| 2025 |
Datta, N., Sultan Mahmud Rana, G. M., Datta, A., Sawkat Ali, M., Chowdhury, A., Islam, M. M., & Hasan, M. (2025). MedBot: An IoT-Based Real-Time Healthcare Monitoring and Telemedicine Solution System. In Lecture Notes in Networks and Systems Vol. 1139 (pp. 287-296). Springer Nature Singapore. DOI |
| 2024 |
Ahsan, A., Islam, M. M., Chowdhury, A., Ali, M. S., Jabid, T., & Islam, M. (2024). Unmasking harmful comments: an approach to text toxicity classification using machine learning in Native Language. In 2024 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies, 3ICT 2024 (pp. 184-189). US: IEEE. DOI |
| 2024 |
Hasan, A., Sarker, S., Bhowmik, A., Ahmed, P., Chowdhury, A., & Islam, M. M. (2024). Advanced particle swarm optimization: an innovative approach towards addressing constrained optimization challenges. In Proceedings of 2024 IEEE International Women in Engineering (WIE) Conference on Electrical and Computer Engineering, WIECON-ECE 2024 (pp. 349-354). US: IEEE. DOI |
| 2024 |
Masum, S., Shafin, S. S., Islam, M. M., & Chowdhury, A. (2024). Securing Electric Vehicle Charging Infrastructure: Attack Identification Using Machine Learning. In 2024 International Conference on Sustainable Technology and Engineering I Coste 2024 (pp. 1-6). IEEE. DOI |
| 2024 |
Avik, S. C., Chowdhury, A., Moriwam., Maruf, M. A. A., Naha, R., & Ahammad, I. (2024). AI-Powered Resilience: Addressing the Mental Health Impact of Mass Layoffs in the Digital Age. In 2nd International Conference on Emerging Trends in Information Technology and Engineering, ic-ETITE 2024 (pp. 1-6). Online: IEEE. DOI Scopus1 |
| 2024 |
Ahmed, P., Yusuf, M. S. U., Sarker, S., Chowdhury, A., Bhowmik, A., & Rahman, F. (2024). A Comparative Study of Different Segmentation and Regression Models for Fetal Head Circumference Measurement. In 2nd International Conference on Emerging Trends in Information Technology and Engineering, ic-ETITE 2024 (pp. 1-6). Online: IEEE. DOI Scopus3 |
| 2024 |
Chowdhury, A., Islam, M. M., Kaisar, S., Khoda, M. E., Naha, R., Khoshkholghi, M. A., & Aiash, M. (2024). Leveraging Oversampling Techniques in Machine Learning Models for Multi-class Malware Detection in Smart Home Applications. In Proceedings - 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom/BigDataSE/CSE/EUC/iSCI 2023 (pp. 2216-2221). Online: IEEE. DOI Scopus1 |
| 2023 |
Chowdhury, A., Nguyen, H., Ashenden, D., & Pogrebna, G. (2023). POSTER: A Teacher-Student with Human Feedback Model for Human-AI Collaboration in Cybersecurity. In Proceedings of the ACM Asia Conference on Computer and Communications Security (pp. 1040-1042). Melbourne, AUSTRALIA: ACM. DOI Scopus5 WoS1 |
| 2023 |
Chowdhury, A., Naha, R., Kaisar, S., Khoshkholghi, M. A., Ali, K., & Galletta, A. (2023). Information Fusion-based Cybersecurity Threat Detection for Intelligent Transportation System. In Proceedings - 23rd IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing Workshops, CCGridW 2023 (pp. 96-103). Online: IEEE. DOI Scopus2 WoS2 |
| 2023 |
Chowdhury, A., & Nguyen, H. (2023). CoZure: Context Free Grammar Co-Pilot Tool for Finding New Lateral Movements in Azure Active Directory. In Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses (RAID, 2023) (pp. 426-439). US: ACM. DOI Scopus1 |
| 2023 |
Chowdhury, A., Kaisar, S., & Naha, R. (2023). Bankruptcy prediction for imbalanced dataset using oversampling and ensemble machine learning methods. In AIP Conference Proceedings Vol. 2968 (pp. 1-10). US: AIP Publishing. DOI Scopus7 |
| 2023 |
Nath, S., Islam, M. M., Chowdhury, A., Rashid, M. R. A., Islam, M., Jabid, T., & Naha, R. (2023). Comprehensive Analysis of Feature Extraction Techniques and Runtime Performance Evaluation for Phishing Detection. In 2023 6th International Conference on Applied Computational Intelligence in Information Systems: Intelligent and Resilient Digital Innovations for Sustainable Living, ACIIS 2023 - Proceedings (pp. 6 pages). Online: IEEE. DOI |
| 2021 |
Shafin, S. S., Prottoy, S. A., Abbas, S., Hakim, S. B., Chowdhury, A., & Rashid, M. M. (2021). Distributed Denial of Service Attack Detection Using Machine Learning and Class Oversampling. In Applied Intelligence and Informatics First International Conference, AII 2021, Nottingham, UK, July 30–31, 2021, Proceedings Vol. 1435 (pp. 247-259). Switzerland: Springer International Publishing. DOI Scopus17 WoS9 |
| 2021 |
Chowdhury, A., Kaisar, S., Rashid, M. M., Shafin, S. S., & Kamruzzaman, J. (2021). Churn Prediction in Telecom Industry using Machine Learning Ensembles with Class Balancing. In 2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering, CSDE 2021 (pp. 6 pages). Piscataway, New Jersey, USA: IEEE. DOI Scopus8 WoS7 |
| 2021 |
Shafin, S. S., Ahmed, M. M., Pranto, M. A., & Chowdhury, A. (2021). Detection of Android Malware using Tree-based Ensemble Stacking Model. In 2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering, CSDE 2021 (pp. 6 pages). Piscataway, New Jersey, USA: IEEE. DOI Scopus14 WoS5 |
| 2019 |
Chowdhury, A., Karmakar, G., & Kamruzzaman, J. (2019). Trusted autonomous vehicle: measuring trust using on-board unit data. In Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019 (pp. 787-792). online: IEEE. DOI Scopus11 WoS8 |
| 2018 |
Rupok, Q. S. S., & Chowdhury, A. (2018). Using e-learning to engage unemployed rural women in aquaculture in Bangladesh to reduce poverty. In ACM International Conference Proceeding Series (pp. 6 pages). New York, NY, USA: Association for Computing Machinery. DOI Scopus1 WoS2 |
| 2017 |
Chowdhury, A. (2017). Cyber attacks in mechatronics systems based on Internet of Things. In Proceedings - 2017 IEEE International Conference on Mechatronics, ICM 2017 (pp. 476-481). US: IEEE. DOI Scopus3 WoS3 |
| 2016 |
Chowdhury, A. (2016). Recent cyber security attacks and their mitigation approaches - An overview. In Applications and Techniques in Information Security: 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings Vol. 651 (pp. 54-65). Cairns, QLD, Australia: Springer Singapore. DOI Scopus38 WoS22 |
| 2016 |
Chowdhury, A. (2016). Priority based and secured traffic management system for emergency vehicle using IoT. In Proceedings - 2016 International Conference on Engineering and MIS, ICEMIS 2016 (pp. 6 pages). Agadir, Morocco: IEEE. DOI Scopus47 WoS14 |