Publications

1. Sharmin Afrose, Wenjia Song, Charles B. Nemeroff, Chang Lu, Danfeng (Daphne) Yao (2022). Subpopulation‑specific Machine Learning Prognosis for Underrepresented Patients with Double Prioritized Bias Correction. Communications Medicine (accepted), MedRxiv doi: https://doi.org/10.1101/2021.03.26.21254401

2. Danfeng (Daphne) Yao, Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Miles Frantz, et al. Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding. IEEE Security & Privacy doi: https://doi.org/10.1109/MSEC.2022.3159481

3. Sharmin Afrose, Ya Xiao, Sazzadur Rahaman, Barton P. Miller, Danfeng (Daphne) Yao (2022). Development of Benchmarks for Java Cryptographic APIs and Evaluation of Static Vulnerability Detection Tools. IEEE Transactions on Software Engineering (Early Access) doi: https://doi.org/10.1109/TSE.2022.3154717

4. Sharmin Afrose, Danfeng (Daphne) Yao, & Olivera Kotevska (2021). Measurement of Local Differential Privacy Techniques for IoT‑based Streaming Data. 18th International Conference on Privacy, Security and Trust (PST), pp. 1–10. IEEE. doi: https://doi.org/10.1109/PST52912.2021.9647839.

5. Sharmin Afrose, Tanzima Hashem, and Mohammed Eunus Ali (2021). Frequent Itemsets Mining with a Guaranteed Local Differential Privacy in Small Datasets. In 33rd International Conference on Scientific and Statistical Database Management (SSDBM), pp. 232--236. doi: https://doi.org/10.1145/3468791.3468807

6. Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Ke Tian, Miles Frantz, Na Meng, Barton P. Miller, Fahad Shaon, Murat Kantarcioglu, and Danfeng (Daphne) Yao (2020). Deployment‑quality and Accessible Solutions for Cryptography Code Development. In Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy, pp. 174–176. doi: https://doi.org/10.1145/3374664.3379536

7. Sharmin Afrose, Sazzadur Rahaman, & Danfeng (Daphne) Yao (2019). CryptoAPI‑Bench: A Comprehensive Benchmark on Java Cryptographic API Misuses. IEEE Secure Development Conference (SecDev), pp. 49–61. IEEE. doi: https://doi.org/10.1109/SecDev.2019.00017

8. Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Fahad Shaon, Ke Tian, Miles Frantz, Murat Kantarcioglu, Danfeng (Daphne) Yao (2019). CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive‑sized Java Projects. ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 2455– 2472. doi: https://doi.org/10.1145/3319535.3345659

8. Nusrat Jahan Mozumder, Maitraye Das, Tanzima Hashem , Sharmin Afrose, and Khandakar Ashrafi Akbar (2019). Towards Privacy‑preserving Authenticated Disease Risk Queries. Journal of Information Processing, 27:624–642. doi: https://doi.org/10.2197/ipsjjip.27.624

9. Maitraye Das, Nusrat Jahan Mozumder, Sharmin Afrose, Khandakar Ashrafi Akbar, and Tanzima Hashem (2018). A Novel Secret Sharing Approach for Privacy‑Preserving Authenticated Disease Risk Queries in Genomic Databases. Annual Computer Software and Applications Conference (COMPSAC), vol. 1, pp. 645–654. IEEE. doi: https://doi.org/10.1109/COMPSAC.2018.00097

10. Syed Ishtiaque Ahmed, Steven J Jackson, Maruf Zaber, Mehrab B. Morshed, Md Habibullah Bin Ismail, and Sharmin Afrose (2013). Ecologies of Use and Design: Individual and Social Practices of Mobile Phone Use within Low‑literate Rickshawpuller Communities in Urban Bangladesh. In Proceedings of the 4th Annual Symposium on Computing for Development, pp. 1–10. doi: https://doi.org/10.1145/2537052.2537066