default search action
Abdullahi Chowdhury
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j9]Amit Kumar Singh, Rajendra Pamula, Nasrin Akhter, Sudheer Kumar Battula, Ranesh Naha, Abdullahi Chowdhury, Shahriar Kaisar:
Intelligent transportation system for automated medical services during pandemic. Future Gener. Comput. Syst. 163: 107515 (2025) - 2024
- [j8]Shahriar Kaisar, Md. Mamunur Rashid, Abdullahi Chowdhury, Sakib Shahriar Shafin, Joarder Kamruzzaman, Abebe Abeshu Diro:
Enhancing Telemarketing Success Using Ensemble-Based Online Machine Learning. Big Data Min. Anal. 7(2): 294-314 (2024) - 2023
- [j7]Ed Kamya Kiyemba Edris, Mahdi Aiash, Mohammad Ali Khoshkholghi, Ranesh Naha, Abdullahi Chowdhury, Jonathan Loo:
Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain. Internet Things 24: 100913 (2023) - [j6]Abdullahi Chowdhury, Gour C. Karmakar, Joarder Kamruzzaman, Rajkumar Das, S. H. Shah Newaz:
An Evidence Theoretic Approach for Traffic Signal Intrusion Detection. Sensors 23(10): 4646 (2023) - [j5]Abdullahi Chowdhury, Shahriar Kaisar, Mahbub E. Khoda, Ranesh Kumar Naha, Mohammad Ali Khoshkholghi, Mahdi Aiash:
IoT-Based Emergency Vehicle Services in Intelligent Transportation System. Sensors 23(11): 5324 (2023) - [c10]Abdullahi Chowdhury, Hung Nguyen, Debi Ashenden, Ganna Pogrebna:
POSTER: A Teacher-Student with Human Feedback Model for Human-AI Collaboration in Cybersecurity. AsiaCCS 2023: 1040-1042 - [c9]Abdullahi Chowdhury, Ranesh Naha, Shahriar Kaisar, Mohammad Ali Khoshkholghi, Kamran Ali, Antonino Galletta:
Information Fusion-based Cybersecurity Threat Detection for Intelligent Transportation System. CCGridW 2023: 96-103 - [c8]Abdullahi Chowdhury, Hung X. Nguyen:
CoZure: Context Free Grammar Co-Pilot Tool for Finding New Lateral Movements in Azure Active Directory. RAID 2023: 426-439 - [c7]Abdullahi Chowdhury, Mohammad Manzurul Islam, Shahriar Kaisar, Mahbub E. Khoda, Ranesh Naha, Mohammad Ali Khoshkholghi, Mahdi Aiash:
Leveraging Oversampling Techniques in Machine Learning Models for Multi-class Malware Detection in Smart Home Applications. TrustCom 2023: 2216-2221 - 2022
- [j4]Shahriar Kaisar, Abdullahi Chowdhury:
Integrating oversampling and ensemble-based machine learning techniques for an imbalanced dataset in dyslexia screening tests. ICT Express 8(4): 563-568 (2022) - 2021
- [j3]Abdullahi Chowdhury, Gour C. Karmakar, Joarder Kamruzzaman, Syed Mofizul Islam:
Trustworthiness of Self-Driving Vehicles for Intelligent Transportation Systems in Industry Applications. IEEE Trans. Ind. Informatics 17(2): 961-970 (2021) - [j2]Gour C. Karmakar, Abdullahi Chowdhury, Rajkumar Das, Joarder Kamruzzaman, Syed Mofizul Islam:
Assessing Trust Level of a Driverless Car Using Deep Learning. IEEE Trans. Intell. Transp. Syst. 22(7): 4457-4466 (2021) - [c6]Sakib Shahriar Shafin, Sakir Adnan Prottoy, Saif Abbas, Safayat Bin Hakim, Abdullahi Chowdhury, Md. Mamunur Rashid:
Distributed Denial of Service Attack Detection Using Machine Learning and Class Oversampling. AII 2021: 247-259 - 2020
- [j1]Abdullahi Chowdhury, Gour C. Karmakar, Joarder Kamruzzaman, Alireza Jolfaei, Rajkumar Das:
Attacks on Self-Driving Cars and Their Countermeasures: A Survey. IEEE Access 8: 207308-207342 (2020)
2010 – 2019
- 2019
- [c5]Abdullahi Chowdhury, Gour C. Karmakar, Joarder Kamruzzaman:
Trusted Autonomous Vehicle: Measuring Trust using On-Board Unit Data. TrustCom/BigDataSE 2019: 787-792 - 2018
- [c4]Quazi Sunjida Shawket Rupok, Abdullahi Chowdhury:
Using e-learning to engage unemployed rural women in aquaculture in Bangladesh to reduce poverty. DATA 2018: 41:1-41:6 - [c3]Abdullahi Chowdhury, Gour C. Karmakar, Joarder Kamruzzaman, Tapash Saha:
Detecting Intrusion in the Traffic Signals of an Intelligent Traffic System. ICICS 2018: 696-707 - 2017
- [c2]Abdullahi Chowdhury:
Cyber attacks in mechatronics systems based on Internet of Things. ICM 2017: 476-481 - 2016
- [c1]Abdullahi Chowdhury:
Recent Cyber Security Attacks and Their Mitigation Approaches - An Overview. ATIS 2016: 54-65
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint