Follow
Al Amin Hossain
Title
Cited by
Cited by
Year
Hilbert‐order based spatial cloaking algorithm in road network
YK Kim, A Hossain, AA Hossain, JW Chang
Concurrency and Computation: Practice and Experience 25 (1), 143-158, 2013
252013
Privacy and Security Concern of Online Social Networks from User Perspective
AA Hossain, W Zhang
International Conference on Information Systems Security and Privacy (ICISSP …, 2016
222016
Shear-based spatial transformation to protect proximity attack in outsourced database
AA Hossain, SJ Lee, EN Huh
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 …, 2013
152013
Privacy-aware cloaking technique in location-based services
A Hossain, AA Hossain, SJ Jang, JW Chang
2012 IEEE First International Conference on Mobile Services, 9-16, 2012
152012
H-star: Hilbert-order based star network expansion cloaking algorithm in road networks
AA Hossain, A Hossain, HK Yoo, JW Chang
2011 14th IEEE International Conference on Computational Science and …, 2011
152011
Refundable service through cloud brokerage
AA Hossain, EN Huh
Cloud Computing (CLOUD), 2013 IEEE Sixth International Conference on, 972-973, 2013
142013
Rapid cloud data processing with healthcare information protection
AA Hossain, SMS Ferdous, S Islam, N Maalouf
Services (SERVICES), 2014 IEEE World Congress on, 454-455, 2014
72014
Spatial Cloaking Method Based on Reciprocity Property for Users' Privacy in Road Networks
A Hossain, AA Hossain, JW Chang
2011 IEEE 11th International Conference on Computer and Information …, 2011
72011
Effect of poultry manure and lime in combination with chemical fertilizer on groundnut production in char areas under tista mender flood plain agro ecological zone in Bangladesh
Z Ferdous, A Hossain, NU Mahmud, R Ali, NU Ahmed
Int. J. Sustain. Crop Prod 12 (1), 10-14, 2017
62017
A framework of smart Internet of Things based cloud computing
MM Islam, PP Hung, AA Hossain, M Aazam, MAG Morales, AA Alsaffar, ...
Research Notes in Information Science (RNIS) 14, 646-651, 2013
62013
K-anonymous cloaking algorithm based on weighted adjacency graph for preserving location privacy
A Hossain, AA Hossain, SJ Jang, YS Shin, JW Chang
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
62012
A spatial transformation scheme supporting data privacy and query integrity for security of outsourced databases
HI Kim, AA Hossain, JW Chang
Security and Communication Networks 7 (10), 1498-1509, 2014
52014
Cloud computing: Physical and virtual network related issues
M Aazam, AM Syed, AA Hossain, EN Huh
5th International Conference on Internet Technologies and Applications, ITA …, 2013
52013
Integrated water resources management: A case study for Barind Area, Bangladesh
MT Islam, DM Hossain, AA Hossain
IOSR Journal of Mechanical and Civil Engineering (IOSRJMCE) 11 (5), 01-08, 2014
22014
Cloud broker-based refundable service on multitenant environment
AA Hossain, YR Shin, SJ Lee, CS Lim, EN Huh
ICT for Smart Society (ICISS), 2013 International Conference on, 1-5, 2013
22013
An Innovative Proposal for Data Distribution Optimization in Cloud Computing
PP Hung, AA Hossain, MM Islam, MAG Morales, HW Lee, EN Huh
2013 International Conference on Information Science and Applications (ICISA …, 2013
12013
Shear-based spatial transformation to protect proximity attack of cloud data
AA Hossain, SJ Lee, YR Shin, MM Islam, CS Lim, EN Huh
International Conference on ICT for Smart Society, 1-5, 2013
12013
Healthcare data supervision and secrecy in cloud computing
이승진, 허의남
한국정보처리학회 학술대회논문집 20 (1), 695-697, 2013
12013
Comprehensive Survey of Machine Learning Techniques for Detecting and Preventing Network Layer DoS Attacks
NP Bhatta, A Ghimire, AA Hossain, F Amsaad
IFIP International Internet of Things Conference, 347-356, 2023
2023
Identification and Localization of Quantum Electromagnetic Fields of Hardware Trojan Attacks Using QDM-Based Unsupervised Deep Learning
A Ghimire, AA Hossain, NP Bhatta, F Amsaad
2023 IEEE Physical Assurance and Inspection of Electronics (PAINE), 1-7, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20