Md Zakirul Alam Bhuiyan’s research while affiliated with Fordham University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (184)


An example of multiple entities and relations in social networks
a Meta schema and b meta structures (meta-paths and meta-graphs)
The overall architecture of GNNRI
Classifications accuracy under different user categories
Accuracy and epoch

+4

GNNRI: detecting anomalous social network users through heterogeneous information networks and user relevance exploration
  • Article
  • Publisher preview available

September 2024

·

15 Reads

International Journal of Machine Learning and Cybernetics

·

Xinyue Sun

·

Renyu Yang

·

[...]

·

Detecting anomalous users in social networks is an imperative but challenging task. The increasing complexity of inter-personal behaviors and interactions further complicates the development of effective user anomaly detection techniques. Current state-of-the-art methods heavily rely on static personal features, making it difficult to quantify the hidden relevance of user behaviors through traditional feature engineering. This loss of accuracy is exacerbated by the rise of sophisticated camouflage and disguising techniques, which blur the distinction between anomalous and regular users. In this paper, we present GNNRI, an innovative framework for detecting anomalous users in social networks. Our approach leverages a network representation learning model and a heterogeneous information network (Hin) to explore hidden semantic connections from user metadata, tweets, and interaction information. We extract both user metadata and behavioral features to construct a Hin and introduce two distinct learning layers to explore explicit and implicit user relevance. First, we employ a relation-based self-attention layer to aggregate neighbor node closeness under specific relations and across different relationships. Subsequently, we apply graph convolution network-based convolutional learning layers, which enhance embedding effectiveness by capturing graph-wide node similarity. We evaluate GNNRI using real-world datasets, and our results demonstrate that it outperforms all other comparative baselines, achieving approximately 90% accuracy for user classification, with a 5–15% improvement over other GNN variants. Notably, even when using only 20% of the data for training, GNNRI achieves 87.8%, 86.57%, and 87.1% accuracy for detecting zombies, spammers, and bots, respectively.

View access options


A Data Consistency Insurance Method for Smart Contract

October 2023

·

38 Reads

·

1 Citation

As one of the major threats to the current DeFi (Decentralized Finance) ecosystem, reentrant attack induces data inconsistency of the victim smart contract, enabling attackers to steal on-chain assets from DeFi projects, which could terribly do harm to the confidence of the blockchain investors. However, protecting DeFi projects from the reentrant attack is very difficult, since generating a call loop within the highly automatic DeFi ecosystem could be very practicable. Existing researchers mainly focus on the detection of the reentrant vulnerabilities in the code testing, and no method could promise the non-existent of reentrant vulnerabilities. In this paper, we introduce the database lock mechanism to isolate the correlated smart contract states from other operations in the same contract, so that we can prevent the attackers from abusing the inconsistent smart contract state. Compared to the existing resolutions of front-running, code audit, and modifier, our method guarantees protection results with better flexibility. And we further evaluate our method on a number of de facto reentrant attacks observed from Etherscan. The results prove that our method could efficiently prevent the reentrant attack with less running cost.



Robust and Privacy-Preserving Decentralized Deep Federated Learning Training: Focusing on Digital Healthcare Applications

March 2023

·

56 Reads

·

59 Citations

IEEE/ACM Transactions on Computational Biology and Bioinformatics

Federated learning of deep neural networks has emerged as an evolving paradigm for distributed machine learning, gaining widespread attention due to its ability to update parameters without collecting raw data from users, especially in digital healthcare applications. However, the traditional centralized architecture of federated learning suffers from several problems (e.g., single point of failure, communication bottlenecks, etc.), especially malicious servers inferring gradients and causing gradient leakage. To tackle the above issues, we propose a robust and privacy-preserving decentralized deep federated learning (RPDFL) training scheme. Specifically, we design a novel ring FL structure and a Ring-Allreduce-based data sharing scheme to improve the communication efficiency in RPDFL training. Furthermore, we improve the process of distributing parameters of the Chinese residual theorem to update the execution process of the threshold secret sharing, supporting healthcare edge to drop out during the training process without causing data leakage, and ensuring the robustness of the RPDFL training under the Ring-Allreduce-based data sharing scheme. Security analysis indicates that RPDFL is provable secure. Experiment results show that RPDFL is significantly superior to standard FL methods in terms of model accuracy and convergence, and is suitable for digital healthcare applications.


Guest Editorial: Trustworthiness of AI/ML/DL Approaches in Industrial Internet of Things and Applications

January 2023

·

13 Reads

·

2 Citations

IEEE Transactions on Industrial Informatics

The papers in this special section focus on the trustworthiness of artificial intelligence/machine learning models/deep learning models (AI/ML/DL) as it applies to the Industrial Internet of Things (IIot). This includes automated environments, such as smart factories, smart airports, and smart healthcare systems. AI approaches enable automation and data analytic across industrial technologies, including the IIoT, cloud and edge, and fog computing paradigms. Current ML models, such as DL still suffer from designing a generalized trustworthy architecture that reveals semantics and contexts of models and attacks threat surface. The papers in this section were inspired by the convincing challenges and necessities described above and attempt to compile research results that essentially adopts them.



Artificial intelligence driven Wi‐Fi CSI data mining: Focusing on the intrusion detection applications

September 2022

·

176 Reads

·

6 Citations

International Journal of Communication Systems

In the past several years, a series of breakthrough research advancements have been achieved by leveraging wireless signals such as Wi‐Fi in various emerging applications, including healthcare, behavior recognition, positioning, and target detection. Compared to traditional human behavior sensing methods, Wi‐Fi signals human behavior sensing technology has many advantages, including non‐line‐of‐sight, sensor device‐free sensing, passive sensing, ease of deployment, and no need for lights. Data mining undoubtedly plays a critical role in making Wi‐Fi‐based human behavior detection intelligent enough to facilitate convenient services and environments. We study Wi‐Fi signals mining using the data mining process and review the developmental process of Wi‐Fi data mining. This covers the methods of Wi‐Fi data mining, including signal acquisition, preprocessing, feature extraction to training, and classification. We then propose WHSecurity, a whole home intrusion detection and tracking system that is based on all of the methods covered above. Finally, WHSecurity includes a deep learning‐based data mining process called multiview learning for the decision‐making on intrusion detection and tracking. Experimental outcomes show that the WHSecurity approach performs superior in terms of intrusion detection and tracking performance.


Unauthorized and privacy‐intrusive human activity watching through Wi‐Fi signals: An emerging cybersecurity threat

September 2022

·

37 Reads

·

1 Citation

Concurrency and Computation: Practice and Experience

Nowadays, wireless radio signals are ubiquitous and are around us; some signals pass through us, and some reflect off us. Substantial advancements in recent years demonstrate that such signals are utilized for diverse emerging applications, including people activity, motion watches, healthcare, and so forth. A few questions would be that may raise severe concerns in future cybersecurity and private domains. For example, what if Wi‐Fi signals are utilized to watch a person doings and actions, which are mostly without the person's authorization and authentication. How far such signal utilization can attack privacy intrusively, silently, more particularly, what/where we do, say, command, see, write, draw, go, perform, everything can be known. In this article, we investigate watching human activities by leveraging Wi‐Fi signals and discuss a few application prototypes. We attempt to learn whether or not attackers have the ability to passively watch our Internet activity as well as physical activities and motions through Wi‐Fi. With all‐new advances, one must be aware that cyberattackers may apply unauthorized use of these advances to their benefit. We discuss some of the countermeasures and approaches to mitigate these risks with Wi‐Fi signal leveraging.


PSDF: Privacy-aware IoV Service Deployment with Federated Learning in Cloud-Edge Computing

August 2022

·

79 Reads

·

40 Citations

ACM Transactions on Intelligent Systems and Technology

Through the collaboration of cloud and edge, cloud-edge computing allows the edge which approximates end-users undertakes those non-computationally intensive service processing of the cloud, reducing the communication overhead and satisfying the low latency requirement of Internet of Vehicle (IoV). With cloud-edge computing, the computing tasks in IoV is able to be delivered to the edge servers (ESs) instead of the cloud and rely on the deployed services of ESs for a series of processing. Due to the storage and computing resource limits of ESs, how to dynamically deploy partial services to the edge is still a puzzle. Moreover, the decision of service deployment often requires the transmission of local service requests from ESs to the cloud, which increases the risk of privacy leakage. In this article, a method for privacy-aware IoV service deployment with federated learning in cloud-edge computing, named PSDF, is proposed. Technically, federated learning secures the distributed training of deployment decision network on each ES by the exchange and aggregation of model weights, avoiding the original data transmission. Meanwhile, homomorphic encryption is adopted for the uploaded weights before the model aggregation on the cloud. Besides, a service deployment scheme based on deep deterministic policy gradient (DDPG) is proposed. Eventually, the performance of PSDF is evaluated by massive experiments.


Citations (81)


... PDP works by dividing the data uploaded to the cloud server into smaller data blocks, then generating homomorphic verification tags, and subsequently verifying the integrity of the cloud data through sampling queries [12,13]. However, PDP is not suitable for e-commerce due to the significant computational resources required to generate the homomorphic verification tags, especially given the large volume of data in e-commerce [14]. To ensure the integrity of the data supporting AI services is not tampered with while reducing the computational overhead of the e-commerce server, we propose PDP with Outsourced Tag Generation (OTGPDP) for AIdriven e-commerce, which outsources the generation of homomorphic verification tags to the cloud server and incorporates a lightweight tag verification method based on Counting Bloom Filter (CBF) to prevent malicious tag generation [15]. ...

Reference:

Provable Data Possession with Outsourced Tag Generation for AI-Driven E-Commerce
Parallel and Batch Multiple Replica Auditing Protocol for Edge Computing
  • Citing Conference Paper
  • December 2023

... Zhao et al. [83] introduce a trust assumption to achieve anonymity; a trusted proxy server mediates communication between clients and model owner. While Zhou et al. [84], in addition to assuming a trusted key generation center, require clients to interact with each other to establish a group key used for authenticating the submitted updates and supports only static settings. Lastly, Chen et al. [23] use a modified version of Tor to preserve anonymity; users authenticate each other and then negotiate symmetric keys to use for encryption. ...

Anonymous Authentication Scheme for Federated Learning
  • Citing Conference Paper
  • May 2023

... As training datasets consist of large amounts of human genomic data, any research organisation must take data security seriously. When publishing research models online, appropriate privacy protocols must be included to protect omics data from the theft of important omics information by related criminals [112,113]. To this end, we call on the industry to form internationalised standards or regulations, and future efforts should aim to fill this knowledge gap and ensure the proper development of AI. ...

Robust and Privacy-Preserving Decentralized Deep Federated Learning Training: Focusing on Digital Healthcare Applications
  • Citing Article
  • March 2023

IEEE/ACM Transactions on Computational Biology and Bioinformatics

... 2. Data quality: IoT data can be noisy and unreliable, which can lead to incorrect predictions and decisions when using AI and ML. 175 Mitigation: Implement data preprocessing and cleansing techniques to improve data quality. 176 Use redundant sensors and data fusion techniques to cross-verify information. ...

Guest Editorial: Trustworthiness of AI/ML/DL Approaches in Industrial Internet of Things and Applications
  • Citing Article
  • January 2023

IEEE Transactions on Industrial Informatics

... A recommender system helps a user to make a buying decision. Well-known e-commerce applications, e.g., Netflix, Amazon, YouTube, etc. use recommender systems to help their users in decision-making [8]to increase their revenue. A recommender system influences the user's decision by presenting the reputation of their products, services, and sellers. ...

Personalised context-aware re-ranking in recommender system

... With the deep integration of IoT, big data technology and smart cities, IoT applications are constantly being born and upgraded, bringing a smarter and more efficient sustainable environment to smart cities [1]. Smart grids, smart transportation, smart healthcare, and other aspects of smart cities have all been impacted by IoT technology, which has led to more dynamic and sophisticated management and an overall improvement in people's quality of life [2][3][4][5]. The increasing variety and number of Internet businesses in the information age, where smart cities are developing at a rapid pace, means that the number of devices connected to the Internet of Things and the amount of data generated are both growing explosively [6,7]. ...

FVP-EOC: Fair, Verifiable and Privacy-Preserving Edge Outsourcing Computing in 5G-enabled IIoT
  • Citing Article
  • January 2022

IEEE Transactions on Industrial Informatics

... Parameter server: The parameter server acts as an aggregator that can aggregate training parameters from edge devices and select high-quality parameters from the aggregated parameters to calculate the security federation sum. On the parameter server, the model training process requires several iterations with the edge device [15][16][17][18]. ...

PSDF: Privacy-aware IoV Service Deployment with Federated Learning in Cloud-Edge Computing
  • Citing Article
  • August 2022

ACM Transactions on Intelligent Systems and Technology

... In [14], the researchers handle the issue of similarity search regarding crowdedness for participatory-sensing buses for urban transportations. Similarity search was generally implemented to measure similarity in heterogeneous information networking systems. ...

OCP: an OLAP-based bus crowdedness smart-perceiving mechanism for urban transportation

... There are many features like URLs, screenshots of a web page, HTML content, etc. that can be used in phishing web page detection. Boyapati et al. [21] in their paper have reviewed all the phishing detection techniques. Visual similarity based methods are quite popular for a while now. ...

Anti-Phishing Approaches in the Era of the Internet of Things
  • Citing Chapter
  • May 2022

... Vehicular sensor networks are integral to intelligent transportation systems, enabling critical applications such as traffic management, autonomous driving, and safety communications [162]. However, the inherent vulnerabilities of these networks-due to their dynamic topology, high mobility, and reliance on wireless communication-make them susceptible to various security threats, including eavesdropping, data tampering, and DoS attacks [163], [164]. To address these challenges and ensure the integrity, privacy, and reliability of VSNs, several advanced security enhancement techniques have been developed. ...

Cooperative Location-Sensing Network Based on Vehicular Communication Security Against Attacks
  • Citing Article
  • January 2022

IEEE Transactions on Intelligent Transportation Systems