Major Publications

A current list of all lab publications can be found here.  The following is a selection of our major publications.

  • AKM Jahangir Alam Majumder, Piyush Saxena, Sheikh Iqbal Ahamed: Your Walk is My Command: Gait Detection on Unconstrained Smartphone UsingIoT System, Proceedings of IEEE Computer Society’s International Computers, Software & Applications Conference (COMPSAC) 2016.
  • Ivor D. Addo, Sheikh Iqbal Ahamed, William C. ChuTowards Modeling Confidentiality in Persuasive Robot Dialogue. ICOST 2016: 436-442
  • Ferdaus Ahmed Kawsar, Md. Kamrul Hasan, Tanvir Roushan, Sheikh Iqbal Ahamed, William C. Chu, Richard Love: Activity Detection Using Time-Delay Embedding in Multi-modal Sensor System. ICOST 2016:489-499
  • Munirul M. Haque*, Ferdaus Kawsar*, Md. Adibuzzaman*, Sheikh I. Ahamed, Richard Love, Rumana Dowla, David Roe, Reza Selim, Findings of e-ESAS: A Mobile Based Symptom Monitoring System for Breast Cancer Patients in Rural Bangladesh, Proceedings of the Association for Computing Machinery (ACM)’s Special Interest Group on Computer–Human Interaction (SIGCHI) Conference on Human Factors in Computing Systems (CHI), May 5–10, 2012, Austin, Texas.  (10 pages) [Honorable mention for Best paper]
  •  Farzana Rahman* and Sheikh Iqbal Ahamed, DRAP: A Robust Authentication Protocol to Ensure Survivability of Computational RFID Networks, Proceedings of ACM Symposium on Applied Computing (SAC 2012), Italy, March, 2012. (Acceptance rate: 24%) (6 pages)
  • Md. Endadul Hoque, Farzana Rahman, and Sheikh Iqbal Ahamed, AnonPri: An Efficient Anonymous Private Authentication Protocol, IEEE International Conference on Pervasive Computing and Communications(PerCom), 2011, pp. 100-110) (Acceptance rate: 12%)
  • Farzana Rahman, Md. Endadul Hoque, Ferdaus Ahmed Kawsar, and Sheikh Iqbal Ahamed, Preserve Your Privacy with PCO: A Privacy Sensitive Architecture for Context Obfuscation for Pervasive E-Community based applications,  to appear in The Second IEEE International Conference on Social Computing (SocialCom-2010), (Acceptance rate:  13%
  •  Nilothpal Talukder, Sheikh Iqbal Ahamed, Preventing Multi-query Attack in Location-based Services, Proceedings of the Third ACM Conference on Wireless Network Security (WiSec), March 2010, pp. 25-36.(Acceptance rate:  9%)
  • Sheikh Iqbal Ahamed, Munirul M. HaqueMd. Endadul HoqueFarzana RahmanNilothpal Talukder: Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments. Journal of Systems and Software 83(2): 253-270 (2010)
  • Md. Endadul Hoque, Farzana Rahman, Sheikh I. Ahamed and Jong Hyuk Park,  “Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments”,International Journal of Wireless Personal Communications 2009Springer 10.1007/s11277-009-9786-0
  • Mehrab Monjur, Sheikh I Ahamed and Chowdhury Sharif Hasan,“ “ELALPS: A Framework To Eliminate Location Anonymizer from Location Privacy Systems,”  Proceedings of the  33rd Annual International Computer Software and Applications Conference (COMPSAC 2009), IEEE CS Press, Seattle, USA, July 20-24,  2009. [Beginning 2006, COMPSAC is designated as the IEEE Computer Society Signature Conference on Software Technology and Applications] (Best Paper Award)
  • Chowdhury Sharif Hasan, Sheikh I Ahamed and Mohammad Tanviruzzaman,“ A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services,”  Proceedings of the  33rd Annual International Computer Software and Applications Conference (COMPSAC 2009), IEEE CS Press, Seattle, USA, July 20-24, 2009.
  • Rezwan Islam, Sheikh Iqbal Ahamed, Chowdhury S. HasanMohammad Tanviruzzaman, “Towards Universal Access to Home Monitoring for Assisted Living Environment”,  HCI (6) 2009, pp. 189-198..
  • Munirul M. Haque and Sheikh I Ahamed, “An Impregnable Lightweight Device Discovery (ILDD) Model for Pervasive Computing Environment of Enterprise Applications ,” IEEE Transactions on Systems, Man, and Cybernetics, Volume 38,  Issue 3,  May 2008, pp. 334-346.
  •  Sheikh I. Ahamed, Farzana Rahman, Endadul Hoque, Fahim Kawsar, Tatsuo Nakajima; “Secure and Efficient Tag Searching in RFID Systems using Serverless Search Protocol”; International Journal of Security and Its Applications, Vol.3, No.4, October 2008.
  •  Ian Obermiller and Sheikh I. Ahamed, “PATHOS: Pervasive at Home Sleep Monitoring”, International Journal of Telemedicine and Applications,  Volume 2008 (2008), Article ID 290431, 9 pages, doi:10.1155/2008/290431.
  • Sheikh I. Ahamed  and Moushumi Sharmin, “A trust-based secure service discovery (TSSD) model for pervasive computing”, International Journal of Communications 2008, Elsevier, 13 pages
  • Shameem Ahmed, Moushumi Sharmin, and Sheikh I. Ahamed, “Ubi-App: A Ubiquitous Application using Ubicomp Assistant (UA) Service of MARKS for Universal Access from Handheld Devices,”International Journal Universal Access in the Information Society (UAIS), Springer –Verlag, March 2008, 11 pages.
  •  Sheikh I. Ahamed, Mohammad Zulkernine, and    Steven T. Wolfe, “A software-based trust framework for distributed industrial management systems”,  International Journal of System and Software 2007, Elsevier publications, 80(10), pp. 1621-1630, 2007.
  • Nilothpal Talukder and Sheikh I Ahamed “FPCS: A Formal Approach for Privacy-aware Context-based Services,”  Proceedings of the  32nd Annual International Computer Software and Applications Conference (COMPSAC 2008), IEEE CS Press, Turku, Finland, July 28-August 1, 2008, pp. 432-439
  •  Sheikh I Ahamed, Nilothpal Talukder and Mehrab Monjur, “WiFi Radar: Design and Implementation of an Infrastructure-less Location Tracking System for Pervasive Environment,”  Proceedings of the  32nd Annual International Computer Software and Applications Conference (COMPSAC 2008), IEEE CS Press, Turku, Finland, July 28-August 1, 2008, 335-338.
  • Rezwan Islam, Sheikh Iqbal Ahamed, Nilothpal TalukderIan Obermiller, “Usability of Mobile Computing Technologies to Assist Cancer Patients.”,  Proceedings of the HCI and Usability for Medicine and Health Care, Third Symposium of the Workgroup Human-Computer Interaction and Usability Engineering of the Austrian Computer Society, USAB 2007, Graz, Austria, November, 22, 2007, Proceedings. Lecture Notes in Computer Science 4799 Springer 2007, pp. 227-240.
  •   Sheikh I. Ahamed, Munirul M Haque, and Nilothpal Talukder,  “Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx ,” Proc. of the 23rd Annual ACM Symposium on Applied Computing (ACM SAC’08), to appear, 6 pages, Ceará, Brazil, March 2008, ACM Press.
  •    Mohammad Uddin, Mohammad Zulkernine, and Sheikh I. Ahamed, “CAT: A Context-Aware Trust Model for Open and Dynamic Systems,” Proc. of the 23rd Annual ACM Symposium on Applied Computing (ACM SAC’08), to appear, 6 pages, Ceará, Brazil, March 2008, ACM Press.
  • Moushumi Sharmin, Sheikh I. Ahamed , and Shameem Ahmed, , “A Risk-aware Trust Based Secure Resource Discovery (RTSRD) Model for Pervasive Computing,” To appear in the proceedings of  The 2nd IEEE International Workshop on Web and Pervasive Security of PerCom,  Hong Kong, March 2008
  •  Sailaja  Bulusu, Sheikh I. Ahamed, and Mohammad Zulkernine, “DIRT: A Trust Model For Pervasive Applications,” The Second International Workshop on Ubiquitous & Trustworthy Computing (TwUC), to appear, Jakarta, Indonesia, December 2007. (Best Paper Award)
  •  Munirul Haque and Sheikh I Ahamed “An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment,”  Proceedings of the  31st Annual International Computer Software and Applications Conference (COMPSAC 2007), IEEE CS Press, Beijing, China, July 23-27,  pp. 49-56. [Beginning 2006, COMPSAC is designated as the IEEE Computer Society Signature Conference on Software Technology and Applications] (Best Paper Award)
  •   Munirul Haque, Sheikh I Ahamed, Haifeng Li, and KM Asif, “An Authentication based Lightweight Device Discovery (ALDD) Model for Pervasive Computing,”  Proceedings of the  31st Annual International Computer Software and Applications Conference (COMPSAC 2007), IEEE CS Press, Beijing, China, July 57-64. [COMPSAC is designated as the IEEE Computer Society Signature Conference on Software Technology and Applications.]
  • Pankaj Bhaskar and Sheikh I Ahamed, “Privacy in Pervasive Computing and Open Issues,”  Proceedings of The Second IEEE International Conference on Availability, Reliability and Security (ARES 07), IEEE CS Vienna, Austria,  April 10-13, 2007, pp. 147-154.
  • Sheikh I Ahamed, Munirul Haque, and KM Asif,  S-MARKS: A Middleware Secure by Design for the Pervasive Computing Environment, Proceedings of the Fourth International Conference on Information Technology : New Generations (ITNG 2006),  IEEE CS Press, April, 2007, Las Vegas, Nevada, USA,  pp. 303-308
  •  Sheikh I. Ahamed, Munirul Haque, Karl Stamm and Ahmed J Khan,  “Wellness Assistant: A Virtual Wellness Assistant on a Handheld Device using Pervasive Computing, Proceedings of the 22nd Annual ACM Symposium on Applied Computing (ACM SAC 2007), Seoul, Korea, March 2007, pp. 782-787.
  • Shameem Ahmed, Sheikh I. Ahamed, Moushumi Sharmin, and Munirul Haque, “Self-healing for Autonomic Pervasive Computing”,  Proceedings of the 22nd Annual ACM Symposium on Applied Computing (ACM SAC 2007), Seoul, Korea, March 2007, pp. 110-111.
  •   Sheikh I. Ahamed, Moushumi Sharmin, Shameem Ahmed, Munirul Haque, and Ahmed J Khan,  “Design and Implementation of A Virtual Assistant for Healthcare Professionals Using Pervasive Computing Technologies, ”  Journal Springer e&i, vol 123(4), April 2006, pp. 112-120.
  •  Munirul Haque and Sheikh Iqbal Ahamed,    “m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications,”  Proceedings of the International Conference on Parallel Processing Workshops (ICPPW’06), IEEE CS Press, August  2006, pp. 189-195. 
  • Moushumi Sharmin,  Sheikh I. Ahamed,   Shameem Ahmed, and Haifeng Li , “SSRD+:  A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment,”  Proceedings 30th Annual International Computer Software and Applications Conference (COMPSAC 2006), IEEE CS Press, Chicago, USA, September 17-21, 2006, pp. 67-70.
  •  Munirul Haque and Sheikh Iqbal Ahamed, “Security in Pervasive Computing: Current Status and Open Issues,” International Journal of Network Security,  Vol. 3, No. 3, 2006,  pp. 203-214.(Invited paper)
  • Shaun Szot, Sheikh I. Ahamed, Munirul M. Haque, and   Mohammad M. Molla, “Transparent Lightweight Device Discovery Model (TLDDM) Support for Ubiquitous Computing Middleware and Applications”, UbiSys: System Support for Ubiquitous Computing workshop of the 8th International Conference of Ubiquitous Computing (UbiComp 2006),  ACM and Springer Verlag, September 2006.
  • Moushumi Sharmin, Shameem Ahmed, and Sheikh I. Ahamed, “An Adaptive Lightweight Trust Reliant Secure Resource Discovery for Pervasive Computing Environments, ” Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computer and Communications (PerCom 2006)Pisa, Italy, Mar 2006, pp. 258-263.
  •   Sheikh I. Ahamed, Mohammad Zulkernine, and Suresh Anamanamuri, “A Dependable Device Discovery Approach for Pervasive Computing Middleware,” Proceedings of the International Conference on Availability, Reliability and Security (AReS), IEEE CS Press, Vienna, Austria, April 2006, pp. 66-73
  • Moushumi Sharmin, Shameem Ahmed, and Sheikh I. Ahamed, “Ubicomp Assistant: An Omnipresent Customizable Service using MARKS, ” Proceedings of the 21st Annual ACM Symposium on Applied Computing (ACM SAC 2006), Dijon , France, April, 2006, pp. 1013-1017.
  • Moushumi Sharmin, Shameem Ahmed, Sheikh I. Ahamed, Munirul Haque, and Ahmed J Khan, “Healthcare Aide: Towards a Virtual Assistant for Doctors, Patients, Nurses and Resident Doctors Using Pervasive Middleware, ”  Proceedings of the 1st Workshop on Ubiquitous and Pervasive Health Care (UbiCare 2006) in conjunction with Fourth Annual IEEE International Conference on Pervasive Computer and Communications (PerCom 2006), Pisa, Italy, Mar 2006, pp. 490-495.
  •   Moushumi Sharmin, Shameem Ahmed, and Sheikh I. Ahamed, “MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) for Mobile Devices of Pervasive Computing Environments, ” Proceedings of the  Third International Conference on Information Technology : New Generations (ITNG 2006), April, 2006, Las Vegas, Nevada, USA, pp. 306-313.
  •   Sheikh I. Ahamed, Moushumi Sharmin, Shameem Ahmed, Michael J. Havice, and Suresh Anamanamuri, “An Assessment Tool for Out of Class Learning using Pervasive Computing Technologies, ” Journal of Information, vol 8(5), September 2005, pp. 751-767.
  • Moushumi Sharmin, Shameem Ahmed, and Sheikh I. Ahamed, “SAFE-RD (Secure, Adaptive, Fault Tolerant, and Efficient Resource Discovery) in Pervasive Computing Environments,” in the IEEE international Conference on Information Technology (ITCC 2005), Las Vegas, NV, USA, April 2005, p. 271-276