Mohammad Shamim Ahsan
PhD Student, Cybersecurity Researcher
"There is no one who goes out of his house to seek knowledge, but the angels lower their wings in approval of his action."
- The Prophet ﷺ
Welcome to My Webpage!
I'm a PhD student in the College of Information Sciences and Technology (IST) at Pennsylvania State University, currently working in the Penn State Cyber Security Lab under Professor Peng Liu, Raymond G. Tronzo, M.D., Professor of Cybersecurity. Before this, I obtained my bachelor's degree from the Department of Computer Science and Engineering (CSE) at Bangladesh University of Engineering and Technology (BUET) in 2023. After graduation, I served as a full-time Lecturer at United International University (UIU), Bangladesh.
Research Interest:
My research focuses on "AI-Driven Security for Intelligent Systems", securing critical cyber-physical infrastructure, software generation, and networked IoT environments with an emphasis on detecting, reasoning about, and mitigating malicious behavior in complex systems.
Cyber-Physical System Security --- Developed methods to distinguish faults and cyberattacks in DER systems using taint-styled dependency graphs with node pruning and pattern matching. Currently exploring the potential integration of LLMs to enhance Bayesian Network (BN)-based reasoning, improve scalability, and automate knowledge extraction.
LLM for Code --- Investigating vulnerabilities in the LLM code generation process and their potential for producing or developing malicious software, with a focus on detection and mitigation strategies.
IoT Network Security --- Explored security and privacy in Industrial and Smart Home IoT networks, including detecting smart home device activities from encrypted traffic, analyzing ML-based NIDSs on ambiguous IoT traffic, and uncovering false-positive rate manipulation attacks in industrial IoT systems.
Recent News:
09 July 2025: Elected as a Full Member of Sigma Xi, The Scientific Research Honor Society
06 May 2025: A literature review paper on IoT-NIDSs published in the Swarm and Evolutionary Computation (SWEVO) journal [Q1, IF=8.5 (2025)]
11 July 2024: A first-authored undergraduate work is published in IEEE TDSC
Graduate Research Assistant [2024-2026]
Department of Information Sciences and Technology, The Pennsylvania State University, University Park
Lecturer [2023-2024]
Department of Computer Science and Engineering, United International University, Dhaka, Bangladesh
Teaching
Computer Security (CSE 4531)
Cloud Computing (CSE 4587)
Discrete Mathematics (CSE 2213)
Structured Programming Language Lab (CSE 1112)
Data Structure and Algorithms I Lab (CSE 2216)
Mentoring
Supervised a group of undergrad students and published two conference papers from the "Computer Security (CSE 4531)" course projects
Undergraduate Research Assistant [2022-2023]
Department of Computer Science and Engineering, Bangladesh University of Engineering and Technology
2025
J04. Rahman, M., Ahsan, M.S., Chen, CW. et al. A census-based genetic algorithm for target set selection problem in social networks. Neural Comput & Applic (2025). https://doi.org/10.1007/s00521-025-11480-3 (PDF)
J03. Ahsan, M. S., Islam, S., & Shatabda, S. (2025). A systematic review of metaheuristics-based and machine learning-driven intrusion detection systems in IoT. Swarm and Evolutionary Computation, 96, 101984. (PDF)
J02. Ahsan, M. S., & Pathan, A. S. K. (2025). A Comprehensive Survey on the Requirements, Applications, and Future Challenges for Access Control Models in IoT: The State of the Art. IoT, 6(1), 9. (PDF)
2024
C03. Ahsan, M. S., Ahmed, A. R., & Saidur Rahman, M. (2024, December). Randomized Algorithm for Online k-Server Problem on a Line. In International Conference on Information and Communication Technology for Competitive Strategies (pp. 371-381). Singapore: Springer Nature Singapore. (PDF)
C02. Ahmed, S. N., Sajib, M. S. I., Ahmed, N., Ali, U. S., Fariha, L. T. J., Afroz, A., ... & Ahsan, M. S. (2024, October). AI and RBAC Enhanced Security System for Hospitals in Bangladesh. In Proceedings of the 3rd International Conference on Computing Advancements (pp. 169-176). (PDF)
C01. Uddin, M. A., Sonali, S. H., Rahman, M. S., & Ahsan, M. S. (2024, September). Deep Learning for Agile Malware Detection. In 2024 IEEE Region 10 Symposium (TENSYMP) (pp. 1-6). IEEE. (PDF)
J01. Ahsan, M. S., Islam, M. S., Hossain, M. S., & Das, A. (2024). “Detecting Smart Home Device Activities Using Packet-Level Signatures from Encrypted Traffic.” IEEE Transactions on Dependable and Secure Computing (TDSC). (PDF)
External Reviewer (Conference)
USENIX ATC'25
IEEE/IFIP DSN'25, DSN'26
ESORICS'26
ICCA'25
Reviewer (Journals)
Springer:
Archives of Computational Methods in Engineering
Neural Computing and Applications (NCAA)
Peer-to-Peer Networking and Applications (P2PNA)
Springer Nature Computer Science (SNCS)
Cluster Computing
IOS Press:
Journal of Computer Security
World Scientific:
International Journal of Foundations of Computer Science (IJFCS)
Inderscience:
International Journal of Computers and Applications (IJCA)
International Journal of Computational Science and Engineering (IJCSE)
Outside of research, I enjoy playing Chess and am currently in the learning phase, exploring strategies and improving my game.
I also play Cricket and have previously competed as a top-order batsman in school and collegiate tournaments.
PersonalQuote 1: "If any knowledge makes me arrogant, then it is worthless."
PersonalQuote 2: "Don't compare yourself with others; rather, compete with yourself. There will always be many people who are better than you."
© 2026 Mohammad Shamim Ahsan · Last updated: February 2026