Publications

Dissertation

Journals and Books

[JB9] Abdur R. Shahid and Ahmed Imteaj, "Securing Human Activity Recognition Systems Against Data Poisoning Attack", In Elsvier Internet of Things; Engineering Cyber Physical Human Systems (in preparation).

[JB8] Abdur R. Shahid and Ahmed Imteaj, "Adversarial Attack on Federated Learning-Based Human Activity Recognition Systems", In IEEE Transactions on Industrial Informatics (in preparation).

[JB7] Abdur R. Shahid and Ahmed Imteaj, "Does Local Differential Privacy Make Data Poisoning Harder to Detect in Industrial Human Activity Recognition Systems?", In IEEE Transactions on Industrial Informatics (in preparation).

[JB6] Ahmed Imteaj, Abdur R. Shahid, and Saika Zaman, "Leveraging Blockchain Interoperability for Interdependent Networks", in IEEE Consumer Electronics Magazine, doi: 10.1109/MCE.2023.3245283.

[JB5] Sajdul Talukder, Abdur R. Shahid, and Bogdan Carbunar, "AI-based Detection and Defenses Against Abusive Friend Attacks in Online Social Networks", In Artificial Intelligence in Cybersecurity: The State of the art (Accepted as a book chapter).

[JB4] Abdur R. Shahid, Sajdul Talukder, and Tasnimun Faika, "Defending Against Personality Prediction Attack in Handwriting Recognition-based Systems Using a Local Differentially Private Machine Learning (ML) Framework", In Artificial Intelligence in Cybersecurity: The State of the art (Accepted as a book chapter).

[JB3] Abdur R. Shahid, Niki Pissinou, and Sajedul Talukder. "Protecting Location Privacy in Blockchain-based Mobile Internet of Things".  In: Daimi, K., Dionysiou, I., El Madhoun, N. (eds) Principles and Practice of Blockchains. Springer, Cham. https://doi.org/10.1007/978-3-031-10507-4_5.

[JB2] Abdur R. Shahid, Niki Pissinou, S.S. Iyengar, and Kia Makki. "Delay-Aware Privacy-Preserving Location-Based Services under Spatiotemporal Constraints".  International Journal of Communication Systems, 34(1), e4656.

[JB1]  Wei Zeng, Muhammad Razib, and Abdur R. Shahid. "Diffeomorphism Spline." Axioms 4, no. 2 (2015): 156-176.  

Conferences

[C17] Abdur R. Shahid, and Ahmed Imteaj, " Data Poisoning Attack Against Federated Learning-Based Wearable Human Activity Recognition System". In The 2023 International Workshop on AI-Driven Trustworthy, Secure, and Privacy-Preserving Computing (AidTSP @ IEEE INFOCOM 2023). (In Submission)

[C16] Abdur R. Shahid, Ahmed Imteaj, Peter Y. Wu, Diane A. Igoche, Tauhidul Alam, "Label Flipping Data Poisoning Attack Against Wearable Human Activity Recognition System". In 2022 IEEE Symposium Series on Computational Intelligence (SSCI), 2022.

[C15] Hussein Zangoti, Alex P. Makki, Niki Pissinou, Abdur R. Shahid, Omar J. Guerra, Joel Rodriguez, "A Multidimensional Blockchain Framework For Mobile Internet of Things". In 2022 International Conferences on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE.

[C14] Abdur  R. Shahid, and Sajedul Talukder, "Evaluating Machine Learning Models for Handwriting Recognition-based Systems under Local Differential Privacy", 2021 Innovations in Intelligent Systems and Applications Conference (ASYU), pp. 1-6. IEEE, 2021

[C13] Abdur  R. Shahid, and Sajedul Talukder, "A Study of Differentially Private Machine Learning in Healthcare", 2021 Innovations in Intelligent Systems and Applications Conference (ASYU), pp. 1-6. IEEE, 2021

[C12] Abdur  R. Shahid, and Sajedul Talukder, "Applying Local Differential Privacy in Handwriting Recognition-based Systems", In proceedings of the 37th ACM CCSC Eastern Conference (ACM CCSC), October 2021.

[C11] Abdur  R. Shahid, and Sajedul Talukder, "Enhancing Alternative Proof of Work for Cryptocurrencies Using Machine Learning", In proceedings of the 37th ACM CCSC Eastern Conference (ACM CCSC), October 2021.

[C10] Abdur  R. Shahid, and Sajedul Talukder, "Privacy-Preserving Activity Recognition from Sensor Data", In proceedings of the 37th ACM CCSC Eastern Conference (ACM CCSC), October 2021.

[C9] Abdur  R. Shahid, and Sajedul Talukder, "Evaluation of Privacy-Preserving Logistic Regression and Naive Bayes Classifiers in Healthcare", In Proceedings of the 37th ACM CCSC Eastern Conference (ACM CCSC), October 2021. 

[C8] T. Alam, J. Taylor, J. Taylor,S. Badsha, A. Shahid, and A. S. M. Kayes, “Leveraging Blockchain for Spoof-Resilient Robot Networks, 13th International Conference on Intelligent Robotics and Applications” (ICIRA 2020), LNCS, Springer

[C7] Arpan Bhattacharjee, Shahriar Badsha, Abdur R. Shahid, Hanif Livani, and Shamik Sengupta, "Block-Phasor: A Scalable Blockchain Framework to Enhance Security of Synchrophasor and Smart Meter". 2020 IEEE Kansas Power and Energy Conference (KPEC), 2020.

[C6] Abdur R. Shahid, Niki Pissinou, Sheila Alemany, Ahmed Imteaj, Kia Makki, and Laurent Njilla. "Quantifying Location Privacy in Permissioned Blockchain-based Internet of Things (IoT)". In 2019 EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous), 2019.

[C5] Abdur R. Shahid, Niki Pissinou, Corey Staier, and Rain Kwan. "Sensor-Chain: A Lightweight Scalable Blockchain Framework for Internet of Things". In 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (pp. 1154-1161). IEEE.  (Basis of an Awarded Research Grant from the  US Air Force Office of Scientific Research (AFOSR). Reach the entire research from here.)

[C4Yujian Tang, Samia Tasnim, Niki Pissinou, S. S. Iyengar, and Abdur R. Shahid. "Reputation-Aware Data Fusion and Malicious Participant Detection in Mobile Crowdsensing." In 2018 IEEE International Conference on Big Data (Big Data), pp. 4820-4828. IEEE, 2018.

[C3] Abdur R. Shahid, Niki Pissinou, S. S. Iyengar, and Kia Makki. "Check-ins and Photos: Spatiotemporal Correlation-Based Location Inference Attack and Defense in Location-Based Social Networks." In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), pp. 1852-1857. IEEE, 2018.

[C2] Abdur R. Shahid, Niki Pissinou, S. S. Iyengar, Jerry Miller, Ziqian Ding, and Teresita Lemus. "KLAP for Real-World Protection of Location Privacy." In 2018 IEEE World Congress on Services (IEEE SERVICES), pp. 17-18. IEEE, 2018.

[C1] Abdur R. Shahid, Liz Jeukeng, Wei Zeng, Niki Pissinou, S. S. Iyengar, Sartaj Sahni, and Maite Varela-Conover. "PPVC: Privacy-Preserving Voronoi Cell for location-based services." In 2017 International Conference on Computing, Networking and Communications (ICNC), pp. 351-355. IEEE, 2017.

Workshops, Posters, and Demo

[WPD4] Melinda Goda and Kaylan Sheally, and Abdur R. Shahid, "Breast-Cancer Classification using Differentially-Private Machine Learning " In Consortium for Computing Sciences in Colleges, (CCSC:Northeast), 2021 (Runner up in Best Poster Award)

[WPD3] Deigo Marti Perez, and Abdur R. Shahid, "Human Activity Recognition with Privacy-Preserving Machine Learning " In Consortium for Computing Sciences in Colleges, (CCSC:Central Plains), 2021 

[WPD2] Kaylan Sheally, and Abdur R. Shahid, "Privacy-Preserving Machine Learning and Blockchain for Secure Distributed UAV Networks " In Consortium for Computing Sciences in Colleges, (CCSC:Central Plains), 2021 

[WPD1] Abdur R. Shahid, Niki Pissinou, laurent Njilla, Edwin Aguilar, and Eric Perez. "Demo: Towards the Development of a Differentially Private Lightweight and Scalable Blockchain for IoT." In 16th IEEE International Conference on Mobile Ad-Hoc and Smart Systems (MASS), IEEE. (Final Deliverable of US AAFSOR grant-supported research project. Reach the entire research from here.)

Non Peer-Reviewed Publications

[M1] Zeng, Wei, Abdur B. Shahid, Keyan Zolfaghari, Aditya Shetty, Niki Pissinou, and Sitharama S. Iyengar. "n-VDD: Location Privacy Protection Based on Voronoi-Delaunay Duality." arXiv preprint arXiv:1906.09158 (2019).