\n \n \n
\n
\n \n 2026\n \n \n (4)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n EDDNet30: A Spatial Attention and Multi-Scale Fusion Model for Enhanced Eye Disease Classification with Explainable AI.\n \n \n \n\n\n \n Nirob, M. A. S.; Paul, S. G.; Saha, A.; Assaduzzaman, M.; Kabir, M. A.; Mahmud, A.; Rehman, A. U.; and Bermak, A.\n\n\n \n\n\n\n
IEEE Access. 2026.\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{nirob2026eddnet30,\n title={EDDNet30: A Spatial Attention and Multi-Scale Fusion Model for Enhanced Eye Disease Classification with Explainable AI},\n author={Nirob, Md Asraful Sharker and Paul, Showmick Guha and Saha, Arpa and Assaduzzaman, Md and Kabir, Md Alamgir and Mahmud, Arif and Rehman, Atiq Ur and Bermak, Amine},\n journal={IEEE Access},\n year={2026},\n publisher={IEEE}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Generative data augmentation for improving state estimation and prognostics in lithium-ion batteries: Advances, Challenges, and Future directions.\n \n \n \n\n\n \n Sifat, M. S. I.; Sawda, U.; Kabir, M. A.; Ahmed, M. U.; Lipu, M. H.; and Islam, M. M.\n\n\n \n\n\n\n
Journal of Energy Storage, 153: 121006. 2026.\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{sifat2026generative,\n title={Generative data augmentation for improving state estimation and prognostics in lithium-ion batteries: Advances, Challenges, and Future directions},\n author={Sifat, Md Sulyman Islam and Sawda, Ummy and Kabir, Md Alamgir and Ahmed, Mobyen Uddin and Lipu, MS Hossain and Islam, MM Manjurul},\n journal={Journal of Energy Storage},\n volume={153},\n pages={121006},\n year={2026},\n publisher={Elsevier}\n}\n\n\n
\n\n\n\n
\n\n\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2025\n \n \n (5)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n LEU3: an attention Augmented-based model for acute lymphoblastic leukemia classification.\n \n \n \n\n\n \n Dutta, M.; Mojumdar, M. U.; Kabir, M. A.; Chakraborty, N. R.; Siddiquee, S. M. T.; and Abdullah, S.\n\n\n \n\n\n\n
IEEE Access. 2025.\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{dutta2025leu3,\n title={LEU3: an attention Augmented-based model for acute lymphoblastic leukemia classification},\n author={Dutta, Monoronjon and Mojumdar, Mayen Uddin and Kabir, Md Alamgir and Chakraborty, Narayan Ranjan and Siddiquee, Shah Md Tanvir and Abdullah, Saad},\n journal={IEEE Access},\n year={2025},\n publisher={IEEE}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Trustworthy Artificial Intelligence for Industrial Operations and Manufacturing: Principles and Challenges.\n \n \n \n\n\n \n Kabir, M. A.; Islam, M. M.; and Chakraborty, N. R.\n\n\n \n\n\n\n In
Artificial Intelligence for Smart Manufacturing and Industry X. 0, pages 179, 2025. Springer Nature\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{kabir2025trustworthy,\n title={Trustworthy Artificial Intelligence for Industrial Operations and Manufacturing: Principles and Challenges},\n author={Kabir, Md Alamgir and Islam, MM Manjurul and Chakraborty, Narayan Ranjan},\n booktitle={Artificial Intelligence for Smart Manufacturing and Industry X. 0},\n pages={179},\n year={2025},\n organization={Springer Nature}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n GAN-based data augmentation for fault diagnosis and prognosis of rolling bearings: a literature review.\n \n \n \n\n\n \n Sifat, M. S. I.; Kabir, M. A.; Islam, M. M.; Rehman, A. U.; and Bermak, A.\n\n\n \n\n\n\n
IEEE Access. 2025.\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{sifat2025gan,\n title={GAN-based data augmentation for fault diagnosis and prognosis of rolling bearings: a literature review},\n author={Sifat, Md Sulyman Islam and Kabir, Md Alamgir and Islam, MM Manjurul and Rehman, Atiq Ur and Bermak, Amine},\n journal={IEEE Access},\n year={2025},\n publisher={IEEE}\n}\n\n\n
\n\n\n\n
\n\n\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2024\n \n \n (5)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n Deep-IDS: a real-time intrusion detector for IoT nodes using deep learning.\n \n \n \n\n\n \n Racherla, S.; Sripathi, P.; Faruqui, N.; Kabir, M. A.; Whaiduzzaman, M.; and Shah, S. A.\n\n\n \n\n\n\n
IEEE Access, 12: 63584–63597. 2024.\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{racherla2024deep,\n title={Deep-IDS: a real-time intrusion detector for IoT nodes using deep learning},\n author={Racherla, Sandeepkumar and Sripathi, Prathyusha and Faruqui, Nuruzzaman and Kabir, Md Alamgir and Whaiduzzaman, Md and Shah, Syed Aziz},\n journal={IEEE Access},\n volume={12},\n pages={63584--63597},\n year={2024},\n publisher={IEEE}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Balancing fairness: Unveiling the potential of smote-driven oversampling in ai model enhancement.\n \n \n \n\n\n \n Kabir, M. A.; Ahmed, M. U.; Begum, S.; Barua, S.; and Islam, M. R.\n\n\n \n\n\n\n In
Proceedings of the 2024 9th International Conference on Machine Learning Technologies, pages 21–29, 2024. \n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{kabir2024balancing,\n title={Balancing fairness: Unveiling the potential of smote-driven oversampling in ai model enhancement},\n author={Kabir, Md Alamgir and Ahmed, Mobyen Uddin and Begum, Shahina and Barua, Shaibal and Islam, Md Rakibul},\n booktitle={Proceedings of the 2024 9th International Conference on Machine Learning Technologies},\n pages={21--29},\n year={2024}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Enhancing speech emotion recognition using deep convolutional neural networks.\n \n \n \n\n\n \n Islam, M. M.; Kabir, M. A.; Sheikh, A.; Saiduzzaman, M.; Hafid, A.; and Abdullah, S.\n\n\n \n\n\n\n In
Proceedings of the 2024 9th International Conference on Machine Learning Technologies, pages 95–100, 2024. \n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{islam2024enhancing,\n title={Enhancing speech emotion recognition using deep convolutional neural networks},\n author={Islam, MM Manjurul and Kabir, Md Alamgir and Sheikh, Alamin and Saiduzzaman, Muhammad and Hafid, Abdelakram and Abdullah, Saad},\n booktitle={Proceedings of the 2024 9th International Conference on Machine Learning Technologies},\n pages={95--100},\n year={2024}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Research issues and challenges in the computational development of trustworthy AI.\n \n \n \n\n\n \n Begum, S.; Ahmed, M. U.; Barua, S.; Kabir, M. A.; and Masud, A. N.\n\n\n \n\n\n\n In
2024 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET), pages 300–305, 2024. IEEE\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{begum2024research,\n title={Research issues and challenges in the computational development of trustworthy AI},\n author={Begum, Shahina and Ahmed, Mobyen Uddin and Barua, Shaibal and Kabir, Md Alamgir and Masud, Abu Naser},\n booktitle={2024 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET)},\n pages={300--305},\n year={2024},\n organization={IEEE}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n AttNet: An Attention-Based BiGRU Network for Remaining Useful Life Prediction.\n \n \n \n\n\n \n Shakil, A. H.; Orin, M. A.; Rahman, M.; and Kabir, M. A.\n\n\n \n\n\n\n In
2024 6th International Conference on Sustainable Technologies for Industry 5.0 (STI), pages 1–6, 2024. IEEE\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{shakil2024attnet,\n title={AttNet: An Attention-Based BiGRU Network for Remaining Useful Life Prediction},\n author={Shakil, Ahsanul Haque and Orin, Mst Afsana and Rahman, Mostafijur and Kabir, Md Alamgir},\n booktitle={2024 6th International Conference on Sustainable Technologies for Industry 5.0 (STI)},\n pages={1--6},\n year={2024},\n organization={IEEE}\n}\n\n\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2023\n \n \n (6)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n On the use of deep learning for video classification.\n \n \n \n\n\n \n Ur Rehman, A.; Belhaouari, S. B.; Kabir, M. A.; and Khan, A.\n\n\n \n\n\n\n
Applied Sciences, 13(3): 2007. 2023.\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{ur2023use,\n title={On the use of deep learning for video classification},\n author={Ur Rehman, Atiq and Belhaouari, Samir Brahim and Kabir, Md Alamgir and Khan, Adnan},\n journal={Applied Sciences},\n volume={13},\n number={3},\n pages={2007},\n year={2023},\n publisher={MDPI}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Review of artifact detection methods for automated analysis and diagnosis in digital pathology.\n \n \n \n\n\n \n Shakhawat, H.; Hossain, S.; Kabir, A.; Mahmud, S. H.; Islam, M. M.; and Tariq, F.\n\n\n \n\n\n\n In
Artificial Intelligence for Disease Diagnosis and Prognosis in Smart Healthcare, pages 177–202. CRC Press, 2023.\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@incollection{shakhawat2023review,\n title={Review of artifact detection methods for automated analysis and diagnosis in digital pathology},\n author={Shakhawat, Hossain and Hossain, Sakir and Kabir, Alamgir and Mahmud, SM Hasan and Islam, MM Manjurul and Tariq, Faisal},\n booktitle={Artificial Intelligence for Disease Diagnosis and Prognosis in Smart Healthcare},\n pages={177--202},\n year={2023},\n publisher={CRC Press}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Salp swarm algorithm for drift compensation in E-nose.\n \n \n \n\n\n \n ur Rehman, A.; Kabir, M. A.; Ijaz, M.; Al-Mohsin, H. M; and Bermak, A.\n\n\n \n\n\n\n In
2023 15th International Conference on Advanced Computational Intelligence (ICACI), pages 1–6, 2023. IEEE\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{ur2023salp,\n title={Salp swarm algorithm for drift compensation in E-nose},\n author={ur Rehman, Atiq and Kabir, Md Alamgir and Ijaz, Muhammad and Al-Mohsin, Hanadi M and Bermak, Amine},\n booktitle={2023 15th International Conference on Advanced Computational Intelligence (ICACI)},\n pages={1--6},\n year={2023},\n organization={IEEE}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Trackez: an iot-based 3d-object tracking from 2d pixel matrix using mez and fsl algorithm.\n \n \n \n\n\n \n Faruqui, N.; Kabir, M. A.; Yousuf, M. A.; Whaiduzzaman, M.; Barros, A.; and Mahmud, I.\n\n\n \n\n\n\n
IEEE Access, 11: 61453–61467. 2023.\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{faruqui2023trackez,\n title={Trackez: an iot-based 3d-object tracking from 2d pixel matrix using mez and fsl algorithm},\n author={Faruqui, Nuruzzaman and Kabir, Md Alamgir and Yousuf, Mohammad Abu and Whaiduzzaman, Md and Barros, Alistair and Mahmud, Imran},\n journal={IEEE Access},\n volume={11},\n pages={61453--61467},\n year={2023},\n publisher={IEEE}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Cross-version software defect prediction considering concept drift and chronological splitting.\n \n \n \n\n\n \n Kabir, M. A.; Rehman, A. U.; Islam, M. M.; Ali, N.; and Baptista, M. L\n\n\n \n\n\n\n
Symmetry, 15(10): 1934. 2023.\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{kabir2023cross,\n title={Cross-version software defect prediction considering concept drift and chronological splitting},\n author={Kabir, Md Alamgir and Rehman, Atiq Ur and Islam, MM Manjurul and Ali, Nazakat and Baptista, Marcia L},\n journal={Symmetry},\n volume={15},\n number={10},\n pages={1934},\n year={2023},\n publisher={MDPI}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n The effects of class rebalancing techniques on ensemble classifiers on credit card fraud detection: An empirical study.\n \n \n \n\n\n \n Kaushik, M. M.; Mahmud, S. H.; Kabir, M. A.; and Nandi, D.\n\n\n \n\n\n\n In
AIP Conference Proceedings, volume 2916, pages 030011, 2023. AIP Publishing LLC\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{kaushik2023effects,\n title={The effects of class rebalancing techniques on ensemble classifiers on credit card fraud detection: An empirical study},\n author={Kaushik, Mehedi Mahmud and Mahmud, SM Hasan and Kabir, Md Alamgir and Nandi, Dip},\n booktitle={AIP Conference Proceedings},\n volume={2916},\n number={1},\n pages={030011},\n year={2023},\n organization={AIP Publishing LLC}\n}\n\n\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2022\n \n \n (4)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n Spectrum Impact Analysis of Fault Proneness Statement for Improved Fault Localization.\n \n \n \n\n\n \n Kabir, M. A.; Islam, M. M.; Mahmud, S. H.; and Elahe, M. F.\n\n\n \n\n\n\n In
Proceedings of the 2nd International Conference on Computing Advancements, pages 59–66, 2022. \n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{kabir2022spectrum,\n title={Spectrum Impact Analysis of Fault Proneness Statement for Improved Fault Localization},\n author={Kabir, Md Alamgir and Islam, MM Manjurul and Mahmud, SM Hasan and Elahe, Md Fazla},\n booktitle={Proceedings of the 2nd International Conference on Computing Advancements},\n pages={59--66},\n year={2022}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Software risk prediction: systematic literature review on machine learning techniques.\n \n \n \n\n\n \n Mahmud, M. H.; Nayan, M. T. H.; Ashir, D. M. N. A.; and Kabir, M. A.\n\n\n \n\n\n\n
Applied Sciences, 12(22): 11694. 2022.\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{mahmud2022software,\n title={Software risk prediction: systematic literature review on machine learning techniques},\n author={Mahmud, Mahmudul Hoque and Nayan, Md Tanzirul Haque and Ashir, Dewan Md Nur Anjum and Kabir, Md Alamgir},\n journal={Applied Sciences},\n volume={12},\n number={22},\n pages={11694},\n year={2022},\n publisher={MDPI}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Code: A moving-window-based framework for detecting concept drift in software defect prediction.\n \n \n \n\n\n \n Kabir, M. A.; Begum, S.; Ahmed, M. U.; and Rehman, A. U.\n\n\n \n\n\n\n
Symmetry, 14(12): 2508. 2022.\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{kabir2022code,\n title={Code: A moving-window-based framework for detecting concept drift in software defect prediction},\n author={Kabir, Md Alamgir and Begum, Shahina and Ahmed, Mobyen Uddin and Rehman, Atiq Ur},\n journal={Symmetry},\n volume={14},\n number={12},\n pages={2508},\n year={2022},\n publisher={MDPI}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Factors impacting short-term load forecasting of charging station to electric vehicle.\n \n \n \n\n\n \n Elahe, M. F.; Kabir, M. A.; Mahmud, S. H.; and Azim, R.\n\n\n \n\n\n\n
Electronics, 12(1): 55. 2022.\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{elahe2022factors,\n title={Factors impacting short-term load forecasting of charging station to electric vehicle},\n author={Elahe, Md Fazla and Kabir, Md Alamgir and Mahmud, SM Hasan and Azim, Riasat},\n journal={Electronics},\n volume={12},\n number={1},\n pages={55},\n year={2022},\n publisher={MDPI}\n}\n\n\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2021\n \n \n (5)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n COSTE: Complexity-based OverSampling TEchnique to alleviate the class imbalance problem in software defect prediction.\n \n \n \n\n\n \n Feng, S.; Keung, J.; Yu, X.; Xiao, Y.; Bennin, K. E.; Kabir, M. A.; and Zhang, M.\n\n\n \n\n\n\n
Information and Software Technology, 129: 106432. 2021.\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{feng2021coste,\n title={COSTE: Complexity-based OverSampling TEchnique to alleviate the class imbalance problem in software defect prediction},\n author={Feng, Shuo and Keung, Jacky and Yu, Xiao and Xiao, Yan and Bennin, Kwabena Ebo and Kabir, Md Alamgir and Zhang, Miao},\n journal={Information and Software Technology},\n volume={129},\n pages={106432},\n year={2021},\n publisher={Elsevier}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Evaluating the effects of similar-class combination on class integration test order generation.\n \n \n \n\n\n \n Zhang, M.; Keung, J. W.; Xiao, Y.; and Kabir, M. A.\n\n\n \n\n\n\n
Information and Software Technology, 129: 106438. 2021.\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{zhang2021evaluating,\n title={Evaluating the effects of similar-class combination on class integration test order generation},\n author={Zhang, Miao and Keung, Jacky Wai and Xiao, Yan and Kabir, Md Alamgir},\n journal={Information and Software Technology},\n volume={129},\n pages={106438},\n year={2021},\n publisher={Elsevier}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Acomnn: Attention enhanced compound neural network for financial time-series forecasting with cross-regional features.\n \n \n \n\n\n \n Yang, Z.; Keung, J.; Kabir, M. A.; Yu, X.; Tang, Y.; Zhang, M.; and Feng, S.\n\n\n \n\n\n\n
Applied Soft Computing, 111: 107649. 2021.\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{yang2021acomnn,\n title={Acomnn: Attention enhanced compound neural network for financial time-series forecasting with cross-regional features},\n author={Yang, Zhen and Keung, Jacky and Kabir, Md Alamgir and Yu, Xiao and Tang, Yutian and Zhang, Miao and Feng, Shuo},\n journal={Applied Soft Computing},\n volume={111},\n pages={107649},\n year={2021},\n publisher={Elsevier}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Inter-release defect prediction with feature selection using temporal chunk-based learning: An empirical study.\n \n \n \n\n\n \n Kabir, M. A.; Keung, J.; Turhan, B.; and Bennin, K. E.\n\n\n \n\n\n\n
Applied Soft Computing, 113: 107870. 2021.\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{kabir2021inter,\n title={Inter-release defect prediction with feature selection using temporal chunk-based learning: An empirical study},\n author={Kabir, Md Alamgir and Keung, Jacky and Turhan, Burak and Bennin, Kwabena Ebo},\n journal={Applied Soft Computing},\n volume={113},\n pages={107870},\n year={2021},\n publisher={Elsevier}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Deep learning for video classification: A review.\n \n \n \n\n\n \n Rehman, A.; and Belhaouari, S. B.\n\n\n \n\n\n\n
Authorea Preprints. 2021.\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{rehman2021deep,\n title={Deep learning for video classification: A review},\n author={Rehman, Atiq and Belhaouari, Samir Brahim},\n journal={Authorea Preprints},\n year={2021},\n publisher={Authorea}\n}\n\n\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2020\n \n \n (3)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n Prevalence of machine learning techniques in software defect prediction.\n \n \n \n\n\n \n Sohan, M. F.; Kabir, M. A.; Rahman, M.; Bhuiyan, T.; Jabiullah, M. I.; and Felix, E. A.\n\n\n \n\n\n\n In
International Conference on Cyber Security and Computer Science, pages 257–269, 2020. Springer International Publishing Cham\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{sohan2020prevalence,\n title={Prevalence of machine learning techniques in software defect prediction},\n author={Sohan, Md Fahimuzzman and Kabir, Md Alamgir and Rahman, Mostafijur and Bhuiyan, Touhid and Jabiullah, Md Ismail and Felix, Ebubeogu Amarachukwu},\n booktitle={International Conference on Cyber Security and Computer Science},\n pages={257--269},\n year={2020},\n organization={Springer International Publishing Cham}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Training Data Selection Using Ensemble Dataset Approach for Software Defect Prediction.\n \n \n \n\n\n \n Sohan, M. F.; Kabir, M. A.; Rahman, M.; Hasan Mahmud, S.; and Bhuiyan, T.\n\n\n \n\n\n\n In
International Conference on Cyber Security and Computer Science, pages 243–256, 2020. Springer International Publishing Cham\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{sohan2020training,\n title={Training Data Selection Using Ensemble Dataset Approach for Software Defect Prediction},\n author={Sohan, Md Fahimuzzman and Kabir, Md Alamgir and Rahman, Mostafijur and Hasan Mahmud, SM and Bhuiyan, Touhid},\n booktitle={International Conference on Cyber Security and Computer Science},\n pages={243--256},\n year={2020},\n organization={Springer International Publishing Cham}\n}\n\n\n
\n\n\n\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2019\n \n \n (3)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n Revisiting the class imbalance issue in software defect prediction.\n \n \n \n\n\n \n Sohan, M. F.; Kabir, M. A.; Jabiullah, M. I.; and Rahman, S. S. M. M.\n\n\n \n\n\n\n In
2019 International Conference on Electrical, Computer and Communication Engineering (ECCE), pages 1–6, 2019. IEEE\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{sohan2019revisiting,\n title={Revisiting the class imbalance issue in software defect prediction},\n author={Sohan, Md Fahimuzzman and Kabir, Md Alamgir and Jabiullah, Md Ismail and Rahman, Sheikh Shah Mohammad Motiur},\n booktitle={2019 International Conference on Electrical, Computer and Communication Engineering (ECCE)},\n pages={1--6},\n year={2019},\n organization={IEEE}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Assessing the Significant Impact of Concept Drift in Software Defect Prediction.\n \n \n \n\n\n \n Kabir, M. A.; Keung, J. W; Bennin, K. E; and Zhang, M.\n\n\n \n\n\n\n In
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), volume 1, pages 53–58, 2019. IEEE\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{kabir2019assessing,\n title={Assessing the Significant Impact of Concept Drift in Software Defect Prediction},\n author={Kabir, Md Alamgir and Keung, Jacky W and Bennin, Kwabena E and Zhang, Miao},\n booktitle={2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)},\n volume={1},\n pages={53--58},\n year={2019},\n organization={IEEE}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n A heuristic approach to break cycles for the class integration test order generation.\n \n \n \n\n\n \n Zhang, M.; Keung, J.; Xiao, Y.; Kabir, M. A.; and Feng, S.\n\n\n \n\n\n\n In
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), volume 1, pages 47–52, 2019. IEEE\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{zhang2019heuristic,\n title={A heuristic approach to break cycles for the class integration test order generation},\n author={Zhang, Miao and Keung, Jacky and Xiao, Yan and Kabir, Md Alamgir and Feng, Shuo},\n booktitle={2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)},\n volume={1},\n pages={47--52},\n year={2019},\n organization={IEEE}\n}\n\n\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2018\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n Usability Evaluation of Mobile Applications: An Empirical Analysis of Supply Chain Management Systems.\n \n \n \n\n\n \n Kabir, M. A.; Hossin, M. A.; Mahmud, S. H.; Noori, S. R. H.; and Bhuiyan, T.\n\n\n \n\n\n\n In
2018 IEEE 4th International Conference on Computer and Communications (ICCC), pages 2525–2531, 2018. IEEE\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{kabir2018usability,\n title={Usability Evaluation of Mobile Applications: An Empirical Analysis of Supply Chain Management Systems},\n author={Kabir, Md Alamgir and Hossin, Md Altab and Mahmud, SM Hasan and Noori, Sheak Rashed Haider and Bhuiyan, Touhid},\n booktitle={2018 IEEE 4th International Conference on Computer and Communications (ICCC)},\n pages={2525--2531},\n year={2018},\n organization={IEEE}\n}\n\n\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2017\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n Discovering knowledge from mobile application users for usability improvement: A fuzzy association rule mining approach.\n \n \n \n\n\n \n Kabir, M. A.; Salem, O. A.; and Rehman, M. U.\n\n\n \n\n\n\n In
2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS), pages 126–129, 2017. IEEE\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{kabir2017discovering,\n title={Discovering knowledge from mobile application users for usability improvement: A fuzzy association rule mining approach},\n author={Kabir, Md Alamgir and Salem, Omar AM and Rehman, Muaan Ur},\n booktitle={2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)},\n pages={126--129},\n year={2017},\n organization={IEEE}\n}\n\n\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2016\n \n \n (5)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n An analytical and comparative study of software usability quality factors.\n \n \n \n\n\n \n Kabir, M. A.; Rehman, M. U.; and Majumdar, S. I.\n\n\n \n\n\n\n In
2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS), pages 800–803, 2016. IEEE\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{kabir2016analytical,\n title={An analytical and comparative study of software usability quality factors},\n author={Kabir, Md Alamgir and Rehman, Muaan Ur and Majumdar, Shariful Islam},\n booktitle={2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)},\n pages={800--803},\n year={2016},\n organization={IEEE}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n An improved usability evaluation model for point-of-sale systems.\n \n \n \n\n\n \n Kabir, M. A.; and Han, B.\n\n\n \n\n\n\n
International Journal of Smart Home, 10(7): 269–282. 2016.\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{kabir2016improved,\n title={An improved usability evaluation model for point-of-sale systems},\n author={Kabir, Md Alamgir and Han, Bo},\n journal={International Journal of Smart Home},\n volume={10},\n number={7},\n pages={269--282},\n year={2016}\n}\n\n\n
\n\n\n\n
\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n A Case Study of SQL Injection Vulnerabilities Assessment of. bd Domain Web Applications.\n \n \n \n\n\n \n Bhuiyan, T.; Alam, D.; Farah, T.; and Kabir, M. A.\n\n\n \n\n\n\n . 2016.\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{bhuiyan2016case,\n title={A Case Study of SQL Injection Vulnerabilities Assessment of. bd Domain Web Applications},\n author={Bhuiyan, Touhid and Alam, Delwar and Farah, Tanjila and Kabir, Md Alamgir},\n year={2016},\n publisher={IEEE Xplore}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n SQLi vulnerabilty in education sector websites of Bangladesh.\n \n \n \n\n\n \n Bhuiyan, T.; Alam, D.; Farah, T.; and Kabir, M. A.\n\n\n \n\n\n\n . 2016.\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{bhuiyan2016sqli,\n title={SQLi vulnerabilty in education sector websites of Bangladesh},\n author={Bhuiyan, Touhid and Alam, Delwar and Farah, Tanjila and Kabir, Md Alamgir},\n year={2016},\n publisher={IEEE Xplore}\n}\n\n\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2015\n \n \n (5)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n SQLi vulnerabilty in education sector websites of Bangladesh.\n \n \n \n\n\n \n Alam, D.; Bhuiyan, T.; Kabir, M. A.; and Farah, T.\n\n\n \n\n\n\n In
2015 Second International Conference on Information Security and Cyber Forensics (InfoSec), pages 152–157, 2015. IEEE\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{alam2015sqli,\n title={SQLi vulnerabilty in education sector websites of Bangladesh},\n author={Alam, Delwar and Bhuiyan, Touhid and Kabir, Md Alamgir and Farah, Tanjila},\n booktitle={2015 Second International Conference on Information Security and Cyber Forensics (InfoSec)},\n pages={152--157},\n year={2015},\n organization={IEEE}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n SQLi penetration testing of financial Web applications: Investigation of Bangladesh region.\n \n \n \n\n\n \n Farah, T.; Alam, D.; Kabir, M. A.; and Bhuiyan, T.\n\n\n \n\n\n\n In
2015 World Congress on Internet Security (WorldCIS), pages 146–151, 2015. IEEE\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{farah2015sqli,\n title={SQLi penetration testing of financial Web applications: Investigation of Bangladesh region},\n author={Farah, Tanjila and Alam, Delwar and Kabir, Md Alamgir and Bhuiyan, Touhid},\n booktitle={2015 World Congress on Internet Security (WorldCIS)},\n pages={146--151},\n year={2015},\n organization={IEEE}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n A case study of sql injection vulnerabilities assessment of. bd domain web applications.\n \n \n \n\n\n \n Alam, D.; Kabir, M. A.; Bhuiyan, T.; and Farah, T.\n\n\n \n\n\n\n In
2015 Fourth international conference on cyber security, cyber warfare, and digital forensic (CyberSec), pages 73–77, 2015. IEEE\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{alam2015case,\n title={A case study of sql injection vulnerabilities assessment of. bd domain web applications},\n author={Alam, Delwar and Kabir, Md Alamgir and Bhuiyan, Touhid and Farah, Tanjila},\n booktitle={2015 Fourth international conference on cyber security, cyber warfare, and digital forensic (CyberSec)},\n pages={73--77},\n year={2015},\n organization={IEEE}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Investigation of Bangladesh region based web applications: A case study of 64 based, local, and global SQLi vulnerability.\n \n \n \n\n\n \n Farah, T.; Alam, D.; Ali, M. N. B.; and Kabir, M. A.\n\n\n \n\n\n\n In
2015 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE), pages 177–180, 2015. IEEE\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{farah2015investigation,\n title={Investigation of Bangladesh region based web applications: A case study of 64 based, local, and global SQLi vulnerability},\n author={Farah, Tanjila and Alam, Delwar and Ali, Md Nadir Bin and Kabir, Md Alamgir},\n booktitle={2015 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE)},\n pages={177--180},\n year={2015},\n organization={IEEE}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Exploring the SQL injection vulnerabilities of. bd domain web applications.\n \n \n \n\n\n \n Alam, D.; Farah, T.; and Kabir, M. A.\n\n\n \n\n\n\n In
3rd International Conference on Advances in Computing, Electronics and Communication (ACEC 2015), pages 10–11, 2015. \n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{alam2015exploring,\n title={Exploring the SQL injection vulnerabilities of. bd domain web applications},\n author={Alam, Delwar and Farah, Tanjila and Kabir, Md Alamgir},\n booktitle={3rd International Conference on Advances in Computing, Electronics and Communication (ACEC 2015)},\n pages={10--11},\n year={2015}\n}\n\n\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2013\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n A survey on security requirements elicitation and presentation in requirements engineering phase.\n \n \n \n\n\n \n Kabir, M. A.; and Rahman, M. M.\n\n\n \n\n\n\n
American Journal of Engineering Research (AJER), 2(12): 360–366. 2013.\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{kabir2013survey,\n title={A survey on security requirements elicitation and presentation in requirements engineering phase},\n author={Kabir, Md Alamgir and Rahman, Md Mijanur},\n journal={American Journal of Engineering Research (AJER)},\n volume={2},\n number={12},\n pages={360--366},\n year={2013},\n publisher={American Journal of Engineering Research (AJER)}\n}\n\n\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n Model for Identifying the Security of a System: A Case Study of Point Of Sale System.\n \n \n \n\n\n \n Sagar, M. A. K.; Rahman, M. M.; and Jabiullah, M. I.\n\n\n \n\n\n\n
IOSR Journal of Computer Engineering (IOSR-JCE). 2013.\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{sagar2013model,\n title={Model for Identifying the Security of a System: A Case Study of Point Of Sale System},\n author={Sagar, Md Alamgir Kabir and Rahman, Md Mijanur and Jabiullah, Md Ismail},\n journal={IOSR Journal of Computer Engineering (IOSR-JCE)},\n year={2013}\n}\n\n\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2012\n \n \n (2)\n \n \n
\n
\n \n \n
\n\n\n
\n
\n\n \n \n \n \n \n Strong Message Authentication and Confidentiality Checking Approach through Authentication Code Tied to Ciphertext.\n \n \n \n\n\n \n Khan, S. I.; Kabir, M. A.; Rahman, A.; Jabiullah, M. I.; and Rahman, M L.\n\n\n \n\n\n\n
J. Bangladesh Electron. 2012.\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{khan2012strong,\n title={Strong Message Authentication and Confidentiality Checking Approach through Authentication Code Tied to Ciphertext},\n author={Khan, Sydul Islam and Kabir, Md Alamgir and Rahman, Anisur and Jabiullah, Md Ismail and Rahman, M Lutfar},\n journal={J. Bangladesh Electron},\n year={2012}\n}\n\n\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n undefined\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n Session 6: Digital forensics and cyber security.\n \n \n \n\n\n \n Tajuddin, T. B.; Abd Manaf, A.; Piazza, M.; Olmsted, A.; Cho, G.; Farah, T.; Alam, D.; Kabir, M. A.; and Bhuiyan, T.\n\n\n \n\n\n\n . .\n
\n\n
\n\n
\n\n
\n\n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{tajuddinsession,\n title={Session 6: Digital forensics and cyber security},\n author={Tajuddin, Taniza Binti and Abd Manaf, Azizah and Piazza, Matt and Olmsted, Aspen and Cho, Gyu-Sang and Farah, Tanjila and Alam, Delwar and Kabir, Md Alamgir and Bhuiyan, Touhid}\n}\n\n\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n