


default search action
Abdur Rahman Bin Shahid
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j13]Syed Mhamudul Hasan
, Ahmed Imteaj
, Abdur R. Shahid
:
Quantifying Robustness and Sustainability Trade-Off in Federated Adversarial Learning for Cyber-Physical Systems. IEEE Trans. Sustain. Comput. 11(1): 15-28 (2026)- 2025
[j12]Abdur Rahman Bin Shahid
, Ahmed Imteaj
:
Sticks and stones may break my bones, but words will never hurt me! - Navigating the cybersecurity risks of generative AI. AI Soc. 40(3): 1529-1530 (2025)
[j11]Syed Mhamudul Hasan
, Abdur Rahman Bin Shahid
, Ahmed Imteaj
:
Evaluating Sustainability and Social Costs of Adversarial Training in Machine Learning. IEEE Consumer Electron. Mag. 14(3): 27-34 (2025)
[j10]Syed Mhamudul Hasan
, Taminul Islam
, Munshi Saifuzzaman
, Khaled R. Ahmed
, Chun-Hsi Huang
, Abdur R. Shahid:
Carbon Emission Quantification of Machine Learning: A Review. IEEE Trans. Sustain. Comput. 10(6): 1085-1102 (2025)
[c25]Awal Ahmed Fime
, Md. Zarif Hossain, Saika Zaman, Abdur Rahman Bin Shahid, Ahmed Imteaj:
Benchmarking Large-Language Models for Resource-Efficient Medical AI for Edge Deployment. AAAI Spring Symposia 2025: 137-142
[c24]Awal Ahmed Fime, Md. Zarif Hossain, Saika Zaman, Abdur Rahman Bin Shahid, Ahmed Imteaj:
Towards Trustworthy Autonomous Vehicles with Vision-Language Models Under Targeted and Untargeted Adversarial Attacks. CVPR Workshops 2025: 619-628
[i13]Mohd. Farhan Israk Soumik, W. K. Malithi Mithsara, Abdur Rahman Bin Shahid, Ahmed Imteaj:
Exploring Audio Editing Features as User-Centric Privacy Defenses Against Emotion Inference Attacks. CoRR abs/2501.18727 (2025)
[i12]Syed Mhamudul Hasan, Hussein Zangoti, Iraklis Anagnostopoulos, Abdur Rahman Bin Shahid:
Sponge Attacks on Sensing AI: Energy-Latency Vulnerabilities and Defense via Model Pruning. CoRR abs/2505.06454 (2025)
[i11]Malithi Wanniarachchi Kankanamge, Nick McKenna, Santiago Carmona, Syed Mhamudul Hasan, Abdur Rahman Bin Shahid, Ahmed Imteaj:
Digital Forensic Investigation of the ChatGPT Windows Application. CoRR abs/2505.23938 (2025)
[i10]Mohd. Farhan Israk Soumik, Syed Mhamudul Hasan, Abdur Rahman Bin Shahid:
Evaluating Apple Intelligence's Writing Tools for Privacy Against Large Language Model-Based Inference Attacks: Insights from Early Datasets. CoRR abs/2506.03870 (2025)
[i9]W. K. Malithi Mithsara, Ning Yang, Ahmed Imteaj, Hussein Zangoti, Abdur Rahman Bin Shahid:
Adaptive and Robust Data Poisoning Detection and Sanitization in Wearable IoT Systems using Large Language Models. CoRR abs/2511.02894 (2025)- 2024
[j9]Ahmed Imteaj
, Abdur Rahman Bin Shahid, Saika Zaman:
Leveraging Blockchain Interoperability for Interdependent Networks. IEEE Consumer Electron. Mag. 13(2): 81-86 (2024)
[j8]Abdur Rahman Bin Shahid
, Ahmed Imteaj
:
Securing User Privacy in Cloud-Based Whiteboard Services Against Health Attribute Inference Attacks. IEEE Trans. Artif. Intell. 5(8): 3872-3885 (2024)
[c23]Md. Zarif Hossain, Ahmed Imteaj
, Abdur Rahman Bin Shahid:
FedAVO: Improving Communication Efficiency in Federated Learning with African Vultures Optimizer. COMPSAC 2024: 455-462
[c22]Syed Mhamudul Hasan, Alaa M. Alotaibi, Sajedul Talukder, Abdur Rahman Bin Shahid:
Distributed Threat Intelligence at the Edge Devices: A Large Language Model-Driven Approach. COMPSAC 2024: 1496-1497
[c21]Malithi Wanniarachchi Kankanamge, Syed Mhamudul Hasan, Abdur Rahman Bin Shahid, Ning Yang:
Large Language Model Integrated Healthcare Cyber-Physical Systems Architecture. COMPSAC 2024: 1540-1541
[c20]Ahmed Imteaj
, Tanveer Rahman, Saika Zaman, Md. Zarif Hossain, Abdur Rahman Bin Shahid:
Enhancing Road Safety Through Cost-Effective, Real-Time Monitoring of Driver Awareness with Resource-Constrained IoT Devices. COMPSAC 2024: 1711-1720
[c19]Abdur Rahman Bin Shahid, Syed Mhamudul Hasan, Malithi Wanniarachchi Kankanamge, Md. Zarif Hossain, Ahmed Imteaj
:
WatchOverGPT: A Framework for Real-Time Crime Detection and Response Using Wearable Camera and Large Language Model. COMPSAC 2024: 2189-2194
[c18]Syed Mhamudul Hasan, Abdur Rahman Bin Shahid, Ahmed Imteaj:
Towards Sustainable SecureML: Quantifying Carbon Footprint of Adversarial Machine Learning. ICC Workshops 2024: 1359-1364
[c17]Md. Zarif Hossain, Ahmed Imteaj
, Abdur Rahman Bin Shahid:
FLAMINGO: Adaptive and Resilient Federated Meta-Learning against Adversarial Attacks. ICDCSW 2024: 17-22
[c16]W. K. Malithi Mithsara, Abdur Rahman Bin Shahid, Ning Yang:
Intelligent Fall Detection and Emergency Response for Smart Homes Using Language Models. ICMLA 2024: 230-235
[c15]Ahmed Imteaj
, Md. Zarif Hossain, Saika Zaman, Abdur Rahman Bin Shahid:
TriplePlay: Enhancing Federated Learning with CLIP for Non-IID Data and Resource Efficiency. ICMLA 2024: 1474-1480
[c14]W. K. Malithi Mithsara, Abdur Rahman Bin Shahid, Ning Yang:
Zero-Shot Detection and Sanitization of Data Poisoning Attacks in Wearable AI Using Large Language Models. ICMLA 2024: 1510-1515
[c13]Abdur Rahman Bin Shahid, Syed Mhamudul Hasan, Ahmed Imteaj
, Shahriar Badsha:
Context-Aware Spatiotemporal Poisoning Attacks on Wearable-Based Activity Recognition. INFOCOM (Workshops) 2024: 1-2
[i8]Syed Mhamudul Hasan, Abdur Rahman Bin Shahid
, Ahmed Imteaj
:
Towards Sustainable SecureML: Quantifying Carbon Footprint of Adversarial Machine Learning. CoRR abs/2403.19009 (2024)
[i7]Syed Mhamudul Hasan, Alaa M. Alotaibi, Sajedul Talukder, Abdur Rahman Bin Shahid:
Distributed Threat Intelligence at the Edge Devices: A Large Language Model-Driven Approach. CoRR abs/2405.08755 (2024)
[i6]Malithi Wanniarachchi Kankanamge, Syed Mhamudul Hasan, Abdur Rahman Bin Shahid, Ning Yang:
Large Language Model Integrated Healthcare Cyber-Physical Systems Architecture. CoRR abs/2407.18407 (2024)
[i5]Ahmed Imteaj
, Md. Zarif Hossain, Saika Zaman, Abdur Rahman Bin Shahid:
TriplePlay: Enhancing Federated Learning with CLIP for Non-IID Data and Resource Efficiency. CoRR abs/2409.05347 (2024)- 2023
[c12]Md. Zarif Hossain, Ahmed Imteaj
, Saika Zaman, Abdur Rahman Bin Shahid, Sajedul Talukder, M. Hadi Amini
:
FLID: Intrusion Attack and Defense Mechanism for Federated Learning Empowered Connected Autonomous Vehicles (CAVs) Application. DSC 2023: 1-8
[c11]Abdur Rahman Bin Shahid, Ahmed Imteaj
, Shahriar Badsha, Md. Zarif Hossain:
Assessing Wearable Human Activity Recognition Systems Against Data Poisoning Attacks in Differentially-Private Federated Learning. SMARTCOMP 2023: 355-360- 2022
[j7]Abdur Rahman Bin Shahid:
Facilitating Internet of Things (IoT) Experience in Computer and Information Systems Education. J. Comput. Sci. Coll. 38(3): 207 (2022)
[c10]Abdur Rahman Bin Shahid, Ahmed Imteaj
, Peter Y. Wu, Diane A. Igoche, Tauhidul Alam
:
Label Flipping Data Poisoning Attack Against Wearable Human Activity Recognition System. SSCI 2022: 908-914
[c9]Hussein Zangoti, Alex Pissinou Makki, Niki Pissinou, Abdur Rahman Bin Shahid, Omar J. Guerra, Joel Rodriguez:
A Multidimensional Blockchain Framework For Mobile Internet of Things. TrustCom 2022: 935-944
[i4]Abdur Rahman Bin Shahid, Ahmed Imteaj, Peter Y. Wu, Diane A. Igoche, Tauhidul Alam:
Label Flipping Data Poisoning Attack Against Wearable Human Activity Recognition System. CoRR abs/2208.08433 (2022)- 2021
[j6]Abdur Rahman Bin Shahid
, Niki Pissinou, S. S. Iyengar
, Kia Makki:
Delay-aware privacy-preserving location-based services under spatiotemporal constraints. Int. J. Commun. Syst. 34(1) (2021)
[j5]Sajedul Talukder, Abdur Rahman Bin Shahid:
Enhancing alternative proof of work for cryptocurrencies using machine learning: faculty poster abstract. J. Comput. Sci. Coll. 37(3): 155 (2021)
[j4]Sajedul Talukder, Abdur Rahman Bin Shahid:
Applying local differential privacy in handwriting recognition-based systems: faculty poster abstract. J. Comput. Sci. Coll. 37(3): 163 (2021)
[j3]Abdur Rahman Bin Shahid, Sajedul Talukder:
Evaluation of privacy-preserving Logistic Regression and Naive Bayes classifiers in healthcare: faculty poster abstract. J. Comput. Sci. Coll. 37(3): 164 (2021)
[j2]Abdur Rahman Bin Shahid, Sajedul Talukder:
Privacy-preserving activity recognition from sensor data: faculty poster abstract. J. Comput. Sci. Coll. 37(3): 165 (2021)- 2020
[c8]Tauhidul Alam
, Jarrett Taylor, Jonathan Taylor, Shahriar Badsha, Abdur Rahman Bin Shahid, A. S. M. Kayes:
Leveraging Blockchain for Spoof-Resilient Robot Networks. ICIRA 2020: 207-216
2010 – 2019
- 2019
[c7]Abdur Rahman Bin Shahid, Niki Pissinou, Corey Staier, Rain Kwan
:
Sensor-Chain: A Lightweight Scalable Blockchain Framework for Internet of Things. iThings/GreenCom/CPSCom/SmartData 2019: 1154-1161
[c6]Abdur Rahman Bin Shahid, Niki Pissinou, Laurent Njilla, Edwin Aguilar, Eric Perez:
Demo: Towards the Development of a Differentially Private Lightweight and Scalable Blockchain for IoT. MASS Workshops 2019: 172-173
[c5]Abdur Rahman Bin Shahid, Niki Pissinou, Laurent Njilla, Sheila Alemany, Ahmed Imteaj
, Kia Makki, Edwin Aguilar:
Quantifying location privacy in permissioned blockchain-based internet of things (IoT). MobiQuitous 2019: 116-125
[i3]Supriya Sarker, Abdur Rahman Bin Shahid:
Cyberbullying of High School Students in Bangladesh: An Exploratory Study. CoRR abs/1901.00755 (2019)
[i2]Wei Zeng, Abdur Rahman Bin Shahid, Keyan Zolfaghari, Aditya Shetty, Niki Pissinou, S. Sitharama Iyengar
:
n-VDD: Location Privacy Protection Based on Voronoi-Delaunay Duality. CoRR abs/1906.09158 (2019)- 2018
[c4]Yujian Charles Tang, Samia Tasnim
, Niki Pissinou, S. S. Iyengar
, Abdur Rahman Bin Shahid:
Reputation-Aware Data Fusion and Malicious Participant Detection in Mobile Crowdsensing. IEEE BigData 2018: 4820-4828
[c3]Abdur Rahman Bin Shahid, Niki Pissinou, S. S. Iyengar, Jerry Miller, Ziqian Ding, Teresita Lemus:
KLAP for Real-World Protection of Location Privacy. SERVICES 2018: 17-18
[c2]Abdur Rahman Bin Shahid, Niki Pissinou, S. S. Iyengar
, Kia Makki:
Check-ins and Photos: Spatiotemporal Correlation-Based Location Inference Attack and Defense in Location-Based Social Networks. TrustCom/BigDataSE 2018: 1852-1857- 2017
[c1]Abdur Rahman Bin Shahid, Liz Jeukeng, Wei Zeng, Niki Pissinou, S. S. Iyengar
, Sartaj Sahni, Maite Varela-Conover:
PPVC: Privacy Preserving Voronoi Cell for location-based services. ICNC 2017: 351-355- 2015
[j1]Wei Zeng, Muhammad Razib, Abdur Rahman Bin Shahid:
Diffeomorphism Spline. Axioms 4(2): 156-176 (2015)- 2012
[i1]Abdur Rahman Bin Shahid, Shahriar Badsha, Md. Rethwan Kabeer, Junaid Ahsan, Mufti Mahmud:
A Non-Blind Watermarking Scheme for Gray Scale Images in Discrete Wavelet Transform Domain using Two Subbands. CoRR abs/1211.2699 (2012)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-02-13 22:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







