{"id":38,"date":"2019-04-30T09:26:32","date_gmt":"2019-04-30T09:26:32","guid":{"rendered":"http:\/\/localhost\/dr-alam\/?page_id=38"},"modified":"2019-10-21T17:36:06","modified_gmt":"2019-10-21T17:36:06","slug":"publications","status":"publish","type":"page","link":"https:\/\/dependsys.com\/dr-alam\/publications\/","title":{"rendered":"Publications (120+)"},"content":{"rendered":"\n<h4 class=\"wp-block-heading\">2018<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>COMMAG: <\/strong>Entao Luo,\u00a0<strong>Md Zakirul Alam Bhuiyan*<\/strong>, Guojun Wang, Md Arafatur Rahman, Jie Wu, and Mohammed Atiquzzaman,<br>PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-based Healthcare Systems<br>IEEE Communication Magazine (COMMAG), 56(2): 163-168, 2018\u00a0<strong>(*Corresponding Author)<\/strong>\u00a0<strong>(SCI\/ESI IF:10.45, JCR Q1)<\/strong><\/li><li><strong>COMMAG: <\/strong>Tian Wang,\u00a0<strong>Md Zakirul Alam Bhuiyan<\/strong>, Guojun Wang, Md. Arafatur Rahman, Jie Wu, and Jiannong Cao,<br>\u201cBig Data Reduction for Smart City\u2019s Critical Infrastructural Health Monitoring,\u201d<br>IEEE Communication Magazine (COMMAG), 56(3): 128-133, 15 March 2018 (<strong>Corresponding Author<\/strong>).\u00a0<strong>(SCI\/ESI IF:10.45, JCR Q1)<\/strong><\/li><li><strong>IoT-J<\/strong>: H. Tao, <strong>Md Zakirul Alam Bhuiyan<\/strong>, A. Abdalla, M. Hassan, J. Jain, and T. Hayajneh,<br>\u201cSecured Data Collection with Hardware-based Ciphers for IoT-based Healthcare,\u201d<br>IEEE Internet of Things Journal, 2018\u00a0<strong>(SCI\/ESI IF:7.5, JCR Q1)<\/strong><\/li><li><strong>IoT-J<\/strong>: Shaobo Zhang, Guojun Wang, <strong>Md Zakirul Alam Bhuiyan<\/strong>, and Qin Liu<br>A Dual Privacy-Preserving Scheme in Continuous Location-Based Services<br>IEEE Internet of Things Journal (IEEE IoT-J), 2018\u00a0<strong>(SCI\/ESI IF:\u00a07.5, JCR Q1)<\/strong><\/li><li><strong>IoT-J: <\/strong>Tian Wang, Guangxue Zhang, Anfeng Liu,\u00a0<strong>Md Zakirul Alam Bhuiyan<\/strong>, and Qun Jin,<br>\u201cA Secure IoT Service Architecture with an Efficient Balance Dynamics Based on Cloud and Edge Computing,\u201d<br>IEEE Internet of Things Journal (IEEE IoT-J), 5(4): 2478-2482, Aug 2018\u00a0<strong>(SCI\/ESI IF:\u00a07.5, JCR Q1)<\/strong><\/li><li><strong>IoT-J<\/strong>: S. H. Islam, K. Arijit, G. Biswas, <strong>Md Zakirul Alam Bhuiyan<\/strong>, P Vijayakumar, and M. Karuppiah,<br>\u201cProvably Secure Identity-based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments,\u201d<br>IEEE Internet of Things Journal (IEEE IoT-J), 5(4): 2904-2914, Aug. 2018 DOI: 10.1109\/JIOT.2017.2741580\u00a0<strong>(SCI\/ESI IF:\u00a07.5, JCR Q1)<\/strong><\/li><li><strong>TII<\/strong>: Xiong Li, Jiangwen Liu, and <strong>Md Zakirul Alam Bhuiyan<\/strong>,<br>\u201cA Robust ECC based Provable Secure Authentication Protocol with Privacy Protection for Industrial Internet of Things,\u201d<br>IEEE Transactions on Industrial Informatics, 14(8): 3599-3609, 2018,<br>DOI:\u00a0<a href=\"https:\/\/doi.org\/10.1109\/TII.2017.2773666\">https:\/\/doi.org\/10.1109\/TII.2017.2773666\u00a0<\/a><strong>(SCI\/ESI IF:5.3, JCR Q1)<\/strong><\/li><li><strong>INS: <\/strong>Peiyuan Sun, J Li,\u00a0<strong>Md Zakirul Alam Bhuiyan<\/strong>, L Wang, B Li,<br>\u201cModeling and Clustering Attacker Activities in IoT through Machine Learning Techniques,\u201d<br>Information Sciences, https:\/\/doi.org\/10.1016\/j.ins.2018.04.065, 2018\u00a0<strong>(SCI\/ESI IF:\u00a04.5, JCR Q1)<\/strong><\/li><li><strong>JNCA: <\/strong>Md. Arafatur Rahman, A. Taufiq Asyhari,\u00a0<strong>Md Zakirul Alam Bhuiyan*<\/strong>, Qusay Medhat Salih, and Kamal Zuhairi Bin Zamli,<br>\u201cL-CAQ: Joint link-oriented channel-availability and channel-quality based channel selection for mobile cognitive radio networks,\u201d<br>Journal of Network and Computer Applications,<br>DOI: https:\/\/doi.org\/10.1016\/j.jnca.2018.03.022, 2018 (*<strong>Corresponding author<\/strong>)\u00a0<strong>(SCI\/ESI IF:\u00a03.991, JCR Q1)<\/strong><\/li><li><strong>FGCS: <\/strong>Tian Wang, Jiyuan Zhou, Minzhe Huang,\u00a0<strong>Md Zakirul Alam Bhuiyan<\/strong>, Anfeng Liu, Wenzheng Xud, and Mande Xie,<br>Fog-based storage technology to fight with cyber threat<br>Future Generation Computer Systems (FGCS), 2018\u00a0[<strong>SCI\/ESI IF:\u00a04.64<\/strong>]<\/li><li><strong>FGCS: <\/strong>Bassam Jamil Mohd, Thaier Hayajneh, Khalil Mustafa Ahmad Yousef, Zaid Abu Khalaf, and\u00a0<strong>Md Zakirul Alam Bhuiyan<\/strong>,<br>\u201cHardware design and modeling of lightweight block ciphers for secure communications,\u201d<br>Future Generation Computer Systems, 83: 510-521 (2018)\u00a0[<strong>SCI\/ESI IF:\u00a04.64<\/strong>]<\/li><li><strong>FGCS<\/strong>: Cheng Guo, Ningqi Luo, <strong>Md Zakirul Alam Bhuiyan<\/strong>, Yingmo Jie, Yuanfang Chen, Bin Feng, Muhammad Alam,<br>\u201cKey-aggregate authentication cryptosystem for data sharing in dynamic cloud storage,\u201d<br>Future Generation Comp. Syst. 84: 190-199 (2018)\u00a0[<strong>SCI\/ESI IF:\u00a04.64<\/strong>]<\/li><li><strong>FGCS<\/strong>: Joarder Kamruzzaman, Guojun Wang, Gour C. Karmakar, Iftekhar Ahmad, <strong>Md Zakirul Alam Bhuiyan<\/strong>,<br>\u201cAcoustic sensor networks in the Internet of Things applications,\u201d<br>Future Generation Computer Systems, 86: 1167-1169 (2018)\u00a0[<strong>SCI\/ESI IF:\u00a04.64<\/strong>]<\/li><li><strong>FGCS<\/strong>: Yingxue Wang, Yanan Chen, <strong>Md Zakirul Alam Bhuiyan<\/strong>, Yu Han, Shenghui Zhao, Jianxin Li,<br>\u201cGait-based Human identification using acoustic sensor and deep neural network,\u201d<br>Future Generation Computer Systems, 86: 1228-1237 (2018)\u00a0[<strong>SCI\/ESI IF:\u00a04.64<\/strong>]<\/li><li><strong>FGCS<\/strong>: Sayantani Basu, Marimuthu Karuppiah, K. Selvakumar, Kuan-Ching Li, SK Hafizul Islam, Mohammad Mehedi Hassan, <strong>Md Zakirul Alam Bhuiyan,<\/strong><br>\u201cAn intelligent\/cognitive model of task scheduling for IoT applications in cloud computing environment,\u201d<br>Future Generation Computer Systems, 88: 254-261 (2018)<\/li><li><strong>FGCS:<\/strong>Weihong Chen, Ji-yao An, Renfa Li, Li Fu, Guoqi Xie,\u00a0<strong>Md Zakirul Alam Bhuiyan<\/strong>, Keqin Li,<br>\u201cA novel fuzzy deep-learning approach to traffic flow prediction with uncertain spatial-temporal data features,\u201d<br>Future Generation Comp. Syst. 89: 78-88 (2018)<\/li><li><strong>FGCS:<\/strong>Hao Peng, Mengjiao Bao, Jianxin Li, Md. Zakirul Alam Bhuiyan, Yaopeng Liu, Yu He, Erica Yang,<br>\u201cIncremental term representation learning for social network analysis,\u201d Future Generation Computer Systems, 86: 1503-1512 (2018)\u00a0[<strong>SCI\/ESI IF:\u00a04.64<\/strong>]<\/li><li><strong>ACCESS: <\/strong>Md. Arafatur Rahman, Vitaliy Mezhuyev,\u00a0<strong>Md Zakirul Alam Bhuiyan*<\/strong>, S M Nazmus Sadat, Siti Aishah Binti Zakaria, And Nadia Refat<br>Reliable Decision Making of Accepting Friend Request on Online Social Networks<br>IEEE ACCESS, 6: 9484-9481, 22 Feb 2018 (*Corresponding author)<\/li><li><strong>ACCESS:<\/strong>Md Arafatur Rahman, Saiful Azad, A. Taufiq Asyhari, Khoirul Anwar, and\u00a0<strong>Md Zakirul Alam Bhuiyan<\/strong><br>Collab-SAR: A Collaborative Avalanche Search-And-Rescue Missions Exploiting Hostile Alpine Networks<br>IEEE ACCESS, 2018 (Corresponding Author)<\/li><li><strong>COMNET: <\/strong>T. Wang, J. Zenga,\u00a0<strong>Md Zakirul Alam Bhuiyan<\/strong>, Y, Chen, Y. Cai, H. Tian, M. Xie<br>Energy-efficient relay tracking with multiple mobile camera sensors<br>Computer Networks, 133:130-140, 2018, https:\/\/doi.org\/10.1016\/j.comnet.2018.01.002 [SCI IF: 2.51 &amp; EI]<\/li><li><strong>TBD: Md Zakirul Alam Bhuiyan<\/strong>, Jie Wu, Gary M. Weiss, Thaier Hayajneh, Tian Wang, and Guojun Wang<br>Event Detection through Differential Pattern Mining in Cyber-Physical Systems<br>IEEE Transactions on Big Data, Jun 2017, https:\/\/doi.org\/10.1109\/TBDATA.2017.2731838<\/li><li><strong>TBD: <\/strong> Weiren Yu, Jianxin Li,\u00a0<strong>Md Zakirul Alam Bhuiyan<\/strong>, Richong Zhang, and Jinpeng Huai<br>Ring: Real-Time Emerging Anomaly Monitoring System over Text Streams<br>IEEE Transactions on Big Data, https:\/\/doi.org\/10.1109\/TBDATA.2017.2672672<\/li><li><strong>TII: <\/strong> Xiong Li, Jianwei Niu,\u00a0<strong>Md Zakirul Alam Bhuiyan<\/strong>, Fan Wu, Marimuthu Karuppiah, and Saru Kumari<br>A Robust ECC based Provable Secure Authentication Protocol with Privacy Protection for Industrial Internet of Things<br>IEEE Transactions on Industrial Informatics, DOI: https:\/\/doi.org\/10.1109\/TII.2017.2773666<\/li><li><strong>TBD<\/strong> <strong>: <\/strong>  Thao Tran, Mohammad Rahman,\u00a0<strong>Md Zakirul Alam Bhuiyan<\/strong>, Ayumu Kubota, Shinsaku Kiyomoto, and Kazumasa Omote<br>Optimizing Share Size in Efficient and Robust Secret Sharing Scheme for Big Data<br>IEEE Transactions on Big Data, 2017, https:\/\/doi.org\/10.1109\/TBDATA.2017.2708085,\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/doi.org\/10.1109\/TBDATA.2017.2708085\" target=\"_blank\">[Paper]<\/a><\/li><li><strong>C-S: <\/strong>Mansour Alali, Ahmad Almogren, Mohammad Mehedi Hassan, Iehab Al Rassan, and\u00a0<strong>Md. Zakirul Alam Bhuiyan<\/strong>,<br>\u201cImproving risk assessment model of cyber security using fuzzy logic inference system,\u201d<br>Computers &amp; Security 74: 323-339 (2018) [SCI\/ESI]<\/li><li><strong>IJCS: <\/strong>Majing Su, Hongli Zhang,<strong>Md Zakirul Alam Bhuiyan*<\/strong>, Xiaojiang Du, Peng Zhang,<br>An effective copyright-protected content delivery scheme for P2P file sharing networks<br>International Journal of Communication Systems (IJCS), 2018 (Corresponding author) [SCI IF: 1.1 &amp; EI]<\/li><li><strong>TSUSC: <\/strong>Junggab Son, Donghyun Kim,\u00a0<strong>Md Zakirul Alam Bhuiyan<\/strong>, Rahman Tashakkori, Jungtaek Seo, and Heekuck Oh,<br>Privacy Enhanced Location Sharing for Mobile Online Social Networks<br>IEEE Transactions on sustainable computing, 2018<\/li><li><strong>TSUSC: <\/strong>Tian Wang, Yang Li, Guojun Wang, Jiannong Cao,\u00a0<strong>Md Zakirul Alam Bhuiyan<\/strong>, Weijia Jia<br>Sustainable and Efficient Data Collection from WSNs to Cloud<br>IEEE Transactions on sustainable computing, 2017, https:\/\/doi.org\/10.1109\/TSUSC.2017.2690301<\/li><li><strong>TII<\/strong>: Mingming Zhang, Chao Chen, Tianyu Wo, <strong>Md Zakirul Alam Bhuiyan<\/strong>, Tao Xie, Xuelian Lin<br>SafeDrive: Online Driving Anomaly Detection from Large-Scale Vehicle Data<br>IEEE Transactions on Industrial Informatics, 2017 https:\/\/doi.org\/10.1109\/TII.2017.2674661\u00a0[SCI IF: 6.77]<\/li><li><strong>JNCA: <\/strong>Md. Arafatur Rahman, A. Taufiq Asyhari,\u00a0<strong>Md Zakirul Alam Bhuiyan*<\/strong>, Qusay Medhat Salih, Kamal Zuhairi Bin Zamli<br>Joint Link-Oriented Channel-Availability and Channel-Quality Based Channel Selection for Mobile Cognitive Radio Networks<br>Journal of Network and Computer Applications (JNCA), 2018 (*Corresponding author)<\/li><li><strong>IJCS<\/strong>: Yangyang Zhang, Jianxin Li, Chenggen Sun, <strong>Md Zakirul Alam Bhuiyan<\/strong>, Weiren Yu, Richong Zhang,<br>\u201cHotML: A DSM-based machine learning system for social networks,\u201d<br>J. Comput. Science 26: 478-487 (2018)<\/li><li><strong>IJCIP: <\/strong>Muhammad Nomani Kabir, Md. Arafatur Rahman, Saiful Azad, Mohamed Mostafa A. Azim,\u00a0<strong>Md Zakirul Alam Bhuiyan<\/strong>,<br>\u201cA connection probability model for communications networks under regional failures,\u201d<br>IJCIP 20: 16-25 (2018)<\/li><li><strong>IEEE TrustCom: <\/strong>Liangfu Lu, Xinhe Zhu, Xuyun Zhang, Junhan Liu,\u00a0<strong>Md Zakirul Alam Bhuiyan<\/strong>\u00a0and Guangtai Cui<br>Intrusion Detection Method Based On Uniformed Conditional Dynamic Mutual Information<br>The 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom\u201918),<br>New York, USA, July 31th \u2013 August 3, 2018<\/li><li><strong>IEEE TrustCom<\/strong>: Hongbin Liu, Ming Xu, Yiming Wu, Ning Zheng, Yuanfang Chen and <strong>Md Zakirul Alam Bhuiyan<\/strong>,<br>Resilient Bipartite Consensus for Multi-Agent Networks with Antagonistic Interaction,<br>The 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom\u201918)<br>New York, USA, July 31th \u2013 August 3, 2018. (<strong>Corresponding Author<\/strong>)<\/li><li><strong>IEEE TrustCom<\/strong>: Cheng Guo, Xinyu Tang, Yuanfang Chen, Pengxu Tain and <strong>Md Zakirul Alam Bhuiyan<\/strong>,<br>An Efficient Distributed Approach on High Dimensional Data Similarity Searchable Encryption<br>The 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom\u201918)<br>New York, USA, July 31th \u2013 August 3, 2018 (<strong>Corresponding Author<\/strong>)<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">2017<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li><\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>TDSC<\/strong><strong>Md Zakirul Alam Bhuiyan<\/strong>, G. Wang, J. Wu, J. Cao, X. Liu, and T. Wang<br><a href=\"https:\/\/ieeexplore.ieee.org\/document\/7208855\/?arnumber=7208855\" target=\"_blank\" rel=\"noreferrer noopener\">Dependable Structural Health Monitoring Using Wireless Sensor Networks<\/a><br>IEEE Transactions on Dependable and Secure Computing, 14(4): 363-376, JULY\/AUGUST 2017 [SCI\/ESI IF: 2.29][Paper, Supplemental file]<\/li><li><strong>TAAS<\/strong><strong>Md Zakirul Alam Bhuiyan<\/strong>,&nbsp;J. Wu,&nbsp;G. Wang, and T. Wang, and M. Hassan<br>e-Sampling: Event-Sensitive Autonomous Adaptive Sensing and Low-cost Monitoring in Networked Sensing Systems<br>ACM Transactions on Autonomous and Adaptive Systems,&nbsp;12(1): 1-29, April 2017.&nbsp;[<strong>SCI\/ESI IF:&nbsp;2.48<\/strong>]<\/li><li><strong>TII<\/strong><strong>Md Zakirul Alam Bhuiyan<\/strong>,&nbsp;J. Wu,&nbsp;G. Wang, Z. Chen, J. CHen, and T. Wang<br>\u201c<a href=\"https:\/\/doi.org\/10.1109\/TII.2017.2665463\" target=\"_blank\" rel=\"noreferrer noopener\">Quality Guaranteed and Event-Sensitive Data Collection and Monitoring in Wireless Vibration Sensor Networks<\/a><br><em>IEEE Transactions on Industrial Informatics, 2017<\/em>&nbsp;[<strong>SCI\/ESI IF:&nbsp;6.77<\/strong>]<\/li><\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>2018 COMMAG: Entao Luo,\u00a0Md Zakirul Alam Bhuiyan*, Guojun Wang, Md Arafatur Rahman, Jie Wu, and Mohammed Atiquzzaman,PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-based Healthcare SystemsIEEE Communication Magazine (COMMAG), 56(2): 163-168, 2018\u00a0(*Corresponding Author)\u00a0(SCI\/ESI IF:10.45, JCR Q1) COMMAG: Tian Wang,\u00a0Md Zakirul Alam Bhuiyan, Guojun Wang, Md. Arafatur Rahman, Jie Wu, and Jiannong Cao,\u201cBig Data Reduction for Smart [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"nf_dc_page":"","footnotes":""},"class_list":["post-38","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/dependsys.com\/dr-alam\/wp-json\/wp\/v2\/pages\/38","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dependsys.com\/dr-alam\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dependsys.com\/dr-alam\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dependsys.com\/dr-alam\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dependsys.com\/dr-alam\/wp-json\/wp\/v2\/comments?post=38"}],"version-history":[{"count":13,"href":"https:\/\/dependsys.com\/dr-alam\/wp-json\/wp\/v2\/pages\/38\/revisions"}],"predecessor-version":[{"id":179,"href":"https:\/\/dependsys.com\/dr-alam\/wp-json\/wp\/v2\/pages\/38\/revisions\/179"}],"wp:attachment":[{"href":"https:\/\/dependsys.com\/dr-alam\/wp-json\/wp\/v2\/media?parent=38"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}