default search action
Abdul Rahman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2011
- [b1]Abdul Rahman:
Optimal power management for the UTS plug-in hybrid electric vehicle. University of Technology Sydney, Australia, 2011
Journal Articles
- 2024
- [j8]Eranga Bandara, Xueping Liang, Peter Foytik, Sachin Shetty, Ravi Mukkamala, Abdul Rahman, Nalin Ranasinghe, Kasun De Zoysa, Wee Keong Ng:
Lightweight, geo-scalable deterministic blockchain design for 5G networks sliced applications with hierarchical CFT/BFT consensus groups, IPFS and novel hardware design. Internet Things 25: 101077 (2024) - [j7]Bimal Ghimire, Danda B. Rawat, Abdul Rahman:
Efficient Information Dissemination in Blockchain-Enabled Federated Learning for IoV. IEEE Internet Things J. 11(9): 15310-15319 (2024) - 2023
- [j6]Ghada Abdelmoumin, Danda B. Rawat, Abdul Rahman:
Studying Imbalanced Learning for Anomaly-Based Intelligent IDS for Mission-Critical Internet of Things. J. Cybersecur. Priv. 3(4): 706-743 (2023) - 2022
- [j5]Tao He, Abdul Rahman, Ataur Rahman Farooqi:
Construction of an Online Education Platform Based on SOA Architecture and Multimedia Technology. Int. J. e Collab. 18(2): 1-16 (2022) - [j4]Ghada Abdelmoumin, Danda B. Rawat, Abdul Rahman:
On the Performance of Machine Learning Models for Anomaly-Based Intelligent Intrusion Detection Systems for the Internet of Things. IEEE Internet Things J. 9(6): 4280-4290 (2022) - 2021
- [j3]Muhammad Bukhsh, Saima Abdullah, Abdul Rahman, Mamoona Naveed Asghar, Humaira Arshad, Abdulatif Alabdulatif:
An Energy-Aware, Highly Available, and Fault-Tolerant Method for Reliable IoT Systems. IEEE Access 9: 145363-145381 (2021) - [j2]Ruiling Yu, Mohammad Asif Ikbal, Abdul Rahman:
Improvement of substation Monitoring aimed to improve its efficiency with the help of Big Data Analysis*. J. Intell. Syst. 30(1): 499-510 (2021) - 2015
- [j1]Abdul Rahman, M. M. Sufyan Beg:
Face sketch recognition using sketching with words. Int. J. Mach. Learn. Cybern. 6(4): 597-605 (2015)
Conference and Workshop Papers
- 2024
- [c35]Eranga Bandara, Peter Foytik, Sachin Shetty, Ravi Mukkamala, Abdul Rahman, Xueping Liang, Wee Keong Ng, Kasun De Zoysa:
SliceGPT - OpenAI GPT-3.5 LLM, Blockchain and Non-Fungible Token Enabled Intelligent 5G/6G Network Slice Broker and Marketplace. CCNC 2024: 439-445 - [c34]Marc Vucovich, Devin Quinn, Kevin Choi, Christopher Redino, Abdul Rahman, Edward Bowen:
FedBayes: A Zero-Trust Federated Learning Aggregation to Defend Against Adversarial Attacks. CCWC 2024: 28-35 - [c33]Benny Benyamin Nasution, Abdul Rahman, M. Rikwan E. S. Manik, Liwat Tarigan, Rahmat Widia Sembiring, Indra Siregar, Rina Walmiaty Mardi, Marliana Sari, Rismawati:
Citizen Movement Control System (CMCS) for Handling the Evacuation Process of an Earthquake. COINS 2024: 1-6 - [c32]Cheng Wang, Christopher Redino, Ryan Clark, Abdul Rahman, Sal Aguinaga, Sathvik Murli, Dhruv Nandakumar, Roland Rao, Lanxiao Huang, Daniel Radke, Edward Bowen:
Leveraging Reinforcement Learning in Red Teaming for Advanced Ransomware Attack Simulations. CSR 2024: 262-269 - [c31]Dhruv Nandakumar, Devin Quinn, Elijah Soba, Eunyoung Kim, Christopher Redino, Chris Chan, Kevin Choi, Abdul Rahman, Edward Bowen:
Foundational Models for Malware Embeddings Using Spatio-Temporal Parallel Convolutional Networks. ICNC 2024: 168-174 - [c30]Sathvik Murli, Dhruv Nandakumar, Prabhat Kumar Kushwaha, Cheng Wang, Christopher Redino, Abdul Rahman, Shalini Israni, Tarun Singh, Edward Bowen:
Cross-Temporal Detection of Novel Ransomware Campaigns: A Multi-Modal Alert Approach. ICNC 2024: 423-429 - [c29]Soumya Banerjee, Sandip Roy, Sayyed Farid Ahamed, Devin Quinn, Marc Vucovich, Dhruv Nandakumar, Kevin Choi, Abdul Rahman, Edward Bowen, Sachin Shetty:
MIA-BAD: An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated Learning. ICNC 2024: 635-640 - [c28]Eranga Bandara, Sachin Shetty, Abdul Rahman, Ravi Mukkamala, Peter Foytik, Xueping Liang:
RMF-GPT - OpenAI GPT-3.5 LLM, Blockchain, NFT, Model Cards and OpenScap Enabled Intelligent RMF Automation System. ICNC 2024: 653-658 - [c27]Eranga Bandara, Peter Foytik, Sachin Shetty, Ravi Mukkamala, Abdul Rahman, Xueping Liang, Ng Wee Keong, Kasun De Zoysa:
WedaGPT - Generative-AI (with Custom-Trained Meta's Llama2 LLM), Blockchain, Self Sovereign Identity, NFT and Model Card Enabled Indigenous Medicine Platform. ISCC 2024: 1-6 - 2023
- [c26]Nadini Sahabandu, Eranga Bandara, Peter Foytik, Sachin Shetty, Ravi Mukkamala, Abdul Rahman, Xueping Liang:
GreenThread - Blockchain, Non-Fungible Token(NFT), Model Cards, Self-Sovereign Identity and IPFS Enabled Sustainable Circular Fashion Platform. ANNSIM 2023: 357-243 - [c25]Riddam Rishu, Akshay Kakkar, Cheng Wang, Abdul Rahman, Christopher Redino, Dhruv Nandakumar, Tyler Cody, Ryan Clark, Daniel Radke, Edward Bowen:
Enhancing Exfiltration Path Analysis Using Reinforcement Learning. CAMLIS 2023: 77-90 - [c24]Dhruv Nandakumar, Sathvik Murli, Ankur Khosla, Kevin Choi, Abdul Rahman, Drew Walsh, Scott Riede, Eric Dull, Edward Bowen:
A Novel Approach to User Agent String Parsing for Vulnerability Analysis Using Multi-Headed Attention. ICMLC 2023: 105-113 - [c23]Eranga Bandara, Sachin Shetty, Peter Foytik, Abdul Rahman, Ravi Mukkamala, Xueping Liang, Nadini Sahabandu:
Blockchain, NFT, Federated Learning and Model Cards enabled UAV Surveillance System for 5G/6G Network Sliced Environment. ISNCC 2023: 1-8 - [c22]Eranga Bandara, Peter Foytik, Sachin Shetty, Ravi Mukkamala, Abdul Rahman, Xueping Liang, Wee Keong Ng, D. N. Ranasinghe, Kasun De Zoysa:
Proof-of-Pedal - Pedal-Powered Byzantine Green Consensus for Blockchain. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2023: 810-814 - [c21]Marc Vucovich, Amogh Kamat Tarcar, Penjo Rebelo, Abdul Rahman, Dhruv Nandakumar, Christopher Redino, Kevin Choi, Robert Schiller, Sanmitra Bhattacharya, Balaji Veeramani, Alex West, Edward Bowen:
Anomaly Detection via Federated Learning. ITNAC 2023: 259-266 - 2022
- [c20]Eranga Bandara, Sachin Shetty, Abdul Rahman, Ravi Mukkamala, Juan Zhao, Xueping Liang:
Bassa-ML - A Blockchain and Model Card Integrated Federated Learning Provenance Platform. CCNC 2022: 753-759 - [c19]Rohit Gangupantulu, Tyler Cody, Paul Park, Abdul Rahman, Logan Eisenbeiser, Dan Radke, Ryan Clark, Christopher Redino:
Using Cyber Terrain in Reinforcement Learning for Penetration Testing. COINS 2022: 1-8 - [c18]Tyler Cody, Abdul Rahman, Christopher Redino, Lanxiao Huang, Ryan Clark, Akshay Kakkar, Deepak Kushwaha, Paul Park, Peter A. Beling, Edward Bowen:
Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs. DSC 2022: 1-8 - [c17]Aroosa Yaqoob, Abdul Basit, Abdul Rahman, Abdul Hannan, Kaleem Ullah:
Detection of COVID-19 in High Resolution Computed Tomography Using Vision Transformer. FIT 2022: 82-87 - [c16]Wan-Yi Mao, Mehmet Yardimci, Minh Nguyen, Dan Sobien, Laura J. Freeman, Feras A. Batarseh, Abdul Rahman, Vinita Fordham:
Trustworthy AI Solutions for Cyberbiosecurity Challenges in Water Supply Systems. FLAIRS 2022 - [c15]Dhruv Nandakumar, Robert Schiller, Christopher Redino, Kevin Choi, Abdul Rahman, Edward Bowen, Marc Vucovich, Joe Nehila, Matthew Weeks, Aaron Shaha:
Zero Day Threat Detection Using Metric Learning Autoencoders. ICMLA 2022: 1318-1325 - [c14]Lanxiao Huang, Tyler Cody, Christopher Redino, Abdul Rahman, Akshay Kakkar, Deepak Kushwaha, Cheng Wang, Ryan Clark, Daniel Radke, Peter A. Beling, Edward Bowen:
Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain. ICMLA 2022: 1350-1357 - [c13]Eranga Bandara, Sachin Shetty, Ravi Mukkamala, Abdul Rahman, Peter Foytik, Xueping Liang, Wee Keong Ng:
Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace. MILCOM 2022: 559-564 - [c12]Eranga Bandara, Xueping Liang, Sachin Shetty, Ravi Mukkamala, Abdul Rahman, Wee Keong Ng:
Skunk - A Blockchain and Zero Trust Security Enabled Federated Learning Platform for 5G/6G Network Slicing. SECON 2022: 109-117 - [c11]Eranga Bandara, Sachin Shetty, Abdul Rahman, Ravi Mukkamala, Xueping Liang:
Moose: A Scalable Blockchain Architecture for 5G Enabled IoT with Sharding and Network Slicing. WCNC 2022: 1194-1199 - 2021
- [c10]Bimal Ghimire, Danda B. Rawat, Abdul Rahman:
Data-Driven Quickest Change Detection for Securing Federated Learning for Internet-of-Vehicles. GLOBECOM 2021: 1-6 - [c9]Eranga Bandara, Sachin Shetty, Abdul Rahman, Ravi Mukkamala:
Let'sTrace - Blockchain, Federated Learning and TUF/In-ToTo Enabled Cyber Supply Chain Provenance Platform. MILCOM 2021: 470-476 - [c8]Rohit Gangupantulu, Tyler Cody, Abdul Rahman, Christopher Redino, Ryan Clark, Paul Park:
Crown Jewels Analysis using Reinforcement Learning with Attack Graphs. SSCI 2021: 1-6 - 2018
- [c7]Abdul Rahman, Nadeem Javaid, Muhammad Asad Zaheer, Maryam Bibi, Zoha Fatima, Qurat-ul Ain:
Globally Optimization Energy Grid Management System. NBiS 2018: 194-208 - [c6]Mubashar Mehmood, Nadeem Javaid, Junaid Akram, Sadam Hussain Abbasi, Abdul Rahman, Fahad Saeed:
Efficient Resource Distribution in Cloud and Fog Computing. NBiS 2018: 209-221 - 2015
- [c5]Abdul Rahman, Tanvir Ahmad, M. M. Sufyan Beg:
Ranking of Fuzzy Similar Faces Using Relevance Matrix and Aggregation Operators. SCSE 2015: 84-91 - 2013
- [c4]Abdul Rahman, M. M. Sufyan Beg:
Estimation of f-validity of geometrical objects with OWA operator weights. FUZZ-IEEE 2013 - [c3]Abdul Rahman, M. M. Sufyan Beg:
Investigation of OWA Operator Weights for Estimating Fuzzy Validity of Geometric Shapes. WCSC 2013: 15-24 - 2011
- [c2]Christopher McCubbin, Bryan Perozzi, Andrew Levine, Abdul Rahman:
Finding the 'Needle': Locating Interesting Nodes Using the K-shortest Paths Algorithm in MapReduce. ICDM Workshops 2011: 180-187 - [c1]Saqib R. Chaudhry, Hamed S. Al-Raweshidy, Abdul Rahman:
Transmitting UWB-OFDM Using 16-QAM over Hybrid Flat Fading Channels. VTC Spring 2011: 1-5
Informal and Other Publications
- 2024
- [i20]Cheng Wang, Akshay Kakkar, Christopher Redino, Abdul Rahman, Ajinsyam S, Ryan Clark, Daniel Radke, Tyler Cody, Lanxiao Huang, Edward Bowen:
Discovering Command and Control Channels Using Reinforcement Learning. CoRR abs/2401.07154 (2024) - [i19]Cheng Wang, Christopher Redino, Abdul Rahman, Ryan Clark, Daniel Radke, Tyler Cody, Dhruv Nandakumar, Edward Bowen:
Discovering Command and Control (C2) Channels on Tor and Public Networks Using Reinforcement Learning. CoRR abs/2402.09200 (2024) - [i18]Ajay Kulkarni, Yingjie Wang, Munisamy Gopinath, Dan Sobien, Abdul Rahman, Feras A. Batarseh:
A Review of Cybersecurity Incidents in the Food and Agriculture Sector. CoRR abs/2403.08036 (2024) - [i17]Cheng Wang, Christopher Redino, Ryan Clark, Abdul Rahman, Sal Aguinaga, Sathvik Murli, Dhruv Nandakumar, Roland Rao, Lanxiao Huang, Daniel Radke, Edward Bowen:
Leveraging Reinforcement Learning in Red Teaming for Advanced Ransomware Attack Simulations. CoRR abs/2406.17576 (2024) - [i16]Sayyed Farid Ahamed, Soumya Banerjee, Sandip Roy, Devin Quinn, Marc Vucovich, Kevin Choi, Abdul Rahman, Alison Hu, Edward Bowen, Sachin Shetty:
Accuracy-Privacy Trade-off in the Mitigation of Membership Inference Attack in Federated Learning. CoRR abs/2407.19119 (2024) - 2023
- [i15]Dhruv Nandakumar, Devin Quinn, Elijah Soba, Eunyoung Kim, Christopher Redino, Chris Chan, Kevin Choi, Abdul Rahman, Edward Bowen:
Foundational Models for Malware Embeddings Using Spatio-Temporal Parallel Convolutional Networks. CoRR abs/2305.15488 (2023) - [i14]Dhruv Nandakumar, Sathvik Murli, Ankur Khosla, Kevin Choi, Abdul Rahman, Drew Walsh, Scott Riede, Eric Dull, Edward Bowen:
A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention. CoRR abs/2306.03733 (2023) - [i13]Sathvik Murli, Dhruv Nandakumar, Prabhat Kumar Kushwaha, Cheng Wang, Christopher Redino, Abdul Rahman, Shalini Israni, Tarun Singh, Edward Bowen:
Cross-temporal Detection of Novel Ransomware Campaigns: A Multi-Modal Alert Approach. CoRR abs/2309.00700 (2023) - [i12]Riddam Rishu, Akshay Kakkar, Cheng Wang, Abdul Rahman, Christopher Redino, Dhruv Nandakumar, Tyler Cody, Ryan Clark, Daniel Radke, Edward Bowen:
Enhancing Exfiltration Path Analysis Using Reinforcement Learning. CoRR abs/2310.03667 (2023) - [i11]Soumya Banerjee, Sandip Roy, Sayyed Farid Ahamed, Devin Quinn, Marc Vucovich, Dhruv Nandakumar, Kevin Choi, Abdul Rahman, Edward Bowen, Sachin Shetty:
MIA-BAD: An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated Learning. CoRR abs/2312.00051 (2023) - [i10]Marc Vucovich, Devin Quinn, Kevin Choi, Christopher Redino, Abdul Rahman, Edward Bowen:
FedBayes: A Zero-Trust Federated Learning Aggregation to Defend Against Adversarial Attacks. CoRR abs/2312.04587 (2023) - 2022
- [i9]Tyler Cody, Abdul Rahman, Christopher Redino, Lanxiao Huang, Ryan Clark, Akshay Kakkar, Deepak Kushwaha, Paul Park, Peter A. Beling, Edward Bowen:
Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs. CoRR abs/2201.12416 (2022) - [i8]Christopher Redino, Dhruv Nandakumar, Robert Schiller, Kevin Choi, Abdul Rahman, Edward Bowen, Matthew Weeks, Aaron Shaha, Joe Nehila:
Zero Day Threat Detection Using Graph and Flow Based Security Telemetry. CoRR abs/2205.02298 (2022) - [i7]Deepak Kushwaha, Dhruv Nandakumar, Akshay Kakkar, Sanvi Gupta, Kevin Choi, Christopher Redino, Abdul Rahman, Sabthagiri Saravanan Chandramohan, Edward Bowen, Matthew Weeks, Aaron Shaha, Joe Nehila:
Lateral Movement Detection Using User Behavioral Analysis. CoRR abs/2208.13524 (2022) - [i6]Marc Vucovich, Amogh Kamat Tarcar, Penjo Rebelo, Narendra Gade, Ruchi Porwal, Abdul Rahman, Christopher Redino, Kevin Choi, Dhruv Nandakumar, Robert Schiller, Edward Bowen, Alex West, Sanmitra Bhattacharya, Balaji Veeramani:
Anomaly Detection via Federated Learning. CoRR abs/2210.06614 (2022) - [i5]Dhruv Nandakumar, Robert Schiller, Christopher Redino, Kevin Choi, Abdul Rahman, Edward Bowen, Marc Vucovich, Joe Nehila, Matthew Weeks, Aaron Shaha:
Zero Day Threat Detection Using Metric Learning Autoencoders. CoRR abs/2211.00441 (2022) - [i4]Lanxiao Huang, Tyler Cody, Christopher Redino, Abdul Rahman, Akshay Kakkar, Deepak Kushwaha, Cheng Wang, Ryan Clark, Daniel Radke, Peter A. Beling, Edward Bowen:
Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain. CoRR abs/2211.03027 (2022) - 2021
- [i3]Rohit Gangupantulu, Tyler Cody, Paul Park, Abdul Rahman, Logan Eisenbeiser, Dan Radke, Ryan Clark:
Using Cyber Terrain in Reinforcement Learning for Penetration Testing. CoRR abs/2108.07124 (2021) - [i2]Rohit Gangupantulu, Tyler Cody, Abdul Rahman, Christopher Redino, Ryan Clark, Paul Park:
Crown Jewels Analysis using Reinforcement Learning with Attack Graphs. CoRR abs/2108.09358 (2021) - [i1]Andrei Svetovidov, Abdul Rahman, Feras A. Batarseh:
AI Assurance using Causal Inference: Application to Public Policy. CoRR abs/2112.00591 (2021)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint