no code implementations • 17 Mar 2024 • Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder
To address this challenge, we put forth two strategies for semi-supervised learning based IDS where training samples of attacks are not required: 1) training a supervised machine learning model using randomly and uniformly dispersed synthetic attack samples; 2) building a One Class Classification (OCC) model that is trained exclusively on benign network traffic.
no code implementations • 17 Mar 2024 • Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder
With the increased use of network technologies like Internet of Things (IoT) in many real-world applications, new types of cyberattacks have been emerging.
no code implementations • 17 Mar 2024 • Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder
Within this second tier, we also embed a multi-classification mechanism coupled with a clustering algorithm.
no code implementations • 8 Mar 2024 • Maleka Khatun, Md Manowarul Islam, Habibur Rahman Rifat, Md. Shamim Bin Shahid, Md. Alamin Talukder, Md Ashraf Uddin
This study aims to present a hybrid model that combines a CNN model's feature extraction capabilities with an LSTM model's detection capabilities.
no code implementations • 27 Feb 2024 • Abanti Bhattacharjya, Md Manowarul Islam, Md Ashraf Uddin, Md. Alamin Talukder, AKM Azad, Sunil Aryal, Bikash Kumar Paul, Wahia Tasnim, Muhammad Ali Abdulllah Almoyad, Mohammad Ali Moni
Our research findings have suggested common therapeutic molecules for the selected diseases based on 10 hub genes with the highest interactions according to the degree topology method and the maximum clique centrality (MCC).
no code implementations • 22 Feb 2024 • Md. Alamin Talukder, Rakib Hossen, Md Ashraf Uddin, Mohammed Nasir Uddin, Uzzal Kumar Acharjee
Financial institutions and businesses face an ongoing challenge from fraudulent transactions, prompting the need for effective detection methods.
no code implementations • 17 Feb 2024 • Md. Alamin Talukder, Selina Sharmin, Md Ashraf Uddin, Md Manowarul Islam, Sunil Aryal
This blend synthesizes minority instances and eliminates Tomek links, resulting in a balanced dataset that significantly enhances detection accuracy in WSNs.
no code implementations • 22 Jan 2024 • Md. Alamin Talukder, Md. Manowarul Islam, Md Ashraf Uddin, Khondokar Fida Hasan, Selina Sharmin, Salem A. Alyami, Mohammad Ali Moni
Intrusion Detection Systems (IDS) play a critical role in protecting interconnected networks by detecting malicious actors and activities.
no code implementations • 28 Nov 2023 • Md. Alamin Talukder, Md. Abu Layek, Mohsin Kazi, Md Ashraf Uddin, Sunil Aryal
Furthermore, EfficientNetB4 excelled in identifying Lung disease using Chest X-ray dataset containing 4, 350 Images, achieving remarkable performance with an accuracy of 99. 17%, precision of 99. 13%, recall of 99. 16%, and f1-score of 99. 14%.
no code implementations • 22 May 2023 • Md. Alamin Talukder, Md. Manowarul Islam, Md Ashraf Uddin
Experimentation is conducted on the Figshare Contrast-Enhanced MRI (CE-MRI) brain tumor dataset, comprising 3064 images.
no code implementations • 8 Dec 2022 • Md. Alamin Talukder, Khondokar Fida Hasan, Md. Manowarul Islam, Md Ashraf Uddin, Arnisha Akhter, Mohammad Abu Yousuf, Fares Alharbi, Mohammad Ali Moni
Network intrusion detection systems (NIDSs) play an important role in computer network security.
no code implementations • 2 Jun 2022 • Md. Alamin Talukder, Md. Manowarul Islam, Md Ashraf Uddin, Arnisha Akhter, Khondokar Fida Hasan, Mohammad Ali Moni
The model is evaluated on histopathological (LC25000) lung and colon datasets.