default search action
Md Delwar Hossain
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Olufemi Abiodun Abraham, Hideya Ochiai, Md Delwar Hossain, Yuzo Taenaka, Youki Kadobayashi:
Electricity Theft Detection for Smart Homes: Harnessing the Power of Machine Learning With Real and Synthetic Attacks. IEEE Access 12: 26023-26045 (2024) - [j5]Nahid Ferdous Aurna, Md Delwar Hossain, Latifur Khan, Yuzo Taenaka, Youki Kadobayashi:
FedFusion: Adaptive Model Fusion for Addressing Feature Discrepancies in Federated Credit Card Fraud Detection. IEEE Access 12: 136962-136978 (2024) - [c22]Oyebode Oluwatobi Oyewale, Md Delwar Hossain, Yuzo Taenaka, Youki Kadobayashi:
Optimizing Voice Biometric Verification in Banking with Machine Learning for Speaker Identification. APCC 2024: 377-384 - [c21]Nahid Ferdous Aurna, Md Delwar Hossain, Hideya Ochiai, Yuzo Taenaka, Latifur Khan, Youki Kadobayashi:
Banking Malware Detection: Leveraging Federated Learning with Conditional Model Updates and Client Data Heterogeneity. ICISSP 2024: 309-319 - [c20]Md. Mahbubur Rahman, Md Delwar Hossain, Hideya Ochiai, Youki Kadobayashi, Tanjim Sakib, Syed Taha Yeasin Ramadan:
Vision Based Malware Classification Using Deep Neural Network with Hybrid Data Augmentation. ICISSP 2024: 823-830 - 2023
- [j4]Kabid Hassan Shibly, Md Delwar Hossain, Hiroyuki Inoue, Yuzo Taenaka, Youki Kadobayashi:
Towards Autonomous Driving Model Resistant to Adversarial Attack. Appl. Artif. Intell. 37(1) (2023) - [j3]Hideya Ochiai, Md Delwar Hossain, Pawissakan Chirupphapa, Youki Kadobayashi, Hiroshi Esaki:
Modbus/RS-485 Attack Detection on Communication Signals with Machine Learning. IEEE Commun. Mag. 61(6): 43-49 (2023) - [j2]Md. Bayazid Rahman, Hossen Asiful Mustafa, Md Delwar Hossain:
Towards evaluating robustness of violence detection in videos using cross-domain transferability. J. Inf. Secur. Appl. 77: 103583 (2023) - [c19]Xiaodi Li, Md Delwar Hossain, Hideya Ochiai, Latifur Khan:
2MiCo: A Contrastive Semi-Supervised Method with Double Mixup for Smart Meter Modbus RS-485 Communication Security. BigDataSecurity/HPSC/IDS 2023: 30-39 - [c18]Mohammad Hafiz Hersyah, Md Delwar Hossain, Yuzo Taenaka, Youki Kadobayashi:
A Risk Assessment Study: Encircling Docker Container Assets on IaaS Cloud Computing Topology. CIoT 2023: 225-230 - [c17]Nahid Ferdous Aurna, Md Delwar Hossain, Yuzo Taenaka, Youki Kadobayashi:
Federated Learning-Based Credit Card Fraud Detection: Performance Analysis with Sampling Methods and Deep Learning Algorithms. CSR 2023: 180-186 - [c16]Kabid Hassan Shibly, Md Delwar Hossain, Hiroyuki Inoue, Yuzo Taenaka, Youki Kadobayashi:
A Feature-Aware Semi-Supervised Learning Approach for Automotive Ethernet. CSR 2023: 426-431 - [c15]Sadaf Md. Halim, Md Delwar Hossain, Latifur Khan, Anoop Singhal, Hiroyuki Inoue, Hideya Ochiai, Kevin W. Hamlen, Youki Kadobayashi:
Securing Smart Vehicles Through Federated Learning. FPS (1) 2023: 18-35 - [c14]Md Delwar Hossain, Hideya Ochiai, Latifur Khan, Youki Kadobayashi:
Smart Meter Modbus RS-485 Intrusion Detection by Federated Learning Approach. ICCAE 2023: 559-564 - [c13]Md Sharafat Hossain, Md Delwar Hossain, Md Mahbubur Rahman, Yuzo Taenaka, Md Saiful Islam, Youki Kadobayashi:
A Comparative Performance Analysis of Android Malware Classification Using Supervised and Semi-supervised Deep Learning. SIN 2023: 1-8 - [c12]Olufemi Abiodun Abraham, Hideya Ochiai, Md Delwar Hossain, Yuzo Taenaka, Youki Kadobayashi:
Electricity Theft Detection for Smart Homes with Knowledge-Based Synthetic Attack Data. WFCS 2023: 1-8 - [c11]Hideya Ochiai, Md Delwar Hossain, Youki Kadobayashi, Hiroshi Esaki:
Attacker Localization with Machine Learning in RS-485 Industrial Control Networks. WFCS 2023: 1-8 - 2022
- [c10]Kabid Hassan Shibly, Md Delwar Hossain, Hiroyuki Inoue, Yuzo Taenaka, Youki Kadobayashi:
Personalized Federated Learning for Automotive Intrusion Detection Systems. FNWF 2022: 544-549 - [c9]Olufemi Abiodun Abraham, Hideya Ochiai, Kabid Hassan Shibly, Md Delwar Hossain, Yuzo Taenaka, Youki Kadobayashi:
Unauthorized Power Usage Detection Using Gradient Boosting Classifier in Disaggregated Smart Meter Home Network. FNWF 2022: 688-693 - [c8]Sadaf Md. Halim, Latifur Khan, Kevin W. Hamlen, Bhavani Thuraisingham, Md Delwar Hossain:
A Federated Approach for Learning from Electronic Health Records. BigDataSecurity/HPSC/IDS 2022: 218-223 - [c7]Kabid Hassan Shibly, Md Delwar Hossain, Hiroyuki Inoue, Yuzo Taenaka, Youki Kadobayashi:
Autonomous Driving Model Defense Study on Hijacking Adversarial Attack. ICANN (4) 2022: 546-557 - [c6]Pawissakan Chirupphapa, Md Delwar Hossain, Hiroshi Esaki, Hideya Ochiai:
Unsupervised Anomaly Detection in RS-485 Traffic using Autoencoders with Unobtrusive Measurement. IPCCC 2022: 17-23 - [c5]Md Delwar Hossain, Hideya Ochiai, Tatsuya Arisawa, Youki Kadobayashi:
Smart Meter Modbus RS-485 Spoofing Attack Detection by LSTM Deep Learning Approach. SDS 2022: 47-52 - 2020
- [j1]Md Delwar Hossain, Hiroyuki Inoue, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
LSTM-Based Intrusion Detection System for In-Vehicle Can Bus Communications. IEEE Access 8: 185489-185502 (2020) - [c4]Md Delwar Hossain, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches. ICCCS 2020: 491-497 - [c3]Md Delwar Hossain, Hiroyuki Inoue, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
Long Short-Term Memory-Based Intrusion Detection System for In-Vehicle Controller Area Network Bus. COMPSAC 2020: 10-17 - [c2]Md Delwar Hossain, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
LSTM-based Network Attack Detection: Performance Comparison by Hyper-parameter Values Tuning. CSCloud/EdgeCom 2020: 62-69 - [c1]Md Delwar Hossain, Hiroyuki Inoue, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
An Effective In-Vehicle CAN Bus Intrusion Detection System Using CNN Deep Learning Approach. GLOBECOM 2020: 1-6
2010 – 2019
- 2015
- [b1]Md Delwar Hossain:
Microwave imaging for the detection and localization of breast tissue malignancies using time reversal beamforming. University of Technology Sydney, Australia, 2015
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-18 19:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint