متابعة
Dr. Nazim Uddin Sheikh
Dr. Nazim Uddin Sheikh
بريد إلكتروني تم التحقق منه على mq.edu.au
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
A lightweight signature-based IDS for IoT environment
NU Sheikh, H Rahman, S Vikram, H AlQahtani
arXiv preprint arXiv:1811.04582, 2018
302018
Analysis of the Technology Acceptance Theoretical Model in Examining Users’ Behavioural Intention to Use an Augmented Reality App (IMAP-Campus)
H Alqahtani, M Kavakli, NU Sheikh
International Journal of Engineering and Management Research (IJEMR) 8 (5 …, 2018
152018
Countermeasure of attack vectors using signature-based IDS in IoT environments
TU Sheikh, H Rahman, HS Al-Qahtani, TK Hazra, NU Sheikh
2019 IEEE 10th Annual Information Technology, Electronics and Mobile …, 2019
132019
A unique approach to design an intrusion detection system using an innovative string searching algorithm and DNA sequence
N Sheikh, K Mustafi, I Mukhopadhyay
Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON …, 2016
102016
Do auto-regressive models protect privacy? Inferring fine-grained energy consumption from aggregated model parameters
NU Sheikh, HJ Asghar, F Farokhi, MA Kaafar
IEEE Transactions on Services Computing 15 (6), 3198-3209, 2021
72021
A novel approach to enhance the security dimension of RSA algorithm using bijective function
K Mustafi, N Sheikh, TK Hazra, M Mazumder, I Bhattacharya, ...
2016 IEEE 7th Annual Information Technology, Electronics and Mobile …, 2016
62016
An optimized pattern recognition algorithm for anomaly detection in IoT environment
NU Sheikh, H Rahman, H Al-Qahtani
arXiv preprint arXiv:1901.08729, 2019
32019
Multi-variable bijective mapping for secure encryption and decryption
NU Sheikh, TK Hazra, H Rahman, K Mustafi, AK Chakraborty
2017 8th Annual Industrial Automation and Electromechanical Engineering …, 2017
32017
Trace recovery: inferring fine-grained trace of energy data from aggregates
NU Sheikh, Z Lu, HJ Asghar, MA Kaafar
18th International Conference on Security and Cryptography, SECRYPT 2021 …, 2021
22021
Partitioned network with Adaptive Mobile Sinks
H Rahman, NU Sheikh, HS Al-Qahtani, TK Hazra
2019 IEEE 10th Annual Information Technology, Electronics and Mobile …, 2019
12019
Anomaly Detection in Smart Grid Networks Using Power Consumption Data
P Nanda, H Rahman, M Mohanty
20th International Conference on Security and Cryptography, 2023
2023
Submit Anomaly Detection in Smart Grid Networks Using Power Consumption Data
MMNUS Hasina Rahman, Priyadarsi Nanda
Secrypt 2023 Conference, 1-8, 2023
2023
Quantifying privacy threats in aggregated energy data analytics
NU Sheikh
Macquarie University, 2021
2021
Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics
NU Sheikh, Z Lu, HJ Asghar, MA Kaafar
International Conference on E-Business and Telecommunications, 305-333, 2021
2021
DO STATISTICAL MODELS REVEAL TOO MUCH? RECONSTRUCTING TRAINING DATA FROM RESULTANT MODELS
NU Sheikh, H Asghar, F Farokhi, M Kaafar
https://www.researchgate.net/publication …, 2021
2021
An Optimized Pattern Recognition Algorithm for Anomaly Detection in IoT Environment
N Uddin Sheikh, H Rahman, H Al-Qahtani
arXiv e-prints, arXiv: 1901.08729, 2019
2019
Evaluating Continuous User-Authentication using Breaths under Health Conditions
NU Sheikh, S Berkovsky, HJ Asghar, MA Kaafar
Evaluating Membership Inference Attack Against Differentially Private Machine Learning in Digital Health
NU Sheikh, S Berkovsky, HJ Asghar, M Ali
AI-Enabled Privacy Preserving Energy Data Analytics: A Review
NU Sheikh, D Vatsalan, HJ Asghar, MA Kaafar
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–19