chilamkurti N, Kim BG. Blockchain based smart contracts for internet of medical things in e-healthcare . Electronics (Switzerland). 9:1-14. 2020 Reda HT, Mahmood A , Diro A, Chilamkurti N, Kallam S. Firefly-inspired stochastic resonance for spectrum sensing in CR-based IoT communications . Neural Computing and Applications. 32:16011-16023. 2020 Chilamkurti N, Paul A, Kumar A. Call for Special Issue Papers: Soft Computing Models for Big Data and Internet of Things . Big Data. 8:251-252. 2020Chilamkurti N, Paul A, Kumar A. Call for Special Issue Papers: Soft Computing Models for Big Data and Internet of Things . Big Data. 8:169-170. 2020Nawaratne B , Adikari A , Alahakoon L , De Silva D ,Chilamkurti N . Recurrent self-structuring machine learning for video processing using multi-stream hierarchical growing self-organizing maps . Multimedia Systems. 79:16299-16317. 2020Manogaran G, Chilamkurti N, Hsu C-H. Editorial Note: Machine Learning for Visual Analysis of Multimedia Data . Multimedia Systems. 79:5003-5003. 2020 Manogaran G, Chilamkurti N, Hsu C-H. Guest Editorial: Advanced Machine Learning Algorithms and Signal Processing . Circuits, Systems and Signal Processing. 39:515-521. 2020 Manogaran G, Baskar S, Shakeel PM, Chilamkurti N, Kumar R. Analytics in real time surveillance video using two-bit transform accelerative regressive frame check . Multimedia systems. 79:16155-16172. 2020 Poongodi M, Vijayakumar V, Chilamkurti N . Bitcoin price prediction using ARIMA model . International Journal of Internet Technology and Secured Transactions. 10:396-406. 2020 Pradeepa S, Manjula KR, Vimal S, Khan MS, Chilamkurti N et al . DRFS: detecting risk factor of stroke disease from social media using machine learning techniques . Neural Processing Letters. 2020 Manimurugan S, Al-Mutairi S, Aborokbah MM, Chilamkurti N, Ganesan S et al . Effective attack detection in internet of medical things smart environment using a deep belief neural network . IEEE Access. 8:77396-77404. 2020 Sankar S, Srinivasan P, Luhach AK, Somula R, Chilamkurti N . Energy-aware grid-based data aggregation scheme in routing protocol for agricultural internet of things . Sustainable Computing: Informatics and Systems. 28:1-8. 2020 Diro A , Reda H , Chilamkurti N, Mahmood A , Zaman N et al . Lightweight authenticated-encryption scheme for Internet of Things based on publish-subscribe communication . IEEE Access. 8:60539-60551. 2020Gunawardena P, Amila O, Sudarshana H, Nawaratne B , Luhach, AK, Chilamkurti N et al . Real-time automated video highlight generation with dual-stream hierarchical growing self-organizing maps . Journal of Real-Time Image Processing. 2020 Zhang H, Zhang W, Lv Z, Sangaiah AK, Huang T, Chilamkurti N et al. MALDC: a depth detection method for malware based on behavior chains . World Wide Web. 23:991-1010. 2020 Bandaragoda T, Adikari A, Nawaratne R, Nallaperuma D, Luhach AK, Chilamkurti N et al. Artificial intelligence based commuter behaviour profiling framework using Internet of things for real-time decision-making . Neural Computing and Applications. 2020. Sangaiah AK, Hosseinabadi AAR, Shareh MB, Bozorgi Rad Y, Zolfagharian A, Chilamkurti N et al. IoT Resource Allocation and Optimization Based on Heuristic Algorithm. Sensors. 20. 2020 Huynh P , Phan TK , Liu B , Ross R . Throughput analysis of buffer-aided decode-and-forward wireless relaying with RF energy harvesting . Sensors . 20. 2020.Chowdhury MJM, Ferdous MS, Biswas K, Chowdhury N, Muthukkumarasamy V. COVID-19 Contact Tracing: Challenges and Future Directions . IEEE Access. 8:225703-225729. 2020Chowdhury M, Ferdous MS, Biswas K, Chowdhury N, Muthukkumarasamy V. A survey on blockchain-based platforms for IoT use-cases . Knowledge Engineering Review. 35:1-22. 2020Ferdous MS, Chowdhury MJM , Biswas K, Chowdhury N, Muthukkumarasamy V. Immutable autobiography of smart cars leveraging blockchain technology . Knowledge Engineering Review . 35. 2020 Abir SMAA, Islam SN, Anwar A, Mahmood A , Oo AMT. Building resilience against COVID-19 pandemic using artificial intelligence, machine learning, and IoT: a survey of recent progress . IoT. 1:506-528. 2020 Alsaedi A, Moustafa N, Tari Z, Mahmood A, Anwar A. TON_IoT telemetry dataset: a new generation dataset of IoT and IIoT for data-driven Intrusion Detection Systems . IEEE Access. 8:165130-165150. 2020 Suaboot J, Fahad A, Tari Z, Grundy J, Mahmood AN et al . A Taxonomy of Supervised Learning for IDSs in SCADA Environments . ACM Computing Surveys. 53:1-37. 2020 Suaboot J , Tari Z, Mahmood A , Zomaya AYLi W. Sub-curve HMM: A malware detection approach based on partial analysis of API call sequences . Computers and Security . 92. 2020Ahsan MSA, Arefin MS, Kayes ASM, Hammoudeh M, Aldabbas O. A framework for identifying influential people by analyzing social media data . Applied Sciences (Switzerland). 10:1-16. 2020 Rahman MR, Arefin MS, Hossain MB, Habib MA, Kayes ASM . Towards a framework for acquisition and analysis of speeches to identify suspicious contents through machine learning . Complexity. 2020:1-14. 2020 Kayes ASM, Islam MS, Watters PA , Ng A , Kayesh H. Automated Measurement of Attitudes Towards Social Distancing Using Social Media: A COVID-19 Case Study . First Monday . 11. 2020Anwar T, Liao K Angelic S Sellis T Kayes ASM et al . Inferring location types with geo-social-temporal pattern mining . IEEE Access . 8:1-12. 2020 Sharif O, Hoque MM, Kayes ASM, Nowrozy R , Sarker IH. Detecting suspicious texts using machine learning techniques . Applied Sciences (Switzerland) . 10:1-23. 2020 Iqbal H. Sarker and A. S. M. Kayes : (2020 ) ABC-RuleMiner: User Behavioral Rule-based Machine Learning Method for Context-Aware Intelligent Services , Journal of Network and Computer Applications, Elsevier (Q1 journal, Impact Factor: 5.570, CiteScore: 13.8, H index: 89) Khalid Hasan, Khandakar Ahmed, Kamanashis Biswas, Md. Saiful Islam, A. S. M. Kayes , S.M. Riazul Islam: (2020 ) Control Plane Optimisation for an SDN-based WBAN Framework to Support Healthcare Applications , Sensors, MDPI (Q1 journal, Impact Factor: 3.275, H index: 132) A. S. M. Kayes , Wenny Rahayu, Paul Watters, Mamoun Alazab, Tharam Dillon, Elizabeth Chang: (2020) Achieving security scalability and flexibility using Fog-Based Context-Aware Access Control . , Future Generation Computer Systems Journal, Elsevier 107, 307-323 (Q1 journal, Impact Factor: 5.768, CiteScore: 6.30)A. S. M. Kayes , Rudri Kalaria, Iqbal H. Sarker, Md. Saiful Islam, Paul Watters, Alex Ng, Mohammad Hammoudeh, Shahriar Badsha, Indika Kumara: (2020 ) A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues , Sensors, MDPI, 20(9), 01-34 (Q1 journal, Impact Factor: 3.031, H index: 132)Doan Quang Tu, A. S. M. Kayes , Wenny Rahayu, Kinh Nguyen: (2020 IoT Streaming Data Integration from Multiple Sources , Computing Journal, Springer XXX (XX), XXX–XXX (Q2 journal, rank: A, Impact factor: 2.063, H index: 54, accepted) Mohammad Hammoudeh, Gregory Epiphaniou, Sana Belguith, Devrim Unal, Bamidele Adebisi, Thar Baker, A. S. M. Kayes and Paul Watters: (2020 ) A Service-Oriented Approach for Sensing in the Internet of Things: Intelligent Transportation Systems and Privacy Use Cases , IEEE Sensors (Q1 journal, H index: 100, Impact Factor: 3.076, accepted) Mohammad Hammoudeh, John Pimlott, Sana Belguith, Gregory Epiphaniou, Thar Baker, A. S. M. Kayes , Bamidele Adebisi, Ahcene Bounceur: (2020) Network Traffic Analysis for Threats Detection in the Internet of Things ., IEEE Internet of Things (Q1 journal, H index: 47, Impact Factor: 9.515, accepted) Humayun Kayesh, Md. Saiful Islam, Junhu Wang, A. S. M. Kayes and Paul Watters: (2020) A Deep Learning Model for Mining and Detecting Causally Related Events in Tweets , Concurrency and Computation: Practice and Experience, Wiley (Q2 journal, H index: 60, Impact Factor: 1.167, accepted) Iqbal H. Sarker, A. S. M. Kayes , Shahriar Badsha, Hamed Alqahtani, Paul Watters, and Alex Ng: (2020) Cybersecurity data science: an overview from machine learning perspective , Journal of Big Data, Publisher - Springer (Q1 journal, H index: 23, SJR: 1.12, accepted) Doan Quang Tu, A. S. M. Kayes , Wenny Rahayu, Kinh Nguyen: (2020 ) Integration of IoT Streaming Data with Efficient Indexing and Storage Optimization , IEEE Access (Q1 journal, Impact Factor: 4.098, published) Nguyen AN , Le V, Nguyen-Trong N, Radfar M , Ebrahimi A, Phan K et al . Dual-Polarized Slot Antenna for Full-Duplex Systems with High Isolation . IEEE Transactions on Antennas and Propagation . 2020IVeeraraghavan P . The g-convexity and the g-centroids of composite graphs . Mathematics. 8:1-13. 2020Veeraraghavan P, Hanna D , Pardede E . NAT++: an efficient micro-nat architecture for solving ip-spoofing attacks in a corporate network . Electronics (Switzerland). 9:1-21. 2020qbal H. Sarker, Alan Colman, Jun Han, A. S. M. Kayes , and Paul Watters: (2019 ) CalBehav: Calendar-based User Behavior Modeling using Time-Series Smartphone Data , The Computer Journal, Oxford University Press, (rank: A*, Q1 journal, published) Iqbal H. Sarker, A. S. M. Kayes , and Paul Watters: (2019 Effectiveness Analysis of Machine Learning Classification Models for Predicting Personalized Context-Aware Smartphone Usage , Journal of Big Data, Publisher - Springer (Q1 journal, H index: 23, SJR: 1.12, published) (July 2019) Mohammad Jabed Morshed Chowdhury, Md Sadek Ferdous, Kamanashis Biswas, Niaz Chowdhury, A. S. M. Kayes , Mamoun Alazab, Paul Watters: (2019 ) A Comparative Analysis of Distributed Ledger Technology Platforms , IEEE Access (Q1 journal, Impact Factor: 4.098, published) Iqbal H. Sarker, A. S. M. Kayes , Hasan Furhad , Mohammad Mainul Islam, and Md Shohidul Islam: (2019 ) E-MIIM: an ensemble-learning-based context-aware mobile telephony model for intelligent interruption management , AI and Society, Publisher - Springer (WoS journal, published online) Paul Watters, Patrick Scolyer-Gray, A. S. M. Kayes , and Mohammad Jabed Morshed Chowdhury: (2019 ) This would work perfectly if it weren’t for all the humans: Two factor authentication in late modern societies , First Monday, Publisher - First Monday (Q1 journal) (July 2019) Syed Mahbub, Eric Pardede, A. S. M. Kayes , Wenny Rahayu: (2019 ) Controlling astroturfing on the internet: A survey on detection techniques and research challenges ., Inderscience 15 (2), 139-158 (WoS journal, published) (June 2019) A. S. M. Kayes , Jun Han, Wenny Rahayu, Tharam Dillon, MS Islam, Alan Colman: (2019 A Policy Model and Framework for Context-Aware Access Control to Information Resources , The Computer Journal, Oxford University Press 62 (5), 670-705 (rank: A*, published) (May 2019) A. S. M. Kayes , Wenny Rahayu, Tharam Dillon, Elizabeth Chang, Jun Han: (2019 ) Context-Aware Access Control with Imprecise Context Characterization for Cloud-Based Data Resources , Future Generation Computer Systems Journal, Elsevier 93, 237-255 (Q1 journal, Impact Factor: 5.768, CiteScore: 6.30) (April 2019) A. S. M. Kayes , Wenny Rahayu, Tharam Dillon: (2019 ) Critical situation management utilizing IoT-based data resources through dynamic contextual role modeling and activation , Computing Journal, Springer 101 (7), 7comparat43–772 (Q2 journal, rank: A, Impact factor: 2.063, H index: 54) (July 2019)Veeraraghavan P . Convexities, Centroids in Graphs and their Application in Mobile Ad hoc Networks . Journal of Combinatorics, Information and System Sciences. 44:57-70. 2019Veeraraghavan P, Hanna D , Pardede E . Building Scalable and Secure Multicast Delivery Infrastructure in a Local Area Network . Electronics (Switzerland). 8:1-17. 2019Hossain SM, Prakash V, Mamidi P, Chattopadhyay S, Singh AK. Pyrene-appended bipyridine hydrazone ligand as a turn-on sensor for Cu2+ and its bioimaging application . RSC Advances . 10:3646-3658. 2020 Atta-ur-Rahman Dash S, Luhach AK, Chilamkurti N , Baek S et al. A Neuro-fuzzy approach for user behaviour classification and prediction . Journal of Cloud Computing. 8:1-15. 2019 Kukkar A, Mohana R, Nayyar A, Kim J, Kang B-G, Chilamkurti N et al. A Novel Deep-Learning-Based Bug Severity Classification Technique Using Convolutional Neural Networks and Random Forest with Boosting . Sensors. 19:1-22. 2019 Sharma A, Rathee G, Kumar R, Saini H, Varadarajan V, Chilamkurti N et al. A Secure, Energy- and SLA-Efficient (SESE) E-Healthcare Framework for Quickest Data Transmission Using Cyber-Physical System . Sensors. 19. 2019 Jayaratne M, Jayaratne DS, De Silva D, Alahakoon LDD, Devitt BM, Chilamkurti N et al. A data integration platform for patient-centered e-healthcare and clinical decision suppor t. Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 92:996-1008. 2019 Abdel-Basset M, Gunasekaran M, Mohamed M, Chilamkurti N . A framework for risk assessment, management and evaluation: Economic tool for quantifying risks in supply chain . Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 90:489-502. 2019 Desai SV, Alhadad R, Chilamkurti N, Mahmood A . A survey of privacy preserving schemes in IoE enabled Smart Grid Advanced Metering Infrastructure . Cluster Computing. 22:43-69. 2019 Jegadeesan S, Azees M, Kumar PM, Manogaran G, Chilamkurti N et al. An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications . Sustainable Cities and Society. 49. 2019 Subramaniyaswamy V, Manogaran G, Logesh R, Vijayakumar V, Chilamkurti N et al. An ontology-driven personalized food recommendation in IoT-based healthcare system . Journal of Supercomputing. 75:3184-3216. 2019 Duneja A, Puyalnithi T, Vankadara MV, Chilamkurti N . Analysis of inter-concept dependencies in disease diagnostic cognitive maps using recurrent neural network and genetic algorithms in time series clinical data for targeted treatment . Journal of Ambient Intelligence and Humanized Computing. 10:3915-3923. 2019 Manogaran G, Baskar S, Shakeel PM, Chilamkurti N , Kumar R. Analytics in real time surveillance video using two-bit transform accelerative regressive frame check . Multimedia Systems. 2019 Manogaran G, Shakeel PM, Priyan VR, Chilamkurti N , Srivastava A. Ant colony optimization-induced route optimization for enhancing driving range of electric vehicles . International Journal of Communication Systems. 2019 Manickam A, Devarasan E, Manogaran G, Chilamkurti N , Vijayan V et al. Bio-medical and latent fingerprint enhancement and matching using advanced scalable soft computing models . Journal of Ambient Intelligence and Humanized Computing. 10:3983-3995. 2019 Moreira MWL, Rodrigues JJPC, Carvalho FHC, Chilamkurti N , Al-Muhtadi J et al. Biomedical data analytics in mobile-health environments for high-risk pregnancy outcome prediction . Journal of Ambient Intelligence and Humanized Computing. 10:4121-4134. 2019 Papazis K, Chilamkurti N . Detecting indicators of deception in emulated monitoring systems . Service Oriented Computing and Applications. 13:17-29. 2019 Khadam UIqbal MM, Azam MA, Khalid S, Rho S, Chilamkurti N et al. Digital Watermarking Technique for Text Document Protection Using Data Mining Analysis . IEEE Access. 7:64955-64965. 2019 Imran, Muhammad; Jabbar, Sohail; Chilamkurti, Naveen ; Rodrigues, Joel JPC; Enabling technologies for Social Internet of Things 2019 North-Holland Sennan S, Balasubramaniyam S, Luhach AK, Ramasubbareddy S, Chilamkurti N et al. Energy and Delay Aware Data Aggregation in Routing Protocol for Internet of Things . Sensors. 19:1-17. 2019Reda HT, Mahmood A , Diro A, Chilamkurti N , Kallam S. Firefly-inspired stochastic resonance for spectrum sensing in CR-based IoT communications . Neural Computing and Applications. 2019 Desai SV, Alhadad R, Mahmood A, Chilamkurti N , Rho S. Multi-state energy classifier to evaluate the performance of the NILM algorithm . Sensors. 19. 2019 Lakshmanaprabu SK, Shankar K, Ilayaraja M, Nasir AW, Vijayakumar V, Chilamkurti N et al. Random forest for big data classification in the internet of things using optimal features . International Journal of Machine Learning and Cybernetics. 10:2609-2618. 2019 Arunkumar S, Subramaniyaswamy V, Vijayakumar V, Chilamkurti N , Logesh R. SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images . Measurement. 139:426-437. 2019 Gao Q, Guo S, Liu X, Manogaran G, Chilamkurti N et al. Simulation analysis of supply chain risk management system based on IoT information platform . Enterprise Information Systems. 2019 Appathurai A, Manogaran G, Chilamkurti N . Trusted FPGA-based transport traffic inject, impersonate (I²) attacks beaconing in the Internet of Vehicles . IET Networks. 8:169-178. 2019 Manogaran G, Shakeel PM, Fouad H, Nam Y, Baskar S et al. Chilamkurti N . Wearable IoT Smart-Log Patch: An Edge Computing-Based Bayesian Deep Learning Network System for Multi Access Physical Monitoring System . Sensors. 19. 2019. Choi, Ken; Chilamkurti, Naveen ; Choi, Thomas Wook; Editorial Note: Multimedia-Aware IoT System Design 2019 Veeraraghavan P, Hanna D, Pardede E . Building Scalable and Secure Multicast Delivery Infrastructure in a Local Area Network . Electronics (Switzerland) . 8:1-17. 2019Chowdhury MJM, Ferdous MDS, Biswas K, Chowdhury N, Kayes ASMK et al . A comparative analysis of distributed ledger technology platforms . IEEE Access . 7:167930-167943. 2019Veeraraghavan P , Hanna D. An Intelligent Message Authentication Scheme for Emergency and Safety Related Messages in a Vehicular Network . Scientiae Mathematicae Japonicae. 31:267-278. 2018.Raviteja P, Phan K , THong Y. Embedded Pilot-Aided Channel Estimation for OTFS in Delay–Doppler Channels . IEEE Transactions on Vehicular Technology . 68:4906-4917. 2019 Sultana, Nasrin; Chilamkurti, Naveen ; Peng, Wei; Alhadad, Rabei ; Survey on SDN based network intrusion detection system using machine learning approaches Peer-to-Peer Networking and Applications 12 2 493-501 2019 Springer US Phan K , THong Y, Viterbo E. Adaptive Resource Allocation for Secure Two-Hop Relaying Communication . IEEE Transactions on Wireless Communications. 17:8457-8472. 2018Raviteja P, Phan K , THong Y, Viterbo E. Interference cancellation and iterative detection for orthogonal time frequency space modulation . IEEE Transactions on Wireless Communications . 17:6501-6515. 2018 Chowdhury, Jabed . A Survey on Blockchain-based Platforms for IoT Use-cases, The Knowledge Engineering Review.Diro, Abebe Abeshu; Chilamkurti, Naveen ; Distributed attack detection scheme using deep learning approach for Internet of Things . Future Generation Computer Systems 82 761-768 2018 North-Holland Shen, Bo; Chilamkurti, Naveen ; Wang, Ru; Zhou, Xingshe; Wang, Shiwei; Ji, Wen; Deadline-aware rate allocation for IoT services in data center network . Journal of Parallel and Distributed Computing 118 296-306 2018 Academic Press Diro, Abebe Abeshu; Reda, Haftu Tasew; Chilamkurti, Naveen; Differential flow space allocation scheme in SDN based fog computing for IoT applications . Journal of Ambient Intelligence and Humanized Computing 01-Nov 2018 Springer Berlin Heidelberg Rawal, Bharat S; Vijayakumar, V; Manogaran, Gunasekaran; Varatharajan, R; Chilamkurti, Naveen ; Secure disintegration protocol for privacy preserving cloud storage . Wireless Personal Communications Jan-17 2018 Springer US Abeshu, Abebe; Chilamkurti, Naveen ; Deep learning: the frontier for distributed attack detection in fog-to-things computing . IEEE Communications Magazine 56 2 169-175 2018 IEEE Wang, Wei; Si, Miaomiao; Pang, Yu; Ran, Peng; Wang, Huiqian; Jiang, Xiaoming; Liu, Yu; Wu, Jun; Wu, Wei; Chilamkurti, Naveen ; An encryption algorithm based on combined chaos in body area networks . Computers & Electrical Engineering 65 282-291 2018 Pergamon Kim, Bryan; Chilamkurti, Naveen ; Dogra, Debi Prosad; Psannis, Kostas; Editorial Note: Emerging Multimedia Technology for Multimedia-centric IoT 2018 "SPRINGER VAN GODEWIJCKSTRAAT 30 3311 GZ DORDRECHT NETHERLANDS" Chisanga, David; Keerthikumar, Shivakumar; Mathivanan, Suresh; Chilamkurti, Naveen ; Integration of heterogeneous ‘omics’ data using semi-supervised network labelling to identify essential genes in colorectal cancer Computers & Electrical Engineering 67 267-277 2018 Pergamon Nawaratne, Rashmika; Alahakoon, Damminda; De Silva, Daswin; Chhetri, Prem; Chilamkurti, Naveen ; Self-evolving intelligent algorithms for facilitating data interoperability in IoT environments . Future Generation Computer Systems 86 421-432 2018 North-Holland Diro, Abebe Abeshu; Chilamkurti, Naveen ; Nam, Yunyoung; Analysis of lightweight encryption scheme for fog-to-things communication IEEE Access 6 26820-26830 2018 IEEE Bedingfield, Sue; Alahakoon, Damminda; Genegedera, Hiran; Chilamkurti, Naveen ; Multi-granular electricity consumer load profiling for smart homes using a scalable big data algorithm . Sustainable cities and society 40 611-624 2018 Elsevier Manogaran, Gunasekaran; Lopez, Daphne; Chilamkurti, Naveen ; In-Mapper combiner based MapReduce algorithm for processing of big climate data . Future Generation Computer Systems 86 433-445 2018 North-Holland Kumari, Raj; Kaushal, Sakshi; Chilamkurti, Naveen ; Energy conscious multi-site computation offloading for mobile cloud computing . Soft Computing 22 20 6751-6764 2018 Springer Berlin Heidelberg Manogaran, Gunasekaran; Chilamkurti, Naveen ; Hsu, Ching-Hsien; Special issue on recent advancements in machine learning algorithms for internet of things . Design Automation for Embedded Systems 22 3 199-200 2018 Springer US Abdel-Basset, Mohamed; Manogaran, Gunasekaran; Mohamed, Mai; Chilamkurti, Naveen ; Three-way decisions based on neutrosophic sets and AHP-QFD framework for supplier selection problem . Future Generation Computer Systems 89 19-30 2018 North-Holland Rathore, M Mazhar; Paul, Anand; Ahmad, Awais; Chilamkurti, Naveen ; Hong, Won-Hwa; Seo, HyunCheol; Real-time secure communication for Smart City in high-speed Big Data environment. Future Generation Computer Systems 83 638-652 2018 North-Holland Kumar, Priyan Malarvizhi; Devi, Usha; Manogaran, Gunasekaran; Sundarasekar, Revathi; Chilamkurti, Naveen ; Varatharajan, Ramachandran; Ant colony optimization algorithm with Internet of Vehicles for intelligent traffic control system . Computer Networks 144 154-162 2018 Elsevier Jaeik, Cho; Chilamkurti, Naveen ; Wang, SJ; Editorial of special section on enabling technologies for industrial and smart sensor internet of things systems The Journal of Supercomputing 74 9 4171-4172 2018 Springer US Diro, Abebe; Chilamkurti, Naveen ; Leveraging LSTM networks for attack detection in fog-to-things communications IEEE Communications Magazine 56 9 124-130 2018 IEEE Manogaran, Gunasekaran; Chilamkurti, Naveen ; Hsu, Ching-Hsien; Emerging trends issues and challenges in Internet of Medical Things and wireless networks , Personal and Ubiquitous Computing 22 05-Jun 879-882 2018 Springer London Sundarasekar, Revathi; Thanjaivadivel, M; Manogaran, Gunasekaran; Kumar, Priyan Malarvizhi; Varatharajan, R; Chilamkurti, Naveen ; Hsu, Ching-Hsien; Internet of things with maximal overlap discrete wavelet transform for remote health monitoring of abnormal ECG signals Journal of medical systems 42 11 228 2018 Springer US Manogaran, Gunasekaran; Chilamkurti, Naveen ; Hsu, Ching-Hsien; Editorial Note: Machine Learning for Visual Analysis of Multimedia Data 2018 Manogaran, Gunasekaran; Chilamkurti, Naveen; Hsu, Ching-Hsien; Emerging intelligent algorithms: challenges and applications . 2018 Springer London F. Maqsood, A. Khan, I. Ahmed, M. Tahir, M. Aleem, M. Ahmed, A. Ahmed, R. Alhadad . A Fault Tolerant Fragile Watermarking-Based False Data Injection Attacks Detection Scheme in Smart Grids to Design Automation for Embedded Systems. Design Automation for Embedded Systems, Springer 2018 under second review.
Conferences
Ulfath RE, Sarker IH, Chowdhury MJM , Hammoudeh M. Detecting Smishing Attacks Using Feature Extraction and Classification Techniques. International Conference on Big Data, IoT, and Machine Learning BIM 2021. 95:677-689. 2022 Md. Atik S, Faisal Haque B, A. K. M. Fakhrul H, Dayamoy Datta S, Md Sadek F, Chowdhury MJM , Md Zakirul Alam B. Modelling Attacks in Blockchain Systems using Petri Nets . 9 Feb 2021International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). 2021 Bhuiyan MSI, Razzak A, Md Sadek F, Chowdhury MJM , Mohammad A. H, Sasu T BONIK: A Blockchain Empowered Chatbot for Financial Transactions. 2021International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). 2021 Rashid ANMB, Ahmed M, Kayes ASM . A Supervised Rare Anomaly Detection Technique via Cooperative Co-Evolution-Based Feature Selection using Benchmark UNSW_NB15 Dataset . EAI WiCON 202114th EAI International Wireless Internet Conference. 1 May 2021 Ahmed M, Kayes ASM . An Investigation of Vulnerabilities in Internet of Health Things. EAI WiCON 202114th EAI International Wireless Internet Conference. 1 May 2021 Alam T, Taylor J, Taylor J, Badsha S, Shahid ARB, Kayes ASM. Leveraging Blockchain for Spoof-Resilient Robot Networks. 13th International Conference on Intelligent Robotics and Applications (ICIRA 2020) Lecture Notes in Computer Science. 2021 Chowdhury MJM, Kayes ASMK , Watters PA , Scolyer-Gray PD, Ng AC et al . Patient Controlled, Privacy Preserving IoT Healthcare Data Sharing Framework . Proceedings of the 53rd Hawaii International Conference on System Mohammed F ,Kayes ASM , Pardede E , Rahayu JW . A Framework for Measuring IoT Data Quality Based on Freshness Metrics . The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2020). 2021A. S. M. Kayes , M Hammoudeh, S Badsha, P Watters, A Ng, F Mohammed, M Islam: (2020 ) Responsibility attribution against data breaches . , IEEE ICIoT 2020 (accepted)Humayun Kayesh, Md. Saiful Islam, Junhu Wang, Shikha Anirban, A. S. M. Kayes and Paul Watters: (2020 ) Answering Binary Causal Questions: A Transfer Learning Based Approach , IEEE IJCNN 2020 (rank: A, accepted) S Kudva, R Norderhaug, S Badsha, S Sengupta, A. S. M. Kayes : (2020 ) PEBERS: Practical Ethereum Blockchain based Efficient Ride Hailing Service , IEEE ICIoT 2020 (accepted) Mohammad Jabed Morshed Chowdhury , A. S. M. Kayes , Paul Watters, Wenny Rahayu, Tharam Dillon, Patrick Scolyer-Gray, and Alex Ng: (2020 ) Patient Controlled, Privacy Preserving IoT Healthcare Data Sharing Framework ., HICSS 2019 (rank: A, accepted)Chowdhury MJM, Colman A, Kabir MA, Han J, Sarda P. Continuous authorization in subject-driven data sharing using wearable devices . Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE) . 327-333. 2019Chowdhury MJM, Ferdous MS, Biswas K, Chowdhury N, Kayes ASMK et al . Trust Modeling for Blockchain-Based Wearable Data Market . Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom . 411-417. 2019Ayman Alkhalifah, Alex, Ng, Mohammad Jabed Morshed Chowdhur y, A. S. M. Kayes , Paul Watters: (2019 ) An Empirical Analysis of Blockchain Cybersecurity Incidents, IEEE CSDE 2019 (accepted) Doan Quang Tu, A. S. M. Kayes , Wenny Rahayu, Kinh Nguyen: (2019 ) ISDI: A New Window-Based Framework for Integrating IoT Streaming Data from Multiple Sources ., AINA 2019: 498-511 (rank: B, published) (Received Best Paper Award ) P. Raviteja, Khoa T. Phan , Yi Hong, Emanuele Viterbo, Orthogonal Time Frequency Space (OTFS) Modulation Based Radar System , Radar Conference 2019. A. S. M. Kayes , J. Wenny Rahayu, Tharam S. Dillon, Elizabeth Chang: (2018 ) Accessing Data from Multiple Sources Through Context-Aware Access Control , IEEE TrustCom 2018: 551-559 (rank: A, published)A. S. M. Kayes , J. Wenny Rahayu, Tharam S. Dillon, Syed Mahbub, Eric Pardede, Elizabeth Chang: (2018 ) Dynamic Transitions of States for Context-Sensitive Access Control Decision , WISE 2018: 127-142 (rank: A, published)A. S. M. Kayes , J. Wenny Rahayu, Tharam S. Dillon: (2018 ) An ontology-based approach to context-aware access control for software services , AINA 2018: 601-608 (rank: B, published)Raviteja P, Phan K , THong Y, Viterbo E. Embedded Delay-Doppler Channel Estimation for Orthogonal Time Frequency Space Modulation . IEEE Vehicular Technology Conference. 2018 Phan K , Thong Y, Viterbo E. Adaptive resource allocation for secure two-hop communication . IEEE Wireless Communications and Networking Conference, WCNC. 2018Raviteja P, Phan K , T Jin Q, Hong Y, Viterbo E. Low-complexity iterative detection for orthogonal time frequency space modulation . IEEE Wireless Communications and Networking Conference, WCNC. 2018.
Chapter
Piconi J, Maruatona O, Ng A, Kayes ASM , Watters P. A. Machine Learning-Based Cyber Defence System for an Intelligent City . Developing and Monitoring Smart Environments for Intelligent Cities1-10 (10 pages) IGI Global. 2021 Diro A , Mahmood A, Chilamkurti N . Collaborative intrusion detection schemes in fog-to-things computing . Advances in Information Security 83:93-119. 2021 Islam T, Kumar DKT, Rahman SSMM, Jabiullah MI, Alazab M, Phan KT et al . Ensuring data integrity: towards a Blockchain-based platform to share the datasets 2020 Jared Piconi, Omaru Maruatona, Alex Ng, A. S. M. Kayes , Paul Watters: (2020 ) Machine Learning based Cyber Defence System for an Intelligent City , IGI Global Book: Developing and Monitoring Smart Environments for Intelligent Cities, USA Raza Nowrozy, A. S. M. Kayes , Paul Watters, Mamoun Alazab, Alex Ng, M. J. M. Chowdhury, Omaru Maruatona: (2020 ) A Blockchain-Based Secure Data Sharing Framework for Healthcare , Book: Blockchain for Cybersecurity and Privacy: Architectures, Challenges and Applications, CRC Press, Taylor & Francis, USA Ayman Alkhalifah, Alex Ng, A. S. M. Kayes , M. J. M. Chowdhury, Mamoun Alazab, Paul Watters: (2020 ) A taxonomy of blockchain threats and vulnerabilities , Book: Blockchain for Cybersecurity and Privacy: Architectures, Challenges and Applications, CRC Press, Taylor & Francis, USA Takia Islam, DKT Kumar, SSMM Rahman, MI Jabiullah, Mamoun Alazab, A. S. M. Kayes : (2020 ) Ensuring data integrity: towards a Blockchain-based platform to share the datasets , Book: Blockchain for Cybersecurity and Privacy: Architectures, Challenges and Applications, CRC Press, Taylor & Francis, USA Ferdous MS, Biswas K, Chowdhury MJM , Chowdhury N, Muthukkumarasamy V. Integrated platforms for Blockchain-enablement . Advances in Computers . 41-72. 2019 Alhalafi NH , Veeraraghavan P . Privacy and Security Challenges and Solutions in IOT: A review . IOP Conference Series: Earth and Environmental Science . 1-5. 2019Islam, M., Mahmood, A ., Watters, P.A. & Alazab, M. (2019). Forensic detection of child exploitation material using deep learning . In M. Alazab and M. Tang (Eds) Deep Learning Applications for Cyber Security. Springer. Islam, M., Watters, P.A., Mahmood , A. & Alazab, M. (2019. Toward detection of child exploitation material: A Forensic approach . In M. Alazab and M. Tang (Eds) Deep Learning Applications for Cyber Security. Springer.