Mohd Anwar

Mohd Anwar
North Carolina Agricultural and Technical State University | NC A&T · Department of Computer Science

PhD

About

115
Publications
20,954
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,211
Citations
Introduction
Dr. Anwar is a Professor of Computer Science, Director of Center for Advanced Studies in Identity Sciences, Quantum Computing Research Center , as well as Human-Centered AI (HC-AI) Lab at North Carolina A&T State University. He was also a visiting scientist at RTI International. Before joining NC A&T, he was a faculty member at the University of Pittsburgh and at the University of Minnesota.
Additional affiliations
August 2010 - August 2012
University of Pittsburgh
Position
  • Research Assistant

Publications

Publications (115)
Article
Privacy is a rather murky concept, but the absence of privacy is clearly felt in today’s digital world. With the significant increase in surveillance power of software and hardware, storage capacity, computing power as well as advancement in data science technologies, the threat to privacy is ever increasing. Within the digital realm, privacy has b...
Article
Full-text available
The Internet of Things (IoT) has rapidly changed information systems and networks in a significant way. Traditional networks are experiencing exponential increases in data volume, velocity, and variety. With the intermingling of IoT devices and legacy systems, new security threats are becoming more prevalent and severe. Successful attacks can cause...
Article
Full-text available
The World Health Organization estimates that approximately 10 million people are newly diagnosed with dementia each year and a global prevalence of nearly 50 million persons with dementia (PwD). The vast majority of PwD living at home receive the majority of their care from informal familial caregivers. The quality of life (QOL) of familial caregiv...
Conference Paper
Full-text available
Coronavirus disease (COVID-19) pandemic has changed various aspects of people’s lives and behaviors. At this stage, there are no other ways to control the natural progression of the disease than adopting mitigation strategies such as wearing masks, watching distance, and washing hands. Moreover, at this time of social distancing, social media play...
Conference Paper
Ransomware is a major malware attack experienced by large corporations and healthcare services. Ransomware employs the idea of cryptovirology, which uses cryptography to design malware. The goal of ransomware is to extort ransom by threatening the victim with the destruction of their data. Ransomware typically involves a 3-step process: analyzing t...
Article
Full-text available
Identifying security concerns is a security activity that can be integrated into the requirements development phase. However, it has been shown that manually identifying concerns is a time-consuming and challenging task. The software engineering community has utilized natural language processing and query systems to automatically find part of the r...
Preprint
Full-text available
Ambient assisted living (AAL) environments support independence and quality of life of older adults However, in an AAL environment, privacy-related issues (e.g., unawareness, information disclosure, and lack of support) directly impact older adults and bystanders (e.g., caregivers, service providers, etc.). We explore the privacy challenges that bo...
Preprint
Full-text available
The Internet of Medical Things (IoMT) is a frequent target of attacks -- compromising both patient data and healthcare infra-structure. While privacy-enhanced technologies and services (PETS) are developed to mitigate traditional privacy concerns, they cannot be applied without identifying specific threat models. Therefore, our position is that the...
Preprint
Full-text available
In this paper, we proposed a new clustering-based active learning framework, namely Active Learning using a Clustering-based Sampling (ALCS), to address the shortage of labeled data. ALCS employs a density-based clustering approach to explore the cluster structure from the data without requiring exhaustive parameter tuning. A bi-cluster boundary-ba...
Conference Paper
The Internet of Medical Things (IoMT) is a frequent target of attacks -- compromising both patient data and healthcare infrastructure. While privacy-enhanced technologies and services (PETS) are developed to mitigate traditional privacy concerns, they cannot be applied without identifying specific threat models. Therefore, our position is that the...
Patent
This specification describes methods, systems, and computer readable media for authen­ticating to a computer system. In some examples, a method includes receiving a request from a user device for authen­tication, the request specifying a usemame. The method includes determining grid information associated with the usemame by accessing a repository...
Conference Paper
Audio sentiment analysis has many applications in a present-day context, such as call center environments, conversational agents, and human-robot interactions. However, analyzing sentiment using audio signals is a significant challenge due to the difficulty of accurately determining the robust feature set needed to detect sentiments expressed withi...
Article
Full-text available
Medical image interpretation is an essential task for the correct diagnosis of many diseases. Pathologists, radiologists, physicians, and researchers rely heavily on medical images to perform diagnoses and develop new treatments. However, manual medical image analysis is tedious and time consuming, making it necessary to identify accurate automated...
Article
Full-text available
Active learning (AL) has widely been used to address the shortage of labeled datasets. Yet, most AL techniques require an initial set of labeled data as the knowledge base to perform active querying. The informativeness of the initial labeled set significantly affects the subsequent active query; hence the performance of active learning. In this pa...
Article
Full-text available
The COVID-19 pandemic and its associated mitigation strategies have significant psychosocial, behavioral, socioeconomic, and health impacts, particularly in vulnerable US populations. Different factors have been identified as influencers of the transmission rate; however, the effects of area deprivation index (as a measure of social determinants of...
Conference Paper
Connected healthcare devices enable us to monitor our health longitudinally, adhere to medical regimens, and manage health conditions and diseases from the comforts of our homes. However, we do not fully understand how integrating healthcare devices into the smart home ecosystem impacts privacy. What, if any, privacy risks does this integration pos...
Conference Paper
A unique digital identity, user ID, is essential for everyday online activities in the Internet era. These user IDs represent a user in a digital environment using stored credentials on a system called authentication system. It is possible to capture unique patterns of user movements from smartphone sensor data. This paper presents a framework for...
Conference Paper
The number of prominent ransomware attacks has increased recently. In this research, we detect ransomware by analyzing network traffic by using machine learning algorithms and comparing their detection performances. We have developed multi-class classification models to detect families of ransomware by using the selected network traffic features, w...
Conference Paper
The human state of mind can be reflected in interactions with computers, such as the time taken to type a word, the number of times that a correction is made, the mean time taken to press a set of keys, etc. In this research, we developed an application that collects keystroke-based human-computer interactions while collecting user mood (pleasant v...
Article
Full-text available
Approximately 65% of the organizations in the United States have fallen victim to a successful phishing attack. Many organizations offer anti-phishing training to their employees to defend against phishing attacks. The purpose of this study is to examine factors impacting the effectiveness of anti-phishing training and study the relationship betwee...
Preprint
Full-text available
The art nature of music makes it difficult, if not impossible, to extract solid rules from composed pieces and express them mathematically. This has led to the lack of utilization of music expert knowledge in the AI literature for automation of music composition. In this study, we employ intervals, which are the building blocks of music, to represe...
Article
In multi-label learning problems, the class labels are correlated and the label correlations can be leveraged to improve the predictive performance of a classifier. Methods that consider high-order correlations in the label space, usually do not utilize pairwise correlations. In most of these methods, label correlations are considered as prior know...
Chapter
In today’s digital economy, consumers are heavily dependent on online businesses. As consumers browse and purchase products and services online, a trove of data about them is collected by businesses. Consumers need protection from the collection and misuse of their personal information. However, not all businesses are sincere about ensuring consume...
Article
Full-text available
Purpose: It has been over a year since the first known case of coronavirus disease (COVID-19) emerged, yet the pandemic is far from over. To date, the coronavirus pandemic has infected over eighty million people and has killed more than 1.78 million worldwide. This study aims to explore “how useful is Reddit social media platform to surveil COVID-1...
Preprint
Full-text available
Coronavirus disease (COVID-19) pandemic has changed various aspects of people's lives and behaviors. At this stage, there are no other ways to control the natural progression of the disease than adopting mitigation strategies such as wearing masks, watching distance, and washing hands. Moreover, at this time of social distancing, social media plays...
Poster
Full-text available
Alzheimer’s Association International Conference Satellite Symposium May 12-13, 2021
Preprint
Full-text available
Advancements in the digital technologies have enabled researchers to develop a variety of Computational Music applications. Such applications are required to capture, process, and generate data related to music. Therefore, it is important to digitally represent music in a music theoretic and concise manner. Existing approaches for representing musi...
Preprint
BACKGROUND The opioid crisis in the United States may be exacerbated by the COVID-19 pandemic. OBJECTIVE The current study examines changes in naloxone administrations during Emergency Medical Service (EMS) runs for opioid-related overdoses during the COVID-19 pandemic in Guilford County, North Carolina. METHODS A period-over-period approach was...
Article
Full-text available
Background The opioid crisis in the United States may be exacerbated by the COVID-19 pandemic. Increases in opioid use, emergency medical services (EMS) runs for opioid-related overdoses, and opioid overdose deaths have been reported. No study has examined changes in multiple naloxone administrations, an indicator of overdose severity, during the C...
Conference Paper
Passive biometrics and behavioral analytics seek to identify users based on their unique patterns of activities. In this paper, we test the feasibility of using time-varying inertia data as passive biometrics to be used for user identification and authentication. We present a deep learning model for inertia pattern recognition that achieved a high...
Chapter
Software systems are everywhere, and therefore, software security breaches impact every enterprise system. Although the software engineers and system developers are provided with various secure software development guidelines and processes, attacks exploiting software vulnerabilities are on the rise. The prevalence of software vulnerabilities and t...
Conference Paper
Software systems are everywhere, and therefore, software security breaches impact every enterprise system. Although the software engineers and system developers are provided with various secure software development guidelines and processes, attacks exploiting software vulnerabilities are on the rise. The prevalence of software vulnerabilities and t...
Conference Paper
Giving care to persons with dementia (PwD) has a significant strain on the quality of life for familial caregivers. Due to the overdependent nature of PwD, caregivers are burdened with health issues, stress, depression, loneliness, and social isolation. As a result, there is a need for understanding the nature and severity of this burden. In this p...
Article
Full-text available
Background: Opioid overdose deaths (OODs) constitute a significant public health burden for the United States. The most recent statistics indicate that of the 70,237 drug-overdose related deaths in 2017, 68% (47,600) were attributed to opioids. OODs involving synthetic opioids (e.g., fentanyl) increased notably (46%) from 2016 to 2017. Reflecting o...
Article
Internet of Things technology has revolutionized our daily lives in many ways — whether it is the way we conduct our day-to-day activities inside our home, or the way we control our home environments remotely. Unbeknownst to the users, with adoption of these “smart home” technologies, their personal space becomes vulnerable to security and privacy...
Preprint
BACKGROUND Over the last two decades, deaths associated with opioids have escalated in number and geographic spread, impacting more and more individuals, families, and communities. Reflecting on the shifting nature of the opioid overdose crisis, Dasgupta, Beletsky, and Ciccarone offer a triphasic framework to explain that opioid overdose deaths (OO...
Conference Paper
Full-text available
With the obesity epidemic still on the rise, there is a need to address this issue. Multiple statistics show that racial/ethnic minorities (e.g., African Americans) bear the greatest burden of the obesity epidemic, and that the obesity rates are increasing faster at an earlier age. Previous studies evidenced that a healthy body can be maintained wi...
Article
Purpose An organization’s ability to successfully manage intellectual capital is determined by the actions of its employees to prevent or minimize information security incidents. To prevent more data breaches to intellectual capital, organizations must provide regular cybersecurity awareness training for all personnel. The purpose of this paper is...
Article
Full-text available
Additive Manufacturing (AM) requires integrated networking, embedded controls and cloud computing technologies to increase their efficiency and resource utilisation. However, currently there is no readily applicable system that can be used for cloud-based AM. The objective of this research is to develop a framework for designing a cyber additive ma...
Conference Paper
The popularity of Web-based computing has given increase to browser-based cyberattacks. These cyberattacks use websites that exploit various web browser vulnerabilities. To help regular users avoid exploit websites and engage in safe online activities, we propose a methodology of building a machine learning-powered predictive analytical model that...
Chapter
Full-text available
Smart homes are increasingly becoming popular because they make living comfortable, enjoyable, and secure. People can remotely control various aspects of their smart home environments. However, smart home appliances can pose threats to privacy. The reason is that smart appliances collect and store sensitive information, and if hackers gain access t...
Chapter
Despite being one of the most crucial parts of online transactions, the most used authentication system, the username and password system, has shown to be weaker than ever. With the increase of processing power within computers, offline password attacks such as dictionary attacks, rainbow tables, and hash tables have become more effective against d...
Article
As internet technology and mobile applications increase in volume and complexity, malicious cyber-attacks are evolving, and as a result society is facing greater security risks in cyberspace more than ever before. This study has extended the published literature on cybersecurity by theoretically defining the conceptual domains of employees’ securit...
Chapter
Attacks on confidential data on the Internet is increasing. The reachability to users’ data needs stricter control. One way to do this by the user is applying proper privacy settings. Research finds there is slackness in online users’ applying proper privacy settings but no such work has focused on the reasons behind the slackness behavior. Our wor...
Chapter
Following the popularity of Wikipedia, community authoring systems are increasingly in use as content sharing outlets. As such, a Web-based portal for sharing of user-generated content (e.g., course notes, quiz answers, etc.) shows prospect to be a great tool for social E-Learning. Among others, students are expected to be active contributors in su...
Conference Paper
Full-text available
In smart homes, users do not have enough options to express their privacy preferences and decide who can see their data, when their data can be used, and which part of data they want to share and which part they do not want. We propose a framework that uses machine learning algorithms to determine for what purpose, to whom and with what level of de...
Conference Paper
Alleviating stress reduces the risk of developing many chronic health problems. Though the effects of stress on the body may not always be immediately evident, exposure to chronic stress can lead to serious health problems and/or exacerbate existing medical conditions. This research study explores how a personal computing device such as a smartphon...
Conference Paper
Passwords today are the most widely used form of authentication, yet have significant issues in regards to security due to human memorability limitations. Inability to remember strong passwords causes users generally to only satisfy the bare minimum requirements during an enrollment process. Users having weak passwords are vulnerable to offline pas...
Article
Full-text available
Inspired by the human immune system, we explore the development of a new Multiple-Detector Set Artificial Immune System (mAIS) for the detection of mobile malware based on the information flows in Android apps. mAISs differ from conventional AISs in that multiple-detector sets are evolved concurrently via negative selection. Typically, the first de...
Article
Security breaches are prevalent in organizations and many of the breaches are attributed to human errors. As a result, the organizations need to increase their employees' security awareness and their capabilities to engage in safe cybersecurity behaviors. Many different psychological and social factors affect employees' cybersecurity behaviors. An...
Conference Paper
Full-text available
Cybersecurity behaviors of employees are major contributors of cyber attacks in organizations. It is important to investigate an employee's cybersecurity posture within an organization. Using our cybersecurity behavior model, we surveyed employees from different organizations on their perceptions on various cybersecurity-related psychological varia...
Conference Paper
Full-text available
To help people improve their knowledge and security self-efficacy in dealing with malware attacks that are relevant and meaningful to their organizations, we recently developed over 30 e-learning videos based on the major types of malware attacks we captured using the state-of-the-art anti-malware solution. The preliminary evaluation results of the...
Article
Full-text available
To help people improve their knowledge and security self-efficacy in dealing with malware attacks that are relevant and meaningful to their organizations, we recently developed over 30 e-learning videos based on the major types of malware attacks we captured using the state-of-the-art anti-malware solution. The preliminary evaluation results of the...
Article
Social engineering is a serious security threat to Online Social Networks (OSNs). Identity theft, impersonation, phishing, and deception are some of the social engineering-based attacks that exploit vulnerabilities of interpersonal relationships of online users. As a result, relationships in OSNs need to be thoroughly examined. In this vein, we pro...
Article
Following the popularity of Wikipedia, community authoring systems are increasingly in use as content sharing outlets. As such, a Web-based portal for sharing of user-generated content (e.g., course notes, quiz answers, etc.) shows prospect to be a great tool for social E-Learning. Among others, students are expected to be active contributors in su...
Article
Health status monitoring is central to the new health-care paradigm that has the following characteristics: wellness promotion, patient-centered care, and anytime, anyplace health care. Internet of Things (IoT) paradigm and machine-to-machine (M2M) communication technologies can be harnessed to build an improved remote health monitoring system. Our...
Article
Full-text available
Potato is an important crop globally and late blight (Phytophthora infestans) often results in severe crop loss. The cost for late blight control can be in excess of $210 million in the United States. We utilised a non-parametric density distribution analysis of local temperature (T) and relative humidity (RH), from 2005 to 2009, to assess and vali...
Conference Paper
Obesity has been a public health problem in the United States. The online social media platforms such as Twitter, Facebook, Google+ give users quick and easy way to engage in conversation about issues, problems, and concerns of their daily lives. In this exploratory research, our goal is to determine if the obesity conversation among Twitter users...
Conference Paper
Full-text available
Cloud technology can be used to support costeffective, scalable, and well-managed healthcare information systems. However, cloud computing, particularly multitenancy, introduces privacy and security issues related to personal health information (PHI). In this paper, we designed ontological models for healthcare workflow and multi-tenancy, and then...
Article
A new paradigm, which is at the early stage of inception, is reshaping global healthcare services with emphasis shifting from sporadic acute health care to continuous and integrated health care-an approach being further perfected as anywhere, anytime healthcare services. Recent advances in e-health informatics, digital transformation and remote dat...
Conference Paper
Full-text available
Mobile devices such as smartphones and tablets are widely used to perform security critical and privacy sensitive activities, such as mobile banking, mobile health care, mobile shopping, etc. Screen locks are used in mobile devices to protect sensitive information. Graphical password and alphanumeric password are two common types of screen locking...
Poster
Full-text available
In today’s world, Cloud-computing services such as infrastructure, platform, and software have become popular among different industries because of location independency, pay-per-use feature, scalability, and flexibility. On the other hand, e-health systems are costly, fragmented and rapidly growing. As a result, Cloud technology can be used to enh...
Article
Full-text available
Q&A social media have gained a lot of attention during the recent years. People rely on these sites to obtain information due to a number of advantages they offer as compared to conventional sources of knowledge (e.g., asynchronous and convenient access). However, for the same question one may find highly contradicting answers, causing an ambiguit...