Publications by Year
2025
J04. Rahman, M., Ahsan, M.S., Chen, CW. et al. A census-based genetic algorithm for target set selection problem in social networks. Neural Comput & Applic (2025). https://doi.org/10.1007/s00521-025-11480-3 (PDF)
J03. Ahsan, M. S., Islam, S., & Shatabda, S. (2025). A systematic review of metaheuristics-based and machine learning-driven intrusion detection systems in IoT. Swarm and Evolutionary Computation, 96, 101984. (PDF)
J02. Ahsan, M. S., & Pathan, A. S. K. (2025). A Comprehensive Survey on the Requirements, Applications, and Future Challenges for Access Control Models in IoT: The State of the Art. IoT, 6(1), 9. (PDF)
2024
[Accepted] Mohammad Shamim Ahsan, Abu Reyan Ahmed, and Md. Saidur Rahman, “Randomized Algorithm for Online k-Server Problem on a Line,” Lecture Notes in Networks and Systems (LNNS), Springer, in 9th International Conference on Information and Communication Technology for Competitive Strategies (ICTCS), 2024 (PDF)
C02. Ahmed, S. N., Sajib, M. S. I., Ahmed, N., Ali, U. S., Fariha, L. T. J., Afroz, A., ... & Ahsan, M. S. (2024, October). AI and RBAC Enhanced Security System for Hospitals in Bangladesh. In Proceedings of the 3rd International Conference on Computing Advancements (pp. 169-176). (PDF)
C01. Uddin, M. A., Sonali, S. H., Rahman, M. S., & Ahsan, M. S. (2024, September). Deep Learning for Agile Malware Detection. In 2024 IEEE Region 10 Symposium (TENSYMP) (pp. 1-6). IEEE. (PDF)
J01. Ahsan, M. S., Islam, M. S., Hossain, M. S., & Das, A. (2024). “Detecting Smart Home Device Activities Using Packet-Level Signatures from Encrypted Traffic.” IEEE Transactions on Dependable and Secure Computing (TDSC). (PDF)