no code implementations • 28 Aug 2023 • Md Jobair Hossain Faruk, Bilash Saha, Jim Basney
Managing and exchanging sensitive information securely is a paramount concern for the scientific and cybersecurity community.
1 code implementation • 31 May 2023 • Mst Shapna Akter, Md Jobair Hossain Faruk, Nafisa Anjum, Mohammad Masum, Hossain Shahriar, Akond Rahman, Fan Wu, Alfredo Cuzzocrea
Our goal is to distinguish the performance between QNN and NN and to conduct the experiment, we develop two different models for QNN and NN by utilizing Pennylane for quantum and TensorFlow and Keras for traditional respectively.
no code implementations • 7 Jul 2022 • Md Jobair Hossain Faruk, Shashank Trivedi, Mohammad Masum, Maria Valero, Hossain Shahriar, Sheikh Iqbal Ahamed
People's personal hygiene habits speak volumes about the condition of taking care of their bodies and health in daily lifestyle.
no code implementations • 7 Jul 2022 • Mohammad Masum, Hossain Shahriar, Hisham Haddad, Md Jobair Hossain Faruk, Maria Valero, Md Abdullah Khan, Mohammad A. Rahman, Muhaiminul I. Adnan, Alfredo Cuzzocrea
The optimal use of DNN-based classifiers requires careful tuning of the hyper-parameters.
no code implementations • 26 Jun 2022 • Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Farhat Lamia Barsha, Shahriar Sobhan, Md Abdullah Khan, Michael Whitman, Alfredo Cuzzocreak, Dan Lo, Akond Rahman, Fan Wu
The comprehension of this synthesis shall help researchers for further research on malware detection and prevention using AI.
no code implementations • 24 Jun 2022 • Md Jobair Hossain Faruk, Maria Valero, Hossain Shahriar
In this study, we illustrate the progress of BCI research and present scores of unveiled contemporary approaches.