Skip to main content

Showing 1–45 of 45 results for author: Ferdous, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.09866  [pdf, ps, other

    cs.SI

    ELRUHNA: Elimination Rule-basedHypergraph Alignment

    Authors: Cameron Ibrahim, S M Ferdous, Ilya Safro, Marco Minutoli, Mahantesh Halappanavar

    Abstract: Hypergraph alignment is a well-known NP-hard problem with numerous practical applications across domains such as bioinformatics, social network analysis, and computer vision. Despite its computational complexity, practical and scalable solutions are urgently needed to enable pattern discovery and entity correspondence in high-order relational data. The problem remains understudied in contrast to i… ▽ More

    Submitted 11 June, 2025; originally announced June 2025.

  2. arXiv:2503.23713  [pdf, other

    cs.SI cs.AI

    GNN-Based Candidate Node Predictor for Influence Maximization in Temporal Graphs

    Authors: Priyanka Gautam, Balasubramaniam Natarajan, Sai Munikoti, S M Ferdous, Mahantesh Halappanavar

    Abstract: In an age where information spreads rapidly across social media, effectively identifying influential nodes in dynamic networks is critical. Traditional influence maximization strategies often fail to keep up with rapidly evolving relationships and structures, leading to missed opportunities and inefficiencies. To address this, we propose a novel learning-based approach integrating Graph Neural Net… ▽ More

    Submitted 31 March, 2025; originally announced March 2025.

    Comments: 9 pages, 5 figures, Accepted in AAAI25 to AI4TS Workshop@AAAI 2025

  3. arXiv:2502.13636  [pdf, other

    cs.DS

    Semi-Streaming Algorithms for Hypergraph Matching

    Authors: Henrik Reinstädtler, S M Ferdous, Alex Pothen, Bora Uçar, Christian Schulz

    Abstract: We propose two one-pass streaming algorithms for the NP-hard hypergraph matching problem. The first algorithm stores a small subset of potential matching edges in a stack using dual variables to select edges. It has an approximation guarantee of $\frac{1}{d(1+\varepsilon)}$ and requires $O((n/\varepsilon) \log^2{n})$ bits of memory. The second algorithm computes, stores, and updates a single mat… ▽ More

    Submitted 19 February, 2025; originally announced February 2025.

  4. arXiv:2502.10208  [pdf, other

    cs.LG

    SGS-GNN: A Supervised Graph Sparsification method for Graph Neural Networks

    Authors: Siddhartha Shankar Das, Naheed Anjum Arafat, Muftiqur Rahman, S M Ferdous, Alex Pothen, Mahantesh M Halappanavar

    Abstract: We propose SGS-GNN, a novel supervised graph sparsifier that learns the sampling probability distribution of edges and samples sparse subgraphs of a user-specified size to reduce the computational costs required by GNNs for inference tasks on large graphs. SGS-GNN employs regularizers in the loss function to enhance homophily in sparse subgraphs, boosting the accuracy of GNNs on heterophilic graph… ▽ More

    Submitted 14 February, 2025; originally announced February 2025.

  5. arXiv:2502.05273  [pdf, other

    cs.LG

    Principles and Components of Federated Learning Architectures

    Authors: MD Abdullah Al Nasim, Fatema Tuj Johura Soshi, Parag Biswas, A. S. M Anas Ferdous, Abdur Rashid, Angona Biswas, Kishor Datta Gupta

    Abstract: Federated Learning (FL) is a machine learning framework where multiple clients, from mobiles to enterprises, collaboratively construct a model under the orchestration of a central server but still retain the decentralized nature of the training data. This decentralized training of models offers numerous advantages, including cost savings, enhanced privacy, improved security, and compliance with le… ▽ More

    Submitted 20 April, 2025; v1 submitted 7 February, 2025; originally announced February 2025.

  6. arXiv:2501.14143  [pdf, other

    cs.LG cs.CY

    An Extensive and Methodical Review of Smart Grids for Sustainable Energy Management-Addressing Challenges with AI, Renewable Energy Integration and Leading-edge Technologies

    Authors: Parag Biswas, Abdur Rashid, abdullah al masum, MD Abdullah Al Nasim, A. S. M Anas Ferdous, Kishor Datta Gupta, Angona Biswas

    Abstract: Energy management decreases energy expenditures and consumption while simultaneously increasing energy efficiency, reducing carbon emissions, and enhancing operational performance. Smart grids are a type of sophisticated energy infrastructure that increase the generation and distribution of electricity's sustainability, dependability, and efficiency by utilizing digital communication technologies.… ▽ More

    Submitted 23 January, 2025; originally announced January 2025.

  7. arXiv:2410.17139  [pdf, other

    cs.AI

    Trustworthy XAI and Application

    Authors: MD Abdullah Al Nasim, A. S. M Anas Ferdous, Abdur Rashid, Fatema Tuj Johura Soshi, Parag Biswas, Angona Biswas, Kishor Datta Gupta

    Abstract: Artificial Intelligence (AI) is an important part of our everyday lives. We use it in self-driving cars and smartphone assistants. People often call it a "black box" because its complex systems, especially deep neural networks, are hard to understand. This complexity raises concerns about accountability, bias, and fairness, even though AI can be quite accurate. Explainable Artificial Intelligence… ▽ More

    Submitted 16 April, 2025; v1 submitted 22 October, 2024; originally announced October 2024.

  8. arXiv:2409.10109  [pdf, other

    cs.CR cs.ET

    Analysing Attacks on Blockchain Systems in a Layer-based Approach

    Authors: Joydip Das, Syed Ashraf Al Tasin, Md. Forhad Rabbi, Md Sadek Ferdous

    Abstract: Blockchain is a growing decentralized system built for transparency and immutability. There have been several major attacks on blockchain-based systems, leaving a gap in the trustability of this system. This article presents a comprehensive study of 23 attacks on blockchain systems and categorizes them using a layer-based approach. This approach provides an in-depth analysis of the feasibility and… ▽ More

    Submitted 16 September, 2024; originally announced September 2024.

  9. arXiv:2408.17184  [pdf, other

    cs.CR cs.ET

    Secure Ownership Management and Transfer of Consumer Internet of Things Devices with Self-sovereign Identity

    Authors: Nazmus Sakib, Md Yeasin Ali, Nuran Mubashshira Momo, Marzia Islam Mumu, Masum Al Nahid, Fairuz Rahaman Chowdhury, Md Sadek Ferdous

    Abstract: The popularity of the Internet of Things (IoT) has driven its usage in our homes and industries over the past 10-12 years. However, there have been some major issues related to identity management and ownership transfer involving IoT devices, particularly for consumer IoT devices, e. g. smart appliances such as smart TVs, smart refrigerators, and so on. There have been a few attempts to address th… ▽ More

    Submitted 30 August, 2024; originally announced August 2024.

  10. arXiv:2408.11664  [pdf, other

    cs.ET

    A Systematic Literature Review on the Use of Blockchain Technology in Transition to a Circular Economy

    Authors: Ishmam Abid, S. M. Zuhayer Anzum Fuad, Mohammad Jabed Morshed Chowdhury, Mehruba Sharmin Chowdhury, Md Sadek Ferdous

    Abstract: The circular economy has the potential to increase resource efficiency and minimize waste through the 4R framework of reducing, reusing, recycling, and recovering. Blockchain technology is currently considered a valuable aid in the transition to a circular economy. Its decentralized and tamper-resistant nature enables the construction of transparent and secure supply chain management systems, ther… ▽ More

    Submitted 21 August, 2024; originally announced August 2024.

  11. arXiv:2408.10982  [pdf, other

    cs.DC

    GreediRIS: Scalable Influence Maximization using Distributed Streaming Maximum Cover

    Authors: Reet Barik, Wade Cappa, S M Ferdous, Marco Minutoli, Mahantesh Halappanavar, Ananth Kalyanaraman

    Abstract: Influence maximization--the problem of identifying a subset of k influential seeds (vertices) in a network--is a classical problem in network science with numerous applications. The problem is NP-hard, but there exist efficient polynomial time approximations. However, scaling these algorithms still remain a daunting task due to the complexities associated with steps involving stochastic sampling a… ▽ More

    Submitted 20 August, 2024; originally announced August 2024.

  12. arXiv:2405.15218  [pdf, other

    cs.LG

    AGS-GNN: Attribute-guided Sampling for Graph Neural Networks

    Authors: Siddhartha Shankar Das, S M Ferdous, Mahantesh M Halappanavar, Edoardo Serra, Alex Pothen

    Abstract: We propose AGS-GNN, a novel attribute-guided sampling algorithm for Graph Neural Networks (GNNs) that exploits node features and connectivity structure of a graph while simultaneously adapting for both homophily and heterophily in graphs. (In homophilic graphs vertices of the same class are more likely to be connected, and vertices of different classes tend to be linked in heterophilic graphs.) Wh… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

    Comments: The paper has been accepted to KDD'24 in the research track

  13. arXiv:2404.00107  [pdf

    cs.CV cs.AI

    Robust Ensemble Person Re-Identification via Orthogonal Fusion with Occlusion Handling

    Authors: Syeda Nyma Ferdous, Xin Li

    Abstract: Occlusion remains one of the major challenges in person reidentification (ReID) as a result of the diversity of poses and the variation of appearances. Developing novel architectures to improve the robustness of occlusion-aware person Re-ID requires new insights, especially on low-resolution edge cameras. We propose a deep ensemble model that harnesses both CNN and Transformer architectures to gen… ▽ More

    Submitted 29 March, 2024; originally announced April 2024.

  14. arXiv:2403.11811  [pdf

    cs.CG cs.GT

    A Simple 2-Approximation Algorithm For Minimum Manhattan Network Problem

    Authors: Md. Musfiqur Rahman Sanim, Safrunnesa Saira, Fatin Faiaz Ahsan, Rajon Bardhan, S. M. Ferdous

    Abstract: Given a n points in two dimensional space, a Manhattan Network G is a network that connects all n points with either horizontal or vertical edges, with the property that for any two point in G should be connected by a Manhattan path and distance between this two points is equal to Manhattan Distance. The Minimum Manhattan Network problem is to find a Manhattan network with minimum network length,… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

    Comments: ARSSS International Conference, Dhaka, Bangladesh

  15. arXiv:2403.10332  [pdf, other

    cs.DC cs.DS cs.LG

    GreedyML: A Parallel Algorithm for Maximizing Constrained Submodular Functions

    Authors: Shivaram Gopal, S M Ferdous, Hemanta K. Maji, Alex Pothen

    Abstract: We describe a parallel approximation algorithm for maximizing monotone submodular functions subject to hereditary constraints on distributed memory multiprocessors. Our work is motivated by the need to solve submodular optimization problems on massive data sets, for practical contexts such as data summarization, machine learning, and graph sparsification. Our work builds on the randomized distri… ▽ More

    Submitted 15 February, 2025; v1 submitted 15 March, 2024; originally announced March 2024.

  16. arXiv:2403.05781  [pdf, other

    cs.DS

    Approximate Bipartite $b$-Matching using Multiplicative Auction

    Authors: Bhargav Samineni, S M Ferdous, Mahantesh Halappanavar, Bala Krishnamoorthy

    Abstract: Given a bipartite graph $G(V= (A \cup B),E)$ with $n$ vertices and $m$ edges and a function $b \colon V \to \mathbb{Z}_+$, a $b$-matching is a subset of edges such that every vertex $v \in V$ is incident to at most $b(v)$ edges in the subset. When we are also given edge weights, the Max Weight $b$-Matching problem is to find a $b$-matching of maximum weight, which is a fundamental combinatorial op… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

    Comments: 14 pages; Accepted as a refereed paper in the 2024 INFORMS Optimization Society conference

  17. arXiv:2401.06713  [pdf, other

    cs.DC

    Picasso: Memory-Efficient Graph Coloring Using Palettes With Applications in Quantum Computing

    Authors: S M Ferdous, Reece Neff, Bo Peng, Salman Shuvo, Marco Minutoli, Sayak Mukherjee, Karol Kowalski, Michela Becchi, Mahantesh Halappanavar

    Abstract: A coloring of a graph is an assignment of colors to vertices such that no two neighboring vertices have the same color. The need for memory-efficient coloring algorithms is motivated by their application in computing clique partitions of graphs arising in quantum computations where the objective is to map a large set of Pauli strings into a compact set of unitaries. We present Picasso, a randomize… ▽ More

    Submitted 12 February, 2024; v1 submitted 12 January, 2024; originally announced January 2024.

    Comments: Accepted by IPDPS 2024

  18. arXiv:2311.02073  [pdf, other

    cs.DS

    Semi-Streaming Algorithms for Weighted $k$-Disjoint Matchings

    Authors: S M Ferdous, Bhargav Samineni, Alex Pothen, Mahantesh Halappanavar, Bala Krishnamoorthy

    Abstract: We design and implement two single-pass semi-streaming algorithms for the maximum weight $k$-disjoint matching ($k$-DM) problem. Given an integer $k$, the $k$-DM problem is to find $k$ pairwise edge-disjoint matchings such that the sum of the weights of the matchings is maximized. For $k \geq 2$, this problem is NP-hard. Our first algorithm is based on the primal-dual framework of a linear program… ▽ More

    Submitted 5 July, 2024; v1 submitted 3 November, 2023; originally announced November 2023.

    Comments: 24 pages, To appear in ESA 2024

  19. arXiv:2309.04899  [pdf

    cs.CR

    Transient Attacks against the VMG-KLJN Secure Key Exchanger

    Authors: Shahriar Ferdous, Laszlo B. Kish

    Abstract: The security vulnerability of the Vadai, Mingesz, and Gingl (VMG) Kirchhoff-Law-Johnson-Noise (KLJN) key exchanger, as presented in the publication "Nature, Science Report 5 (2015) 13653," has been exposed to transient attacks. Recently an effective defense protocol was introduced (Appl. Phys. Lett. 122 (2023) 143503) to counteract mean-square voltage-based (or mean-square current-based) transient… ▽ More

    Submitted 29 September, 2023; v1 submitted 9 September, 2023; originally announced September 2023.

  20. Managing health insurance using blockchain technology

    Authors: Tajkia Nuri Ananna, Munshi Saifuzzaman, Mohammad Jabed Morshed Chowdhury, Md Sadek Ferdous

    Abstract: Health insurance plays a significant role in ensuring quality healthcare. In response to the escalating costs of the medical industry, the demand for health insurance is soaring. Additionally, those with health insurance are more likely to receive preventative care than those without health insurance. However, from granting health insurance to delivering services to insured individuals, the health… ▽ More

    Submitted 17 June, 2023; originally announced June 2023.

    Comments: 37 pages, 2 figures, 12 tables

    Journal ref: Healthcare Technologies, Chap. 4, pp. 89-125

  21. arXiv:2305.00315  [pdf, other

    cs.CR

    Decentralised Identity Federations using Blockchain

    Authors: Mirza Kamrul Bashar Shuhan, Syed Md. Hasnayeen, Tanmoy Krishna Das, Md. Nazmus Sakib, Md Sadek Ferdous

    Abstract: Federated Identity Management has proven its worth by offering economic benefits and convenience to Service Providers and users alike. In such federations, the Identity Provider (IdP) is the solitary entity responsible for managing user credentials and generating assertions for the users, who are requesting access to a service provider's resource. This makes the IdP centralised and exhibits a sing… ▽ More

    Submitted 29 April, 2023; originally announced May 2023.

  22. arXiv:2302.05607  [pdf

    cs.CR

    Transient Attack against the KLJN Secure Key Exchanger

    Authors: Shahriar Ferdous, Laszlo B. Kish

    Abstract: We demonstrate the security vulnerability of the ideal Kirchhoff-Law-Johnson-Noise (KLJN) key exchanger against transient attacks. Transients start when Alice and Bob connect the wire to their chosen resistor at the beginning of each clock cycle. A transient attack takes place during a short duration of time, before the transients reflected from the end of Alice and Bob mix together. The informati… ▽ More

    Submitted 11 February, 2023; originally announced February 2023.

  23. arXiv:2302.00828  [pdf

    cs.AI cs.LG

    Analysis of Biomass Sustainability Indicators from a Machine Learning Perspective

    Authors: Syeda Nyma Ferdous, Xin Li, Kamalakanta Sahoo, Richard Bergman

    Abstract: Plant biomass estimation is critical due to the variability of different environmental factors and crop management practices associated with it. The assessment is largely impacted by the accurate prediction of different environmental sustainability indicators. A robust model to predict sustainability indicators is a must for the biomass community. This study proposes a robust model for biomass sus… ▽ More

    Submitted 1 February, 2023; originally announced February 2023.

  24. arXiv:2210.05121  [pdf

    cs.CR

    Current injection and voltage insertion attacks against the VMG-KLJN secure key exchanger

    Authors: Shahriar Ferdous, Christiana Chamon, Laszlo B. Kish

    Abstract: In this paper, the vulnerability of the Vadai, Mingesz and Gingl (VMG)- Kirchhoff-Law-Johnson-Noise (KLJN) Key Exchanger (Nature, Science Report 5 (2015) 13653) against two active attacks is demonstrated. The security vulnerability arises from the fact that the effective driving impedances are different between the HL and LH cases for the VMG-KLJN scheme; whereas for the ideal KLJN scheme they are… ▽ More

    Submitted 13 November, 2022; v1 submitted 10 October, 2022; originally announced October 2022.

  25. arXiv:2209.08686  [pdf, other

    cs.CV

    Uncertainty Aware Multitask Pyramid Vision Transformer For UAV-Based Object Re-Identification

    Authors: Syeda Nyma Ferdous, Xin Li, Siwei Lyu

    Abstract: Object Re-IDentification (ReID), one of the most significant problems in biometrics and surveillance systems, has been extensively studied by image processing and computer vision communities in the past decades. Learning a robust and discriminative feature representation is a crucial challenge for object ReID. The problem is even more challenging in ReID based on Unmanned Aerial Vehicle (UAV) as t… ▽ More

    Submitted 18 September, 2022; originally announced September 2022.

  26. arXiv:2202.05629  [pdf, other

    cs.CR cs.PF

    BlockMeter: An Application Agnostic Performance Measurement Framework For Private Blockchain Platforms

    Authors: Ifteher Alom, Md Sadek Ferdous, Mohammad Jabed Morshed Chowdhury

    Abstract: Blockchain Technology is an emerging technology with the potential to disrupt a number of application domains. Though blockchain platforms like Bitcoin and Ethereum have seen immense success and acceptability, their nature of being public and anonymous make them unsuitable for many enterprise level use-cases. To address this issue, Linux Foundation has started an open source umbrella initiative, k… ▽ More

    Submitted 11 February, 2022; originally announced February 2022.

  27. arXiv:2110.03088  [pdf

    cs.CR

    Statistical Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol

    Authors: Christiana Chamon, Shahriar Ferdous, Laszlo B. Kish

    Abstract: This paper introduces and demonstrates four new statistical attacks against the Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange scheme. The attacks utilize compromised random number generators at Alice's/Bob's site(s). The case of partial correlations between Alice's/Bob's and Eve's probing noises is explored, that is, Eve's knowledge of Alice's and Bob's noises is limited but not zero. We… ▽ More

    Submitted 6 October, 2021; originally announced October 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:2005.10429, arXiv:2012.02848

  28. arXiv:2109.10213  [pdf, other

    cs.CR cs.CY

    Blockchain-based Covid Vaccination Registration and Monitoring

    Authors: Shirajus Salekin Nabil, Md. Sabbir Alam Pran, Ali Abrar Al Haque, Narayan Ranjan Chakraborty, Mohammad Jabed Morshed Chowdhury, Md Sadek Ferdous

    Abstract: Covid-19 (SARS-CoV-2) has changed almost all the aspects of our living. Governments around the world have imposed lockdown to slow down the transmissions. In the meantime, researchers worked hard to find the vaccine. Fortunately, we have found the vaccine, in fact a good number of them. However, managing the testing and vaccination process of the total population is a mammoth job. There are multip… ▽ More

    Submitted 20 September, 2021; originally announced September 2021.

    Comments: 12 pages

  29. arXiv:2109.07334  [pdf, other

    cs.CR cs.CY

    A Systematic Literature Review on Wearable Health Data Publishing under Differential Privacy

    Authors: Munshi Saifuzzaman, Tajkia Nuri Ananna, Mohammad Jabed Morshed Chowdhury, Md Sadek Ferdous, Farida Chowdhury

    Abstract: Wearable devices generate different types of physiological data about the individuals. These data can provide valuable insights for medical researchers and clinicians that cannot be availed through traditional measures. Researchers have historically relied on survey responses or observed behavior. Interestingly, physiological data can provide a richer amount of user cognition than that obtained fr… ▽ More

    Submitted 15 September, 2021; originally announced September 2021.

    Comments: 25 pages

  30. arXiv:2107.05793  [pdf, other

    cs.DS cs.DC

    A Parallel Approximation Algorithm for Maximizing Submodular $b$-Matching

    Authors: S M Ferdous, Alex Pothen, Arif Khan, Ajay Panyala, Mahantesh Halappanavar

    Abstract: We design new serial and parallel approximation algorithms for computing a maximum weight $b$-matching in an edge-weighted graph with a submodular objective function. This problem is NP-hard; the new algorithms have approximation ratio $1/3$, and are relaxations of the Greedy algorithm that rely only on local information in the graph, making them parallelizable. We have designed and implemented Lo… ▽ More

    Submitted 12 July, 2021; originally announced July 2021.

    Comments: 10 pages, accepted for SIAM ACDA 21

  31. arXiv:2012.07183  [pdf, other

    cs.LG cs.DC

    Privacy-preserving Decentralized Aggregation for Federated Learning

    Authors: Beomyeol Jeon, S. M. Ferdous, Muntasir Raihan Rahman, Anwar Walid

    Abstract: Federated learning is a promising framework for learning over decentralized data spanning multiple regions. This approach avoids expensive central training data aggregation cost and can improve privacy because distributed sites do not have to reveal privacy-sensitive data. In this paper, we develop a privacy-preserving decentralized aggregation protocol for federated learning. We formulate the dis… ▽ More

    Submitted 28 December, 2020; v1 submitted 13 December, 2020; originally announced December 2020.

    Comments: 10 pages, 6 figures

  32. arXiv:2012.05959  [pdf, other

    cs.CV cs.NE

    Super-resolution Guided Pore Detection for Fingerprint Recognition

    Authors: Syeda Nyma Ferdous, Ali Dabouei, Jeremy Dawson, Nasser M Nasrabadi

    Abstract: Performance of fingerprint recognition algorithms substantially rely on fine features extracted from fingerprints. Apart from minutiae and ridge patterns, pore features have proven to be usable for fingerprint recognition. Although features from minutiae and ridge patterns are quite attainable from low-resolution images, using pore features is practical only if the fingerprint image is of high res… ▽ More

    Submitted 10 December, 2020; originally announced December 2020.

    Report number: SR:NEW01

    Journal ref: ICPR: International Conference on Pattern Recognition 2021

  33. Deterministic Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol

    Authors: Christiana Chamon, Shahriar Ferdous, Laszlo Kish

    Abstract: This paper demonstrates the vulnerability of the Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchanger to compromised random number generator(s) even if these random numbers are used solely to generate the noises emulating the Johnson noise of Alice's and Bob's resistors. The attacks shown are deterministic in the sense that Eve's knowledge of Alice's and/or Bob's random numbers is basically det… ▽ More

    Submitted 8 December, 2020; v1 submitted 4 December, 2020; originally announced December 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:2005.10429

  34. arXiv:2012.02644  [pdf, other

    cs.CR

    A Survey on Blockchain & Cloud Integration

    Authors: Soumik Sarker, Arnob Kumar Saha, Md Sadek Ferdous

    Abstract: Blockchain is one of the emerging technologies with the potential to disrupt many application domains. Cloud is an on-demand service paradigm facilitating the availability of shared resources for data storage and computation. In recent years, the integration of blockchain and cloud has received significant attention for ensuring efficiency, transparency, security and even for offering better cloud… ▽ More

    Submitted 4 December, 2020; originally announced December 2020.

    Comments: Accepted for publication in the 23rd International Conference on Computer and Information Technology (ICCIT), 2020

  35. arXiv:2012.01765  [pdf, other

    cs.CR

    A Study of Password Security Factors among Bangladeshi Government Websites

    Authors: Adil Ahmed Chowdhury, Farida Chowdhury, Md Sadek Ferdous

    Abstract: The Government of Bangladesh is aggressively transforming its public service landscape by transforming public services into online services via a number of websites. The motivation is that this would be a catalyst for a transformative change in every aspect of citizen life. Some web services must be protected from any unauthorised usages and passwords remain the most widely used credential mechani… ▽ More

    Submitted 3 December, 2020; originally announced December 2020.

    Comments: Accepted for publication in the 23rd International Conference on Computer and Information Technology (ICCIT), 19-21 December, 2020

  36. arXiv:2011.08846  [pdf, other

    cs.CR

    BONIK: A Blockchain Empowered Chatbot for Financial Transactions

    Authors: Md. Saiful Islam Bhuiyan, Abdur Razzak, Md Sadek Ferdous, Mohammad Jabed M. Chowdhury, Mohammad A. Hoque, Sasu Tarkoma

    Abstract: A Chatbot is a popular platform to enable users to interact with a software or website to gather information or execute actions in an automated fashion. In recent years, chatbots are being used for executing financial transactions, however, there are a number of security issues, such as secure authentication, data integrity, system availability and transparency, that must be carefully handled for… ▽ More

    Submitted 17 November, 2020; originally announced November 2020.

    Comments: Accepted at the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020)

  37. Modelling Attacks in Blockchain Systems using Petri Nets

    Authors: Md. Atik Shahriar, Faisal Haque Bappy, A. K. M. Fakhrul Hossain, Dayamoy Datta Saikat, Md Sadek Ferdous, Mohammad Jabed M. Chowdhury, Md Zakirul Alam Bhuiyan

    Abstract: Blockchain technology has evolved through many changes and modifications, such as smart-contracts since its inception in 2008. The popularity of a blockchain system is due to the fact that it offers a significant security advantage over other traditional systems. However, there have been many attacks in various blockchain systems, exploiting different vulnerabilities and bugs, which caused a signi… ▽ More

    Submitted 14 November, 2020; originally announced November 2020.

    Comments: Accepted for publication at the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2020)

  38. Comments on the "Generalized" KLJN Key Exchanger with Arbitrary Resistors: Power, Impedance, Security

    Authors: Shahriar Ferdous, Christiana Chamon, Laszlo B. Kish

    Abstract: In (Nature) Science Report 5 (2015) 13653, Vadai, Mingesz and Gingl (VMG) introduce a new Kirchhoff-law-Johnson-noise (KLJN) secure key exchanger that operates with 4 arbitrary resistors (instead of 2 arbitrary resistance values forming 2 identical resistor pairs in the original system). They state that in this new, VMG-KLJN, non-equilibrium system with nonzero power flow, the security during the… ▽ More

    Submitted 8 October, 2020; originally announced October 2020.

    Journal ref: Fluctuation and Noise Letter 20 (2021) 2130002 , (open access)

  39. AC Loop Current Attacks Against The KLJN Secure Key Exchange Scheme

    Authors: Mutaz Melhem, Christiana Chamon, Shahriar Ferdous, Laszlo B. Kish

    Abstract: A new attack against the Kirchhoff-Law-Johnson-Noise(KLJN) secure key exchange scheme is introduced. The attack exploits a parasitic (periodic) AC voltage-source at either Alice or Bob ends. Such situations exist due to AC ground loops and electromagnetic interference (EMI). In the low-frequency case, the procedure is the generalized form of the former DC ground loop based attack. In the high-freq… ▽ More

    Submitted 22 May, 2020; originally announced May 2020.

    Comments: 17 pages, 6 figures

  40. arXiv:2005.10429  [pdf, other

    cs.CR eess.SY

    Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol

    Authors: Christiana Chamon, Shahriar Ferdous, Laszlo B. Kish

    Abstract: This paper introduces and demonstrates two new attacks against the Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange scheme. The attacks are based on random number generators with compromised security. First we explore the situation in which Eve knows the seed of both Alice's and Bob's random number generators. We show that in this situation Eve can crack the secure key bit within a fraction… ▽ More

    Submitted 20 May, 2020; originally announced May 2020.

    Comments: 14 pages, 11 figures

  41. arXiv:2005.00983  [pdf, other

    cs.CV

    Joint-SRVDNet: Joint Super Resolution and Vehicle Detection Network

    Authors: Moktari Mostofa, Syeda Nyma Ferdous, Benjamin S. Riggan, Nasser M. Nasrabadi

    Abstract: In many domestic and military applications, aerial vehicle detection and super-resolutionalgorithms are frequently developed and applied independently. However, aerial vehicle detection on super-resolved images remains a challenging task due to the lack of discriminative information in the super-resolved images. To address this problem, we propose a Joint Super-Resolution and Vehicle DetectionNetw… ▽ More

    Submitted 3 May, 2020; originally announced May 2020.

  42. arXiv:2001.07091  [pdf, other

    cs.DC

    Blockchain Consensus Algorithms: A Survey

    Authors: Md Sadek Ferdous, Mohammad Jabed Morshed Chowdhury, Mohammad A. Hoque, Alan Colman

    Abstract: In recent years, blockchain technology has received unparalleled attention from academia, industry, and governments all around the world. It is considered a technological breakthrough anticipated to disrupt several application domains. This has resulted in a plethora of blockchain systems for various purposes. However, many of these blockchain systems suffer from serious shortcomings related to th… ▽ More

    Submitted 7 February, 2020; v1 submitted 20 January, 2020; originally announced January 2020.

  43. arXiv:1810.08598  [pdf, other

    cs.CR

    Immutable Autobiography of Smart Cars

    Authors: Md Sadek Ferdous, Mohammad Jabed Morshed Chowdhury, Kamanashis Biswas, Niaz Chowdhury

    Abstract: The popularity of smart cars is increasing around the world as they offer a wide range of services and conveniences.These smart cars are equipped with a variety of sensors generating a large amount of data, many of which are sensitive. Besides, there are multiple parties involved in a lifespan of a smart car ,such as manufacturers, car owners, government agencies, and third-party service providers… ▽ More

    Submitted 19 October, 2018; originally announced October 2018.

    Comments: To be presented at the 3rd Symposium on Distributed Ledger Technology

  44. arXiv:1405.6081  [pdf, other

    cs.DM math.CO math.OC

    An Integer Programming Formulation of the Minimum Common String Partition problem

    Authors: S. M. Ferdous, M. Sohel Rahman

    Abstract: We consider the problem of finding a minimum common partition of two strings (MCSP). The problem has its application in genome comparison. MCSP problem is proved to be NP-hard. In this paper, we develop an Integer Programming (IP) formulation for the problem and implement it. The experimental results are compared with the previous state-of-the-art algorithms and are found to be promising.

    Submitted 23 May, 2014; originally announced May 2014.

    Comments: arXiv admin note: text overlap with arXiv:1401.4539

  45. arXiv:1401.4539  [pdf, other

    cs.AI

    Solving the Minimum Common String Partition Problem with the Help of Ants

    Authors: S. M. Ferdous, M. Sohel Rahman

    Abstract: In this paper, we consider the problem of finding a minimum common partition of two strings. The problem has its application in genome comparison. As it is an NP-hard, discrete combinatorial optimization problem, we employ a metaheuristic technique, namely, MAX-MIN ant system to solve this problem. To achieve better efficiency we first map the problem instance into a special kind of graph. Subsequ… ▽ More

    Submitted 21 May, 2014; v1 submitted 18 January, 2014; originally announced January 2014.