default search action
Tarem Ahmed
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Khorshed Alam, Mahbubul Haq Bhuiyan, Injamam Ul Haque, Md Fahad Monir, Tarem Ahmed:
Enhancing Stock Market Prediction: A Robust LSTM-DNN Model Analysis on 26 Real-Life Datasets. IEEE Access 12: 122757-122768 (2024) - [j7]Sabir Saheel, Anik Alvi, Aninda Roy Ani, Tarem Ahmed, Mohammad Faisal Uddin:
Semi-supervised, Neural Network based approaches to face mask and anomaly detection in surveillance networks. J. Netw. Comput. Appl. 222: 103786 (2024) - [c25]Ishtiaque Ahmed Toke, Md Fahad Monir, Tarem Ahmed:
Blockchain in Agriculture: A Scalable Solution for Crop Quality Assessment and Data Integrity. BlackSeaCom 2024: 205-210 - [c24]Ashim Saha, Lubaina Ali, Rudrita Rahman, Md Fahad Monir, Tarem Ahmed:
Exploring Federated Learning: The Framework, Applications, Security & Privacy. BlackSeaCom 2024: 272-275 - [c23]Noor Masrur, Nabarun Halder, Sami Rashid, Jahanggir Hossain Setu, Ashraful Islam, Tarem Ahmed:
Performance Analysis of Ensemble and DNN Models for Decoding Mental Stress Utilizing ECG-Based Wearable Data Fusion. BlackSeaCom 2024: 276-279 - 2023
- [j6]Suryaia Rahman, Md Zahangir Alam, Ashraful Islam, Md. Tarek Habib, Eshtiak Ahmed, Mahady Hasan, Tarem Ahmed:
Low-cost relay selection in multihop cooperative networks. J. King Saud Univ. Comput. Inf. Sci. 35(9): 101760 (2023) - [c22]Ishtiaque Ahmed Toke, Mahir Mohammad Faisal Rahman, Md Fahad Monir, Tarem Ahmed, Khondkar Ayaz Rabbani:
IoT Driven Smart Greenhouse: A Cost-Effective and User-Centric Automation Solution For Agriculture. ANTS 2023: 503-508 - [c21]Joy Bhowmik, Md Fahad Monir, Sayed Abdullah Al Naiyem, Md Asfaqur Rahman, Bijoy Bhowmik, Tarem Ahmed:
Design and Development of a Low-Cost Automated Parking System for Developing Countries. EUROCON 2023: 30-35 - [c20]Ashikur Rahman, Fatematuz Jahura, Md Jahid Hasan, Akram Hossain, Md Fahad Monir, Tarem Ahmed:
Intelligent Road Safety: IoT-enabled Drunk Driving and Accident Detection System. EUROCON 2023: 48-53 - [c19]Mahbubul Haq Bhuiyan, Rezaul Khan Ahad, Abrar Jawad Haque, Md Fahad Monir, Tarem Ahmed:
An Affordable and Effective IoT-Based Home Automation and Security System for Everyone. EUROCON 2023: 325-330 - [c18]Aninda Roy Ani, Sabir Saheel, Tarem Ahmed, Mohammad Faisal Uddin:
Neural Network based Unsupervised Face and Mask Detection in Surveillance Networks. ICNC 2023: 30-34 - [c17]Md. Junayed Hossain, Mohammad Barkatullah, Md Fahad Monir, Tarem Ahmed:
Repercussion of Image Compression on Satellite Image Classification using Deep Learning Models. VTC Fall 2023: 1-5 - [c16]Birupaxha Mondal, Fahim Faisal, Zeba Tusnia Towshi, Md Fahad Monir, Tarem Ahmed:
A Gradient Boosted ML Approach to Feature Selection for Wireless Intrusion Detection. VTC2023-Spring 2023: 1-5 - 2021
- [c15]Anik Alvi, Tarem Ahmed, Mohammad Faisal Uddin:
Comparative Study of Traditional Techniques for Unsupervised Autonomous Intruder Detection. AINA (1) 2021: 519-530 - [i1]Nazifa M. Shemonti, Shifat Uddin, Saifur Rahman, Tarem Ahmed, Mohammad Faisal Uddin:
Automated, real-time hospital ICU emergency signaling: A field-level implementation. CoRR abs/2111.01999 (2021) - 2020
- [j5]Salva Daneshgadeh Çakmakçi, Thomas Kemmerich, Tarem Ahmed, Nazife Baykal:
Online DDoS attack detection using Mahalanobis distance and Kernel-based learning algorithm. J. Netw. Comput. Appl. 168: 102756 (2020)
2010 – 2019
- 2019
- [c14]Salva Daneshgadeh, Thomas Kemmerich, Tarem Ahmed, Nazife Baykal:
An Empirical Investigation of DDoS and Flash Event Detection Using Shannon Entropy, KOAD and SVM Combined. ICNC 2019: 658-662 - [c13]Salva Daneshgadeh, Tarem Ahmed, Thomas Kemmerich, Nazife Baykal:
Detection of DDoS Attacks and Flash Events Using Shannon Entropy, KOAD and Mahalanobis Distance. ICIN 2019: 222-229 - 2018
- [c12]Humayra Islam, Tarem Ahmed:
Anomaly Clustering Based on Correspondence Analysis. AINA 2018: 1019-1025 - [c11]Salva Daneshgadeh, Thomas Kemmerich, Tarem Ahmed, Nazife Baykal:
A Hybrid Approach to Detect DDoS Attacks Using KOAD and the Mahalanobis Distance. NCA 2018: 1-5 - [c10]Muhammad S. A. Khan, Mohammad S. Hasan, Tarem Ahmed:
A New Multi-Robot Search Algorithm Using Probabilistic Finite State Machine and Lennard-Jones Potential Function. ROBIO 2018: 850-855 - [c9]Muhammad S. A. Khan, Shoumik S. Chowdhury, Nafis Niloy, Fatema Tuz Zohra Aurin, Tarem Ahmed:
Sonar-based SLAM Using Occupancy Grid Mapping and Dead Reckoning. TENCON 2018: 1707-1712 - 2016
- [c8]Tarem Ahmed, Supriyo Ahmed, Fazle Elahi Chowdhury:
Taking meredith out of Grey's anatomy: Automating hospital ICU emergency signaling. ICASSP 2016: 1886-1890 - 2015
- [j4]Tarem Ahmed, Al-Sakib Khan Pathan, Supriyo Ahmed:
Learning Algorithms for Anomaly Detection from Images. Int. J. Syst. Dyn. Appl. 4(3): 43-69 (2015) - 2014
- [c7]Tarem Ahmed, Al-Sakib Khan Pathan, Supriyo Ahmed:
Adaptive algorithms for automated intruder detection in surveillance networks. ICACCI 2014: 2775-2780 - 2013
- [j3]Xianglin Wei, Jianhua Fan, Ming Chen, Tarem Ahmed, Al-Sakib Khan Pathan:
SMART: A Subspace based Malicious Peers Detection algorithm for P2P Systems. Int. J. Commun. Networks Inf. Secur. 5(1) (2013) - [j2]Tarem Ahmed, Xianglin Wei, Supriyo Ahmed, Al-Sakib Khan Pathan:
Efficient and effective automated surveillance agents using kernel tricks. Simul. 89(5): 562-577 (2013) - 2012
- [j1]Tarem Ahmed, Xianglin Wei, Supriyo Ahmed, Al-Sakib Khan Pathan:
Automated Intruder Detection from Image Sequences using Minimum Volume Sets. Int. J. Commun. Networks Inf. Secur. 4(1) (2012) - [c6]Xianglin Wei, Tarem Ahmed, Ming Chen, Al-Sakib Khan Pathan:
PeerMate: A malicious peer detection algorithm for P2P systems based on MSPCA. ICNC 2012: 815-819 - 2010
- [c5]Tarem Ahmed:
Flow Vector Prediction in Large IP Networks. AINA 2010: 342-349 - [c4]Tarem Ahmed:
Flow Vector Prediction Using EM Algorithms. ICC 2010: 1-6 - [c3]Tarem Ahmed, Sabrina Ahmed, Supriyo Ahmed, Murtaza Motiwala:
Real-Time Intruder Detection in Surveillance Networks Using Adaptive Kernel Methods. ICC 2010: 1-5
2000 – 2009
- 2009
- [c2]Tarem Ahmed:
Online Anomaly Detection Using KDE. GLOBECOM 2009: 1-8 - 2007
- [c1]Tarem Ahmed, Mark Coates, Anukool Lakhina:
Multivariate Online Anomaly Detection Using Kernel Recursive Least Squares. INFOCOM 2007: 625-633
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-23 00:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint