![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Mohammad Masum
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j1]Megha Gupta, Venkatasai Dheekonda, Mohammad Masum:
Genie: Enhancing information management in the restaurant industry through AI-powered chatbot. Int. J. Inf. Manag. Data Insights 4(2): 100255 (2024) - [c28]Megha Gupta, Shripal Shah, Mohammad Masum, Sai Chandra Kosaraju:
CMI: Cluster-Centric Missing Value Imputation with Feature Consistency. CCWC 2024: 521-526 - [c27]Priyanka Bhyregowda, Mohammad Masum, Lohuwa Mamudu, Mohammed Chowdhurv, Sai Chandra Kosaraiu, Hossain Shahriar:
ActivePCA: A Novel Framework Integrating PCA and Active Machine Learning for Efficient Dimension Reduction. COMPSAC 2024: 320-325 - [c26]Md. Abdur Rahman
, Mst. Shapna Akter, Emily Miller, Bogdan Timofti, Hossain Shahriar, Mohammad Masum, Fan Wu:
Fine-Tuned Variational Quantum Classifiers for Cyber Attacks Detection Based on Parameterized Quantum Circuits and Optimizers. COMPSAC 2024: 1067-1072 - [c25]Sainath Veerla, Anbu Valluvan Devadasan, Mohammad Masum, Mohammed Chowdhury, Hossain Shahriar:
E-SMOTE: Entropy Based Minority Oversampling for Heart Failure and AIDS Clinical Trails Analysis. COMPSAC 2024: 1841-1846 - [i8]Gaurav Shinde, Rohan Mohapatra, Pooja Krishan, Harish Garg, Srikanth Prabhu, Sanchari Das, Mohammad Masum, Saptarshi Sengupta:
The State of Lithium-Ion Battery Health Prognostics in the CPS Era. CoRR abs/2403.19816 (2024) - [i7]Agnik Saha, Mohammad Shahidul Kader, Mohammad Masum:
Unveiling User Engagement Patterns on Stack Exchange Through Network Analysis. CoRR abs/2409.08944 (2024) - 2023
- [i6]Mst. Shapna Akter, Md. Jobair Hossain Faruk, Nafisa Anjum, Mohammad Masum, Hossain Shahriar, Akond Rahman, Fan Wu, Alfredo Cuzzocrea:
Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms. CoRR abs/2306.08060 (2023) - 2022
- [c24]Mohammad Masum, Nafisa Anjum, Md. Jobair Hossain Faruk, Hossain Shahriar, Nazmus Sakib, Maria Valero, Mohammed Karim, Akond Rahman
, Fan Wu, Alfredo Cuzzocrea:
A Novel Machine Learning Based Framework for Bridge Condition Analysis. IEEE Big Data 2022: 5530-5535 - [c23]Mst. Shapna Akter, Md. Jobair Hossain Faruk, Nafisa Anjum, Mohammad Masum, Hossain Shahriar, Nazmus Sakib, Akond Rahman
, Fan Wu, Alfredo Cuzzocrea:
Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms. IEEE Big Data 2022: 5639-5645 - [c22]Mohammad Masum, Md. Jobair Hossain Faruk
, Hossain Shahriar, Kai Qian, Dan Lo, Muhaiminul Islam Adnan:
Ransomware Classification and Detection With Machine Learning Algorithms. CCWC 2022: 316-322 - [c21]Md. Jobair Hossain Faruk
, Mohammad Masum, Hossain Shahriar, Kai Qian, Dan Lo:
Authentic Learning of Machine Learning to Ransomware Detection and Prevention. COMPSAC 2022: 442-443 - [c20]Mohammad Masum, Hossain Shahriar, Nazmus Sakib, Maria Valero, Kai Qian, Dan Lo, Fan Wu, Mohammed Karim, Parth Bhavsar, Jidong Yang:
Scalable Machine Learning Using PySpark. COMPSAC 2022: 454-455 - [c19]Paramita Basak Upama, Md. Jobair Hossain Faruk
, Mohammad Nazim, Mohammad Masum, Hossain Shahriar, Gias Uddin, Shabir Barzanjeh, Sheikh Iqbal Ahamed, Akond Rahman
:
Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing Tools. COMPSAC 2022: 520-529 - [c18]Mohammad Masum, Mohammad Nazim, Md. Jobair Hossain Faruk
, Hossain Shahriar, Maria Valero, Md Abdullah Hafiz Khan, Gias Uddin, Shabir Barzanjeh, Erhan Saglamyurek, Akond Rahman
, Sheikh Iqbal Ahamed:
Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go? COMPSAC 2022: 530-538 - [c17]Mohammad Taneem Bin Nazim, Md. Jobair Hossain Faruk
, Hossain Shahriar, Md Abdullah Khan, Mohammad Masum, Nazmus Sakib, Fan Wu:
Systematic Analysis of Deep Learning Model for Vulnerable Code Detection. COMPSAC 2022: 1768-1773 - [c16]Md. Jobair Hossain Faruk
, Shashank Trivedi, Mohammad Masum, Maria Valero, Hossain Shahriar, Sheikh Iqbal Ahamed:
A Novel IoT-based Framework for Non-Invasive Human Hygiene Monitoring using Machine Learning Techniques. ICHI 2022: 412-421 - [i5]Paramita Basak Upama, Md. Jobair Hossain Faruk, Mohammad Nazim, Mohammad Masum, Hossain Shahriar, Gias Uddin, Shabir Barzanjeh, Sheikh Iqbal Ahamed, Akond Rahman
:
Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing Tools. CoRR abs/2204.01856 (2022) - [i4]Mohammad Masum, Mohammad Nazim, Md. Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Md Abdullah Hafiz Khan, Gias Uddin, Shabir Barzanjeh, Erhan Saglamyurek, Akond Rahman
, Sheikh Iqbal Ahamed:
Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go? CoRR abs/2204.02784 (2022) - [i3]Mohammad Masum, Md. Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan C. Lo, Muhaiminul Islam Adnan:
Ransomware Classification and Detection With Machine Learning Algorithms. CoRR abs/2207.00894 (2022) - [i2]Md. Jobair Hossain Faruk, Shashank Trivedi, Mohammad Masum, Maria Valero, Hossain Shahriar, Sheikh Iqbal Ahamed:
A Novel IoT-based Framework for Non-Invasive Human Hygiene Monitoring using Machine Learning Techniques. CoRR abs/2207.03529 (2022) - [i1]Mohammad Masum, Hossain Shahriar, Hisham Haddad, Md. Jobair Hossain Faruk, Maria Valero, Md Abdullah Khan, Mohammad Ashiqur Rahman
, Muhaiminul I. Adnan, Alfredo Cuzzocrea:
Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection. CoRR abs/2207.09902 (2022) - 2021
- [c15]Mohammad Masum, Hossain Shahriar, Hisham Haddad, Md. Jobair Hossain Faruk
, Maria Valero, Md Abdullah Khan, Mohammad Ashiqur Rahman
, Muhaiminul I. Adnan, Alfredo Cuzzocrea, Fan Wu:
Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection. IEEE BigData 2021: 5413-5419 - [c14]Mohammad Masum, Hossain Shahriar
, Hisham M. Haddad, WenZhan Song
:
A Statistical Summary Analysis of Window-Based Extracted Features for EEG Signal Classification. ICDH 2021: 293-298 - [c13]Md. Jobair Hossain Faruk
, Paul Miner, Ryan Coughlan, Mohammad Masum, Hossain Shahriar, Victor Clincy, Coskun Cetinkaya:
Smart Connected Aircraft: Towards Security, Privacy, and Ethical Hacking. SIN 2021: 1-5 - 2020
- [c12]Zhoulin Li, Hao Zhang, Mohammad Masum
, Hossain Shahriar
, Hisham Haddad:
Cyber Fraud Prediction with Supervised Machine Learning Techniques. ACM Southeast Regional Conference 2020: 176-180 - [c11]Mohammad Masum, Hossain Shahriar
, Hisham M. Haddad, Md. Shafiul Alam:
r-LSTM: Time Series Forecasting for COVID-19 Confirmed Cases with LSTMbased Framework. IEEE BigData 2020: 1374-1379 - [c10]Mohammad Masum, Hossain Shahriar
, Hisham M. Haddad, Sheikh Iqbal Ahamed, Sweta Sneha, Mohammad Ashiqur Rahman
, Alfredo Cuzzocrea:
Actionable Knowledge Extraction Framework for COVID-19. IEEE BigData 2020: 4036-4041 - [c9]Mohammad Masum
, Hossain Shahriar
, Hisham Haddad:
Analysis of Sampling Techniques Towards Epileptic Seizure Detection from Imbalanced Dataset. COMPSAC 2020: 684-692 - [c8]Mohammad Masum
, Hossain Shahriar
, Hisham M. Haddad:
Epileptic Seizure Detection for Imbalanced Datasets Using an Integrated Machine Learning Approach. EMBC 2020: 5416-5419 - [c7]Mohammad Masum, Hossain Shahriar
:
TL-NID: Deep Neural Network with Transfer Learning for Network Intrusion Detection. ICITST 2020: 1-7 - [c6]Vara Vundavalli, Farhat Lamia Barsha
, Mohammad Masum, Hossain Shahriar
, Hisham Haddad:
Malicious URL Detection Using Supervised Machine Learning Techniques. SIN 2020: 21:1-21:6
2010 – 2019
- 2019
- [c5]Nelson Zange Tsaku, Sai Chandra Kosaraju
, Tasmia Aqila, Mohammad Masum
, Dae Hyun Song, Ananda Mohan Mondal
, Hyun Min Koh, Mingon Kang:
Texture-based Deep Learning for Effective Histopathological Cancer Image Classification. BIBM 2019: 973-977 - [c4]Mohammad Masum
, Hossain Shahriar
:
Droid-NNet: Deep Learning Neural Network for Android Malware Detection. IEEE BigData 2019: 5789-5793 - [c3]Sai Chandra Kosaraju
, Mohammad Masum
, Nelson Zange Tsaku, Pritesh Patel, Tanju Bayramoglu, Girish Modgil, Mingon Kang:
DoT-Net: Document Layout Classification Using Texture-Based CNN. ICDAR 2019: 1029-1034 - [c2]Jie Hao
, Mohammad Masum
, Jung Hun Oh
, Mingon Kang
:
Gene- and Pathway-Based Deep Neural Network for Multi-omics Data Integration to Predict Cancer Survival Outcomes. ISBRA 2019: 113-124 - 2018
- [c1]Mohammad Masum, Sai Kosaraju
, Tanju Bayramoglu, Girish Modgil, Mingon Kang:
Automatic knowledge extraction from OCR documents using hierarchical document analysis. RACS 2018: 189-194
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint