Alert button
Picture for Mohammad Saidur Rahman

Mohammad Saidur Rahman

Alert button

Privacy-Preserving Ensemble Infused Enhanced Deep Neural Network Framework for Edge Cloud Convergence

Add code
Bookmark button
Alert button
May 16, 2023
Veronika Stephanie, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman

Figure 1 for Privacy-Preserving Ensemble Infused Enhanced Deep Neural Network Framework for Edge Cloud Convergence
Figure 2 for Privacy-Preserving Ensemble Infused Enhanced Deep Neural Network Framework for Edge Cloud Convergence
Figure 3 for Privacy-Preserving Ensemble Infused Enhanced Deep Neural Network Framework for Edge Cloud Convergence
Figure 4 for Privacy-Preserving Ensemble Infused Enhanced Deep Neural Network Framework for Edge Cloud Convergence
Viaarxiv icon

Blockchain-based Access Control for Secure Smart Industry Management Systems

Add code
Bookmark button
Alert button
Apr 26, 2023
Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman, Abdelaziz Bouras

Viaarxiv icon

Blockchain-based Federated Learning with Secure Aggregation in Trusted Execution Environment for Internet-of-Things

Add code
Bookmark button
Alert button
Apr 25, 2023
Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman, Xun Yi, Mahathir Almashor

Figure 1 for Blockchain-based Federated Learning with Secure Aggregation in Trusted Execution Environment for Internet-of-Things
Figure 2 for Blockchain-based Federated Learning with Secure Aggregation in Trusted Execution Environment for Internet-of-Things
Figure 3 for Blockchain-based Federated Learning with Secure Aggregation in Trusted Execution Environment for Internet-of-Things
Figure 4 for Blockchain-based Federated Learning with Secure Aggregation in Trusted Execution Environment for Internet-of-Things
Viaarxiv icon

Transformers for End-to-End InfoSec Tasks: A Feasibility Study

Add code
Bookmark button
Alert button
Dec 05, 2022
Ethan M. Rudd, Mohammad Saidur Rahman, Philip Tully

Figure 1 for Transformers for End-to-End InfoSec Tasks: A Feasibility Study
Figure 2 for Transformers for End-to-End InfoSec Tasks: A Feasibility Study
Figure 3 for Transformers for End-to-End InfoSec Tasks: A Feasibility Study
Figure 4 for Transformers for End-to-End InfoSec Tasks: A Feasibility Study
Viaarxiv icon

On the Limitations of Continual Learning for Malware Classification

Add code
Bookmark button
Alert button
Aug 13, 2022
Mohammad Saidur Rahman, Scott E. Coull, Matthew Wright

Figure 1 for On the Limitations of Continual Learning for Malware Classification
Figure 2 for On the Limitations of Continual Learning for Malware Classification
Figure 3 for On the Limitations of Continual Learning for Malware Classification
Figure 4 for On the Limitations of Continual Learning for Malware Classification
Viaarxiv icon