<?xml version="1.0"?>
<dblpperson name="Abdur Rahman Bin Shahid" pid="282/6664" n="52">
<person key="homepages/282/6664" mdate="2026-02-12">
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author pid="282/6664">Abdur R. Shahid</author>
<url>https://orcid.org/0000-0002-3168-8907</url>
</person>
<r><article key="journals/tsusc/HasanIS26" mdate="2026-02-11">
<author orcid="0009-0008-7414-9103" pid="372/7124">Syed Mhamudul Hasan</author>
<author orcid="0000-0002-6975-3997" pid="254/1362">Ahmed Imteaj</author>
<author orcid="0000-0002-3168-8907" pid="282/6664">Abdur R. Shahid</author>
<title>Quantifying Robustness and Sustainability Trade-Off in Federated Adversarial Learning for Cyber-Physical Systems.</title>
<year>2026</year>
<month>January - February</month>
<pages>15-28</pages>
<volume>11</volume>
<journal>IEEE Trans. Sustain. Comput.</journal>
<number>1</number>
<ee>https://doi.org/10.1109/TSUSC.2025.3633995</ee>
<url>db/journals/tsusc/tsusc11.html#HasanIS26</url>
<stream>streams/journals/tsusc</stream>
</article>
</r>
<r><article key="journals/ais/ShahidI25" mdate="2025-08-05">
<author orcid="0000-0002-3168-8907" pid="282/6664">Abdur Rahman Bin Shahid</author>
<author orcid="0000-0002-6975-3997" pid="254/1362">Ahmed Imteaj</author>
<title>Sticks and stones may break my bones, but words will never hurt me! - Navigating the cybersecurity risks of generative AI.</title>
<pages>1529-1530</pages>
<year>2025</year>
<month>March</month>
<volume>40</volume>
<journal>AI Soc.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s00146-024-01934-y</ee>
<url>db/journals/ais/ais40.html#ShahidI25</url>
<stream>streams/journals/ais</stream>
</article>
</r>
<r><article key="journals/cem/HasanSI25" mdate="2025-08-02">
<author orcid="0009-0008-7414-9103" pid="372/7124">Syed Mhamudul Hasan</author>
<author orcid="0000-0002-3168-8907" pid="282/6664">Abdur Rahman Bin Shahid</author>
<author orcid="0000-0002-6975-3997" pid="254/1362">Ahmed Imteaj</author>
<title>Evaluating Sustainability and Social Costs of Adversarial Training in Machine Learning.</title>
<pages>27-34</pages>
<year>2025</year>
<month>May</month>
<volume>14</volume>
<journal>IEEE Consumer Electron. Mag.</journal>
<number>3</number>
<ee>https://doi.org/10.1109/MCE.2024.3458350</ee>
<url>db/journals/cem/cem14.html#HasanSI25</url>
<stream>streams/journals/cem</stream>
</article>
</r>
<r><article key="journals/tsusc/HasanISAHS25" mdate="2026-02-25">
<author orcid="0009-0008-7414-9103" pid="372/7124">Syed Mhamudul Hasan</author>
<author orcid="0000-0002-7803-4564" pid="323/4677">Taminul Islam</author>
<author orcid="0000-0002-9236-5554" pid="302/0548">Munshi Saifuzzaman</author>
<author orcid="0000-0002-3707-4316" pid="13/684">Khaled R. Ahmed</author>
<author orcid="0000-0002-3465-3320" pid="50/5106">Chun-Hsi Huang</author>
<author orcid="0000-0002-3168-8907" pid="282/6664">Abdur R. Shahid</author>
<title>Carbon Emission Quantification of Machine Learning: A Review.</title>
<pages>1085-1102</pages>
<year>2025</year>
<month>November - December</month>
<volume>10</volume>
<journal>IEEE Trans. Sustain. Comput.</journal>
<number>6</number>
<ee>https://doi.org/10.1109/TSUSC.2025.3578834</ee>
<url>db/journals/tsusc/tsusc10.html#HasanISAHS25</url>
<stream>streams/journals/tsusc</stream>
</article>
</r>
<r><inproceedings key="conf/aaaiss/FimeHZSI25" mdate="2025-08-05">
<author orcid="0009-0004-0015-9297" pid="288/2077">Awal Ahmed Fime</author>
<author pid="336/6776">Md. Zarif Hossain</author>
<author pid="340/6397">Saika Zaman</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author pid="254/1362">Ahmed Imteaj</author>
<title>Benchmarking Large-Language Models for Resource-Efficient Medical AI for Edge Deployment.</title>
<pages>137-142</pages>
<year>2025</year>
<booktitle>AAAI Spring Symposia</booktitle>
<ee>https://doi.org/10.1609/aaaiss.v5i1.35580</ee>
<crossref>conf/aaaiss/2025</crossref>
<url>db/conf/aaaiss/aaaiss2025.html#FimeHZSI25</url>
<stream>streams/conf/aaaiss</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/cvpr/FimeHZSI25" mdate="2025-08-02">
<author pid="288/2077">Awal Ahmed Fime</author>
<author pid="336/6776">Md. Zarif Hossain</author>
<author pid="340/6397">Saika Zaman</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author pid="254/1362">Ahmed Imteaj</author>
<title>Towards Trustworthy Autonomous Vehicles with Vision-Language Models Under Targeted and Untargeted Adversarial Attacks.</title>
<pages>619-628</pages>
<year>2025</year>
<booktitle>CVPR Workshops</booktitle>
<ee type="oa">https://openaccess.thecvf.com/content/CVPR2025W/CV2/html/Fime_Towards_Trustworthy_Autonomous_Vehicles_with_Vision-Language_Models_Under_Targeted_and_CVPRW_2025_paper.html</ee>
<crossref>conf/cvpr/2025w</crossref>
<url>db/conf/cvpr/cvprw2025.html#FimeHZSI25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/globecom/HasanZAS25" mdate="2026-04-04">
<author pid="372/7124">Syed Mhamudul Hasan</author>
<author pid="343/4228">Hussein Zangoti</author>
<author pid="12/7914">Iraklis Anagnostopoulos</author>
<author pid="282/6664">Abdur R. Shahid</author>
<title>Sponge Attacks on Sensing AI: Energy-Latency Vulnerabilities and Defense via Model Pruning.</title>
<booktitle>GLOBECOM</booktitle>
<year>2025</year>
<pages>4445-4450</pages>
<crossref>conf/globecom/2025</crossref>
<ee>https://doi.org/10.1109/GLOBECOM59602.2025.11432163</ee>
<url>db/conf/globecom/globecom2025.html#HasanZAS25</url>
<stream>streams/conf/globecom</stream>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2501-18727" mdate="2025-08-02">
<author pid="398/4003">Mohd. Farhan Israk Soumik</author>
<author pid="276/7494">W. K. Malithi Mithsara</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author pid="254/1362">Ahmed Imteaj</author>
<title>Exploring Audio Editing Features as User-Centric Privacy Defenses Against Emotion Inference Attacks.</title>
<year>2025</year>
<month>January</month>
<volume>abs/2501.18727</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2501.18727</ee>
<url>db/journals/corr/corr2501.html#abs-2501-18727</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2505-06454" mdate="2025-08-02">
<author pid="372/7124">Syed Mhamudul Hasan</author>
<author pid="343/4228">Hussein Zangoti</author>
<author pid="12/7914">Iraklis Anagnostopoulos</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<title>Sponge Attacks on Sensing AI: Energy-Latency Vulnerabilities and Defense via Model Pruning.</title>
<year>2025</year>
<month>May</month>
<volume>abs/2505.06454</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2505.06454</ee>
<url>db/journals/corr/corr2505.html#abs-2505-06454</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2505-23938" mdate="2025-08-02">
<author pid="383/8736">Malithi Wanniarachchi Kankanamge</author>
<author pid="290/1567">Nick McKenna</author>
<author pid="409/0573">Santiago Carmona</author>
<author pid="372/7124">Syed Mhamudul Hasan</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author pid="254/1362">Ahmed Imteaj</author>
<title>Digital Forensic Investigation of the ChatGPT Windows Application.</title>
<year>2025</year>
<month>May</month>
<volume>abs/2505.23938</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2505.23938</ee>
<url>db/journals/corr/corr2505.html#abs-2505-23938</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2506-03870" mdate="2025-08-02">
<author pid="398/4003">Mohd. Farhan Israk Soumik</author>
<author pid="372/7124">Syed Mhamudul Hasan</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<title>Evaluating Apple Intelligence's Writing Tools for Privacy Against Large Language Model-Based Inference Attacks: Insights from Early Datasets.</title>
<year>2025</year>
<month>June</month>
<volume>abs/2506.03870</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2506.03870</ee>
<url>db/journals/corr/corr2506.html#abs-2506-03870</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2511-02894" mdate="2025-11-24">
<author pid="276/7494">W. K. Malithi Mithsara</author>
<author pid="67/1751">Ning Yang</author>
<author pid="254/1362">Ahmed Imteaj</author>
<author pid="343/4228">Hussein Zangoti</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<title>Adaptive and Robust Data Poisoning Detection and Sanitization in Wearable IoT Systems using Large Language Models.</title>
<year>2025</year>
<month>November</month>
<volume>abs/2511.02894</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2511.02894</ee>
<url>db/journals/corr/corr2511.html#abs-2511-02894</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article key="journals/cem/ImteajSZ24" mdate="2025-08-02">
<author orcid="0000-0002-6975-3997" pid="254/1362">Ahmed Imteaj</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author pid="340/6397">Saika Zaman</author>
<title>Leveraging Blockchain Interoperability for Interdependent Networks.</title>
<pages>81-86</pages>
<year>2024</year>
<month>March</month>
<volume>13</volume>
<journal>IEEE Consumer Electron. Mag.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/MCE.2023.3245283</ee>
<url>db/journals/cem/cem13.html#ImteajSZ24</url>
</article>
</r>
<r><article key="journals/tai/ShahidI24" mdate="2025-08-02">
<author orcid="0000-0002-3168-8907" pid="282/6664">Abdur Rahman Bin Shahid</author>
<author orcid="0000-0002-6975-3997" pid="254/1362">Ahmed Imteaj</author>
<title>Securing User Privacy in Cloud-Based Whiteboard Services Against Health Attribute Inference Attacks.</title>
<pages>3872-3885</pages>
<year>2024</year>
<month>August</month>
<volume>5</volume>
<journal>IEEE Trans. Artif. Intell.</journal>
<number>8</number>
<ee>https://doi.org/10.1109/TAI.2024.3352529</ee>
<url>db/journals/tai/tai5.html#ShahidI24</url>
<stream>streams/journals/tai</stream>
</article>
</r>
<r><inproceedings key="conf/compsac/HossainIS24" mdate="2025-08-02">
<author pid="336/6776">Md. Zarif Hossain</author>
<author orcid="0000-0002-6975-3997" pid="254/1362">Ahmed Imteaj</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<title>FedAVO: Improving Communication Efficiency in Federated Learning with African Vultures Optimizer.</title>
<pages>455-462</pages>
<year>2024</year>
<booktitle>COMPSAC</booktitle>
<ee>https://doi.org/10.1109/COMPSAC61105.2024.00069</ee>
<crossref>conf/compsac/2024</crossref>
<url>db/conf/compsac/compsac2024.html#HossainIS24</url>
<stream>streams/conf/compsac</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/compsac/HasanATS24" mdate="2025-08-02">
<author pid="372/7124">Syed Mhamudul Hasan</author>
<author pid="377/9569">Alaa M. Alotaibi</author>
<author pid="203/0239">Sajedul Talukder</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<title>Distributed Threat Intelligence at the Edge Devices: A Large Language Model-Driven Approach.</title>
<pages>1496-1497</pages>
<year>2024</year>
<booktitle>COMPSAC</booktitle>
<ee>https://doi.org/10.1109/COMPSAC61105.2024.00206</ee>
<crossref>conf/compsac/2024</crossref>
<url>db/conf/compsac/compsac2024.html#HasanATS24</url>
<stream>streams/conf/compsac</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/compsac/KankanamgeHSY24" mdate="2025-08-02">
<author pid="383/8736">Malithi Wanniarachchi Kankanamge</author>
<author pid="372/7124">Syed Mhamudul Hasan</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author pid="67/1751">Ning Yang</author>
<title>Large Language Model Integrated Healthcare Cyber-Physical Systems Architecture.</title>
<pages>1540-1541</pages>
<year>2024</year>
<booktitle>COMPSAC</booktitle>
<ee>https://doi.org/10.1109/COMPSAC61105.2024.00228</ee>
<crossref>conf/compsac/2024</crossref>
<url>db/conf/compsac/compsac2024.html#KankanamgeHSY24</url>
<stream>streams/conf/compsac</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/compsac/ImteajRZHS24" mdate="2025-08-02">
<author orcid="0000-0002-6975-3997" pid="254/1362">Ahmed Imteaj</author>
<author pid="384/5696">Tanveer Rahman</author>
<author pid="340/6397">Saika Zaman</author>
<author pid="336/6776">Md. Zarif Hossain</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<title>Enhancing Road Safety Through Cost-Effective, Real-Time Monitoring of Driver Awareness with Resource-Constrained IoT Devices.</title>
<pages>1711-1720</pages>
<year>2024</year>
<booktitle>COMPSAC</booktitle>
<ee>https://doi.org/10.1109/COMPSAC61105.2024.00270</ee>
<crossref>conf/compsac/2024</crossref>
<url>db/conf/compsac/compsac2024.html#ImteajRZHS24</url>
<stream>streams/conf/compsac</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/compsac/ShahidHKHI24" mdate="2025-08-02">
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author pid="372/7124">Syed Mhamudul Hasan</author>
<author pid="383/8736">Malithi Wanniarachchi Kankanamge</author>
<author pid="336/6776">Md. Zarif Hossain</author>
<author orcid="0000-0002-6975-3997" pid="254/1362">Ahmed Imteaj</author>
<title>WatchOverGPT: A Framework for Real-Time Crime Detection and Response Using Wearable Camera and Large Language Model.</title>
<pages>2189-2194</pages>
<year>2024</year>
<booktitle>COMPSAC</booktitle>
<ee>https://doi.org/10.1109/COMPSAC61105.2024.00351</ee>
<crossref>conf/compsac/2024</crossref>
<url>db/conf/compsac/compsac2024.html#ShahidHKHI24</url>
<stream>streams/conf/compsac</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/icc/HasanSI24" mdate="2025-08-02">
<author pid="372/7124">Syed Mhamudul Hasan</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author pid="254/1362">Ahmed Imteaj</author>
<title>Towards Sustainable SecureML: Quantifying Carbon Footprint of Adversarial Machine Learning.</title>
<pages>1359-1364</pages>
<year>2024</year>
<booktitle>ICC Workshops</booktitle>
<ee>https://doi.org/10.1109/ICCWorkshops59551.2024.10615723</ee>
<crossref>conf/icc/2024w</crossref>
<url>db/conf/icc/icc2024w.html#HasanSI24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdcs/HossainIS24" mdate="2025-08-02">
<author pid="336/6776">Md. Zarif Hossain</author>
<author orcid="0000-0002-6975-3997" pid="254/1362">Ahmed Imteaj</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<title>FLAMINGO: Adaptive and Resilient Federated Meta-Learning against Adversarial Attacks.</title>
<pages>17-22</pages>
<year>2024</year>
<booktitle>ICDCSW</booktitle>
<ee>https://doi.org/10.1109/ICDCSW63686.2024.00009</ee>
<crossref>conf/icdcs/2024w</crossref>
<url>db/conf/icdcs/icdcs2024w.html#HossainIS24</url>
<stream>streams/conf/icdcs</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/icmla/MithsaraSY24" mdate="2025-08-02">
<author pid="276/7494">W. K. Malithi Mithsara</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author pid="67/1751">Ning Yang</author>
<title>Intelligent Fall Detection and Emergency Response for Smart Homes Using Language Models.</title>
<pages>230-235</pages>
<year>2024</year>
<booktitle>ICMLA</booktitle>
<ee>https://doi.org/10.1109/ICMLA61862.2024.00037</ee>
<crossref>conf/icmla/2024</crossref>
<url>db/conf/icmla/icmla2024.html#MithsaraSY24</url>
<stream>streams/conf/icmla</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/icmla/ImteajHZS24" mdate="2025-08-02">
<author orcid="0000-0002-6975-3997" pid="254/1362">Ahmed Imteaj</author>
<author pid="336/6776">Md. Zarif Hossain</author>
<author pid="340/6397">Saika Zaman</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<title>TriplePlay: Enhancing Federated Learning with CLIP for Non-IID Data and Resource Efficiency.</title>
<pages>1474-1480</pages>
<year>2024</year>
<booktitle>ICMLA</booktitle>
<ee>https://doi.org/10.1109/ICMLA61862.2024.00228</ee>
<crossref>conf/icmla/2024</crossref>
<url>db/conf/icmla/icmla2024.html#ImteajHZS24</url>
<stream>streams/conf/icmla</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/icmla/MithsaraSY24a" mdate="2025-08-02">
<author pid="276/7494">W. K. Malithi Mithsara</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author pid="67/1751">Ning Yang</author>
<title>Zero-Shot Detection and Sanitization of Data Poisoning Attacks in Wearable AI Using Large Language Models.</title>
<pages>1510-1515</pages>
<year>2024</year>
<booktitle>ICMLA</booktitle>
<ee>https://doi.org/10.1109/ICMLA61862.2024.00233</ee>
<crossref>conf/icmla/2024</crossref>
<url>db/conf/icmla/icmla2024.html#MithsaraSY24a</url>
<stream>streams/conf/icmla</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/infocom/ShahidHIB24" mdate="2025-08-02">
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author pid="372/7124">Syed Mhamudul Hasan</author>
<author orcid="0000-0002-6975-3997" pid="254/1362">Ahmed Imteaj</author>
<author pid="122/3123">Shahriar Badsha</author>
<title>Context-Aware Spatiotemporal Poisoning Attacks on Wearable-Based Activity Recognition.</title>
<pages>1-2</pages>
<year>2024</year>
<booktitle>INFOCOM (Workshops)</booktitle>
<ee>https://doi.org/10.1109/INFOCOMWKSHPS61880.2024.10620768</ee>
<crossref>conf/infocom/2024w</crossref>
<url>db/conf/infocom/infocom2024w.html#ShahidHIB24</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2403-19009" mdate="2025-08-05">
<author pid="372/7124">Syed Mhamudul Hasan</author>
<author orcid="0000-0002-3168-8907" pid="282/6664">Abdur Rahman Bin Shahid</author>
<author orcid="0000-0002-6975-3997" pid="254/1362">Ahmed Imteaj</author>
<title>Towards Sustainable SecureML: Quantifying Carbon Footprint of Adversarial Machine Learning.</title>
<year>2024</year>
<volume>abs/2403.19009</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2403.19009</ee>
<url>db/journals/corr/corr2403.html#abs-2403-19009</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2405-08755" mdate="2025-08-02">
<author pid="372/7124">Syed Mhamudul Hasan</author>
<author pid="377/9569">Alaa M. Alotaibi</author>
<author pid="203/0239">Sajedul Talukder</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<title>Distributed Threat Intelligence at the Edge Devices: A Large Language Model-Driven Approach.</title>
<year>2024</year>
<volume>abs/2405.08755</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2405.08755</ee>
<url>db/journals/corr/corr2405.html#abs-2405-08755</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2407-18407" mdate="2025-08-02">
<author pid="383/8736">Malithi Wanniarachchi Kankanamge</author>
<author pid="372/7124">Syed Mhamudul Hasan</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author pid="67/1751">Ning Yang</author>
<title>Large Language Model Integrated Healthcare Cyber-Physical Systems Architecture.</title>
<year>2024</year>
<volume>abs/2407.18407</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2407.18407</ee>
<url>db/journals/corr/corr2407.html#abs-2407-18407</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2409-05347" mdate="2025-08-02">
<author orcid="0000-0002-6975-3997" pid="254/1362">Ahmed Imteaj</author>
<author pid="336/6776">Md. Zarif Hossain</author>
<author pid="340/6397">Saika Zaman</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<title>TriplePlay: Enhancing Federated Learning with CLIP for Non-IID Data and Resource Efficiency.</title>
<year>2024</year>
<volume>abs/2409.05347</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2409.05347</ee>
<url>db/journals/corr/corr2409.html#abs-2409-05347</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><inproceedings key="conf/desec/HossainIZSTA23" mdate="2025-08-02">
<author pid="336/6776">Md. Zarif Hossain</author>
<author orcid="0000-0002-6975-3997" pid="254/1362">Ahmed Imteaj</author>
<author pid="340/6397">Saika Zaman</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author pid="203/0239">Sajedul Talukder</author>
<author orcid="0000-0002-2768-3601" pid="172/0864">M. Hadi Amini</author>
<title>FLID: Intrusion Attack and Defense Mechanism for Federated Learning Empowered Connected Autonomous Vehicles (CAVs) Application.</title>
<pages>1-8</pages>
<year>2023</year>
<booktitle>DSC</booktitle>
<ee>https://doi.org/10.1109/DSC61021.2023.10354149</ee>
<crossref>conf/desec/2023</crossref>
<url>db/conf/desec/desec2023.html#HossainIZSTA23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/smartcomp/ShahidIBH23" mdate="2025-08-02">
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author orcid="0000-0002-6975-3997" pid="254/1362">Ahmed Imteaj</author>
<author pid="122/3123">Shahriar Badsha</author>
<author pid="336/6776">Md. Zarif Hossain</author>
<title>Assessing Wearable Human Activity Recognition Systems Against Data Poisoning Attacks in Differentially-Private Federated Learning.</title>
<pages>355-360</pages>
<year>2023</year>
<booktitle>SMARTCOMP</booktitle>
<ee>https://doi.org/10.1109/SMARTCOMP58114.2023.00085</ee>
<crossref>conf/smartcomp/2023</crossref>
<url>db/conf/smartcomp/smartcomp2023.html#ShahidIBH23</url>
</inproceedings>
</r>
<r><article key="journals/jcscoll/Shahid22" mdate="2025-08-02">
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<title>Facilitating Internet of Things (IoT) Experience in Computer and Information Systems Education.</title>
<pages>207</pages>
<year>2022</year>
<volume>38</volume>
<journal>J. Comput. Sci. Coll.</journal>
<number>3</number>
<ee>https://dl.acm.org/doi/10.5555/3580523.3580568</ee>
<url>db/journals/jcscoll/jcscoll38.html#Shahid22</url>
</article>
</r>
<r><inproceedings key="conf/ssci/ShahidIWIA22" mdate="2025-08-02">
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author orcid="0000-0002-6975-3997" pid="254/1362">Ahmed Imteaj</author>
<author pid="27/3826">Peter Y. Wu</author>
<author pid="125/8566">Diane A. Igoche</author>
<author orcid="0000-0003-2777-413X" pid="200/0407">Tauhidul Alam</author>
<title>Label Flipping Data Poisoning Attack Against Wearable Human Activity Recognition System.</title>
<pages>908-914</pages>
<year>2022</year>
<booktitle>SSCI</booktitle>
<ee>https://doi.org/10.1109/SSCI51031.2022.10022015</ee>
<crossref>conf/ssci/2022</crossref>
<url>db/conf/ssci/ssci2022.html#ShahidIWIA22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/trustcom/ZangotiMPSGR22" mdate="2025-08-02">
<author pid="343/4228">Hussein Zangoti</author>
<author pid="159/1187">Alex Pissinou Makki</author>
<author pid="p/NPissinou">Niki Pissinou</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author pid="183/7625">Omar J. Guerra</author>
<author pid="343/4081">Joel Rodriguez</author>
<title>A Multidimensional Blockchain Framework For Mobile Internet of Things.</title>
<pages>935-944</pages>
<year>2022</year>
<booktitle>TrustCom</booktitle>
<ee>https://doi.org/10.1109/TrustCom56396.2022.00129</ee>
<crossref>conf/trustcom/2022</crossref>
<url>db/conf/trustcom/trustcom2022.html#ZangotiMPSGR22</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2208-08433" mdate="2025-08-02">
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author pid="254/1362">Ahmed Imteaj</author>
<author pid="27/3826">Peter Y. Wu</author>
<author pid="125/8566">Diane A. Igoche</author>
<author pid="200/0407">Tauhidul Alam</author>
<title>Label Flipping Data Poisoning Attack Against Wearable Human Activity Recognition System.</title>
<year>2022</year>
<volume>abs/2208.08433</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2208.08433</ee>
<url>db/journals/corr/corr2208.html#abs-2208-08433</url>
</article>
</r>
<r><article key="journals/ijcomsys/ShahidPIM21" mdate="2025-08-02">
<author orcid="0000-0002-3168-8907" pid="282/6664">Abdur Rahman Bin Shahid</author>
<author pid="p/NPissinou">Niki Pissinou</author>
<author orcid="0000-0003-2944-8178" pid="i/SSitharamaIyengar">S. S. Iyengar 0001</author>
<author pid="40/3724">Kia Makki</author>
<title>Delay-aware privacy-preserving location-based services under spatiotemporal constraints.</title>
<year>2021</year>
<volume>34</volume>
<journal>Int. J. Commun. Syst.</journal>
<number>1</number>
<ee>https://doi.org/10.1002/dac.4656</ee>
<url>db/journals/ijcomsys/ijcomsys34.html#ShahidPIM21</url>
</article>
</r>
<r><article key="journals/jcscoll/TalukderS21" mdate="2025-08-02">
<author pid="203/0239">Sajedul Talukder</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<title>Enhancing alternative proof of work for cryptocurrencies using machine learning: faculty poster abstract.</title>
<pages>155</pages>
<year>2021</year>
<volume>37</volume>
<journal>J. Comput. Sci. Coll.</journal>
<number>3</number>
<ee>https://dl.acm.org/doi/10.5555/3512489.3512505</ee>
<url>db/journals/jcscoll/jcscoll37.html#TalukderS21</url>
</article>
</r>
<r><article key="journals/jcscoll/TalukderS21a" mdate="2025-08-02">
<author pid="203/0239">Sajedul Talukder</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<title>Applying local differential privacy in handwriting recognition-based systems: faculty poster abstract.</title>
<pages>163</pages>
<year>2021</year>
<volume>37</volume>
<journal>J. Comput. Sci. Coll.</journal>
<number>3</number>
<ee>https://dl.acm.org/doi/10.5555/3512489.3512513</ee>
<url>db/journals/jcscoll/jcscoll37.html#TalukderS21a</url>
</article>
</r>
<r><article key="journals/jcscoll/ShahidT21" mdate="2025-08-02">
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author pid="203/0239">Sajedul Talukder</author>
<title>Evaluation of privacy-preserving Logistic Regression and Naive Bayes classifiers in healthcare: faculty poster abstract.</title>
<pages>164</pages>
<year>2021</year>
<volume>37</volume>
<journal>J. Comput. Sci. Coll.</journal>
<number>3</number>
<ee>https://dl.acm.org/doi/10.5555/3512489.3512514</ee>
<url>db/journals/jcscoll/jcscoll37.html#ShahidT21</url>
</article>
</r>
<r><article key="journals/jcscoll/ShahidT21a" mdate="2025-08-02">
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author pid="203/0239">Sajedul Talukder</author>
<title>Privacy-preserving activity recognition from sensor data: faculty poster abstract.</title>
<pages>165</pages>
<year>2021</year>
<volume>37</volume>
<journal>J. Comput. Sci. Coll.</journal>
<number>3</number>
<ee>https://dl.acm.org/doi/10.5555/3512489.3512515</ee>
<url>db/journals/jcscoll/jcscoll37.html#ShahidT21a</url>
</article>
</r>
<r><inproceedings key="conf/icira/AlamTTBSK20" mdate="2021-04-09">
<author orcid="0000-0003-2777-413X" pid="200/0407">Tauhidul Alam</author>
<author pid="282/6269">Jarrett Taylor</author>
<author pid="68/6729">Jonathan Taylor</author>
<author pid="122/3123">Shahriar Badsha</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author pid="116/7137">A. S. M. Kayes</author>
<title>Leveraging Blockchain for Spoof-Resilient Robot Networks.</title>
<pages>207-216</pages>
<year>2020</year>
<booktitle>ICIRA</booktitle>
<ee>https://doi.org/10.1007/978-3-030-66645-3_18</ee>
<crossref>conf/icira/2020</crossref>
<url>db/conf/icira/icira2020.html#AlamTTBSK20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ithings/ShahidPSK19" mdate="2025-08-02">
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author pid="p/NPissinou">Niki Pissinou</author>
<author pid="251/4889">Corey Staier</author>
<author orcid="0009-0003-0713-3148" pid="251/4916">Rain Kwan</author>
<title>Sensor-Chain: A Lightweight Scalable Blockchain Framework for Internet of Things.</title>
<pages>1154-1161</pages>
<year>2019</year>
<booktitle>iThings/GreenCom/CPSCom/SmartData</booktitle>
<ee>https://doi.org/10.1109/iThings/GreenCom/CPSCom/SmartData.2019.00195</ee>
<crossref>conf/ithings/2019</crossref>
<url>db/conf/ithings/ithings2019.html#ShahidPSK19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mass/ShahidPNAP19" mdate="2025-08-02">
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author pid="p/NPissinou">Niki Pissinou</author>
<author pid="194/3916">Laurent Njilla</author>
<author pid="257/7158">Edwin Aguilar</author>
<author pid="263/0968">Eric Perez</author>
<title>Demo: Towards the Development of a Differentially Private Lightweight and Scalable Blockchain for IoT.</title>
<pages>172-173</pages>
<year>2019</year>
<booktitle>MASS Workshops</booktitle>
<ee>https://doi.org/10.1109/MASSW.2019.00045</ee>
<crossref>conf/mass/2019w</crossref>
<url>db/conf/mass/mass2019w.html#ShahidPNAP19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mobiquitous/ShahidPNAIMA19" mdate="2025-08-02">
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author pid="p/NPissinou">Niki Pissinou</author>
<author pid="194/3916">Laurent Njilla</author>
<author pid="215/3582">Sheila Alemany</author>
<author orcid="0000-0002-6975-3997" pid="254/1362">Ahmed Imteaj</author>
<author pid="40/3724">Kia Makki</author>
<author pid="257/7158">Edwin Aguilar</author>
<title>Quantifying location privacy in permissioned blockchain-based internet of things (IoT).</title>
<pages>116-125</pages>
<year>2019</year>
<booktitle>MobiQuitous</booktitle>
<ee>https://doi.org/10.1145/3360774.3360800</ee>
<ee>https://www.wikidata.org/entity/Q130869600</ee>
<crossref>conf/mobiquitous/2019</crossref>
<url>db/conf/mobiquitous/mobiquitous2019.html#ShahidPNAIMA19</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1901-00755" mdate="2025-08-02">
<author pid="234/6131">Supriya Sarker</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<title>Cyberbullying of High School Students in Bangladesh: An Exploratory Study.</title>
<year>2019</year>
<volume>abs/1901.00755</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1901.00755</ee>
<url>db/journals/corr/corr1901.html#abs-1901-00755</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1906-09158" mdate="2026-02-12">
<author pid="80/1961-2">Wei Zeng 0002</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author pid="243/2810">Keyan Zolfaghari</author>
<author pid="243/3569">Aditya Shetty</author>
<author pid="p/NPissinou">Niki Pissinou</author>
<author orcid="0000-0003-2944-8178" pid="i/SSitharamaIyengar">S. Sitharama Iyengar</author>
<title>n-VDD: Location Privacy Protection Based on Voronoi-Delaunay Duality.</title>
<year>2019</year>
<volume>abs/1906.09158</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1906.09158</ee>
<url>db/journals/corr/corr1906.html#abs-1906-09158</url>
</article>
</r>
<r><inproceedings key="conf/bigdataconf/TangTPIS18" mdate="2025-08-02">
<author pid="234/2806">Yujian Charles Tang</author>
<author orcid="0009-0002-1090-2887" pid="151/9239">Samia Tasnim</author>
<author pid="p/NPissinou">Niki Pissinou</author>
<author orcid="0000-0003-2944-8178" pid="i/SSitharamaIyengar">S. S. Iyengar 0001</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<title>Reputation-Aware Data Fusion and Malicious Participant Detection in Mobile Crowdsensing.</title>
<pages>4820-4828</pages>
<year>2018</year>
<booktitle>IEEE BigData</booktitle>
<ee>https://doi.org/10.1109/BigData.2018.8622335</ee>
<crossref>conf/bigdataconf/2018</crossref>
<url>db/conf/bigdataconf/bigdataconf2018.html#TangTPIS18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/services/ShahidPIMDL18" mdate="2025-08-02">
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author pid="p/NPissinou">Niki Pissinou</author>
<author pid="i/SSitharamaIyengar">S. S. Iyengar 0001</author>
<author pid="38/2707">Jerry Miller</author>
<author pid="221/4945">Ziqian Ding</author>
<author pid="229/4053">Teresita Lemus</author>
<title>KLAP for Real-World Protection of Location Privacy.</title>
<pages>17-18</pages>
<year>2018</year>
<booktitle>SERVICES</booktitle>
<ee>https://doi.org/10.1109/SERVICES.2018.00022</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SERVICES.2018.00022</ee>
<crossref>conf/services/2018</crossref>
<url>db/conf/services/services2018.html#ShahidPIMDL18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/trustcom/ShahidPIM18" mdate="2025-08-02">
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author pid="p/NPissinou">Niki Pissinou</author>
<author orcid="0000-0003-2944-8178" pid="i/SSitharamaIyengar">S. S. Iyengar 0001</author>
<author pid="40/3724">Kia Makki</author>
<title>Check-ins and Photos: Spatiotemporal Correlation-Based Location Inference Attack and Defense in Location-Based Social Networks.</title>
<pages>1852-1857</pages>
<year>2018</year>
<booktitle>TrustCom/BigDataSE</booktitle>
<ee>https://doi.org/10.1109/TrustCom/BigDataSE.2018.00280</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/TrustCom/BigDataSE.2018.00280</ee>
<crossref>conf/trustcom/2018</crossref>
<url>db/conf/trustcom/trustcom2018.html#ShahidPIM18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iccnc/ShahidJZPISV17" mdate="2025-08-02">
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author pid="196/3881">Liz Jeukeng</author>
<author pid="80/1961-2">Wei Zeng 0002</author>
<author pid="p/NPissinou">Niki Pissinou</author>
<author orcid="0000-0003-2944-8178" pid="i/SSitharamaIyengar">S. S. Iyengar 0001</author>
<author pid="s/SartajSahni">Sartaj Sahni</author>
<author pid="196/4058">Maite Varela-Conover</author>
<title>PPVC: Privacy Preserving Voronoi Cell for location-based services.</title>
<pages>351-355</pages>
<year>2017</year>
<booktitle>ICNC</booktitle>
<ee>https://doi.org/10.1109/ICCNC.2017.7876153</ee>
<crossref>conf/iccnc/2017</crossref>
<url>db/conf/iccnc/iccnc2017.html#ShahidJZPISV17</url>
</inproceedings>
</r>
<r><article key="journals/axioms/ZengRS15" mdate="2026-02-12">
<author pid="80/1961-2">Wei Zeng 0002</author>
<author pid="161/5263">Muhammad Razib</author>
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<title>Diffeomorphism Spline.</title>
<pages>156-176</pages>
<year>2015</year>
<volume>4</volume>
<journal>Axioms</journal>
<number>2</number>
<ee type="oa">https://doi.org/10.3390/axioms4020156</ee>
<url>db/journals/axioms/axioms4.html#ZengRS15</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1211-2699" mdate="2021-01-13">
<author pid="282/6664">Abdur Rahman Bin Shahid</author>
<author pid="122/3123">Shahriar Badsha</author>
<author pid="122/3003">Md. Rethwan Kabeer</author>
<author pid="122/2988">Junaid Ahsan</author>
<author pid="20/10612">Mufti Mahmud</author>
<title>A Non-Blind Watermarking Scheme for Gray Scale Images in Discrete Wavelet Transform Domain using Two Subbands</title>
<ee type="oa">http://arxiv.org/abs/1211.2699</ee>
<year>2012</year>
<journal>CoRR</journal>
<volume>abs/1211.2699</volume>
<url>db/journals/corr/corr1211.html#abs-1211-2699</url>
</article>
</r>
<coauthors n="56" nc="1">
<co c="0"><na f="a/Aguilar:Edwin" pid="257/7158">Edwin Aguilar</na></co>
<co c="0"><na f="a/Ahmed:Khaled_R=" pid="13/684">Khaled R. Ahmed</na></co>
<co c="0"><na f="a/Ahsan:Junaid" pid="122/2988">Junaid Ahsan</na></co>
<co c="0"><na f="a/Alam:Tauhidul" pid="200/0407">Tauhidul Alam</na></co>
<co c="0"><na f="a/Alemany:Sheila" pid="215/3582">Sheila Alemany</na></co>
<co c="0"><na f="a/Alotaibi:Alaa_M=" pid="377/9569">Alaa M. Alotaibi</na></co>
<co c="0"><na f="a/Amini:M=_Hadi" pid="172/0864">M. Hadi Amini</na></co>
<co c="0"><na f="a/Anagnostopoulos:Iraklis" pid="12/7914">Iraklis Anagnostopoulos</na></co>
<co c="0"><na f="b/Badsha:Shahriar" pid="122/3123">Shahriar Badsha</na></co>
<co c="0"><na f="c/Carmona:Santiago" pid="409/0573">Santiago Carmona</na></co>
<co c="0"><na f="d/Ding:Ziqian" pid="221/4945">Ziqian Ding</na></co>
<co c="0"><na f="f/Fime:Awal_Ahmed" pid="288/2077">Awal Ahmed Fime</na></co>
<co c="0"><na f="g/Guerra:Omar_J=" pid="183/7625">Omar J. Guerra</na></co>
<co c="0"><na f="h/Hasan:Syed_Mhamudul" pid="372/7124">Syed Mhamudul Hasan</na></co>
<co c="0"><na f="h/Hossain:Md=_Zarif" pid="336/6776">Md. Zarif Hossain</na></co>
<co c="0"><na f="h/Huang:Chun=Hsi" pid="50/5106">Chun-Hsi Huang</na></co>
<co c="0"><na f="i/Igoche:Diane_A=" pid="125/8566">Diane A. Igoche</na></co>
<co c="0"><na f="i/Imteaj:Ahmed" pid="254/1362">Ahmed Imteaj</na></co>
<co c="0"><na f="i/Islam:Taminul" pid="323/4677">Taminul Islam</na></co>
<co c="0" n="2"><na f="i/Iyengar:S=_Sitharama" pid="i/SSitharamaIyengar">S. Sitharama Iyengar</na><na>S. S. Iyengar 0001</na></co>
<co c="0"><na f="j/Jeukeng:Liz" pid="196/3881">Liz Jeukeng</na></co>
<co c="0"><na f="k/Kabeer:Md=_Rethwan" pid="122/3003">Md. Rethwan Kabeer</na></co>
<co c="0"><na f="k/Kankanamge:Malithi_Wanniarachchi" pid="383/8736">Malithi Wanniarachchi Kankanamge</na></co>
<co c="0"><na f="k/Kayes:A=_S=_M=" pid="116/7137">A. S. M. Kayes</na></co>
<co c="0"><na f="k/Kwan:Rain" pid="251/4916">Rain Kwan</na></co>
<co c="0"><na f="l/Lemus:Teresita" pid="229/4053">Teresita Lemus</na></co>
<co c="0"><na f="m/Mahmud:Mufti" pid="20/10612">Mufti Mahmud</na></co>
<co c="0"><na f="m/Makki:Alex_Pissinou" pid="159/1187">Alex Pissinou Makki</na></co>
<co c="0"><na f="m/Makki:Kia" pid="40/3724">Kia Makki</na></co>
<co c="0"><na f="m/McKenna:Nick" pid="290/1567">Nick McKenna</na></co>
<co c="0"><na f="m/Miller:Jerry" pid="38/2707">Jerry Miller</na></co>
<co c="0"><na f="m/Mithsara:W=_K=_Malithi" pid="276/7494">W. K. Malithi Mithsara</na></co>
<co c="0"><na f="n/Njilla:Laurent" pid="194/3916">Laurent Njilla</na></co>
<co c="0"><na f="p/Perez:Eric" pid="263/0968">Eric Perez</na></co>
<co c="0"><na f="p/Pissinou:Niki" pid="p/NPissinou">Niki Pissinou</na></co>
<co c="0"><na f="r/Rahman:Tanveer" pid="384/5696">Tanveer Rahman</na></co>
<co c="0"><na f="r/Razib:Muhammad" pid="161/5263">Muhammad Razib</na></co>
<co c="0"><na f="r/Rodriguez:Joel" pid="343/4081">Joel Rodriguez</na></co>
<co c="0"><na f="s/Sahni:Sartaj" pid="s/SartajSahni">Sartaj Sahni</na></co>
<co c="0"><na f="s/Saifuzzaman:Munshi" pid="302/0548">Munshi Saifuzzaman</na></co>
<co c="-1"><na f="s/Sarker:Supriya" pid="234/6131">Supriya Sarker</na></co>
<co c="0"><na f="s/Shetty:Aditya" pid="243/3569">Aditya Shetty</na></co>
<co c="0"><na f="s/Soumik:Mohd=_Farhan_Israk" pid="398/4003">Mohd. Farhan Israk Soumik</na></co>
<co c="0"><na f="s/Staier:Corey" pid="251/4889">Corey Staier</na></co>
<co c="0"><na f="t/Talukder:Sajedul" pid="203/0239">Sajedul Talukder</na></co>
<co c="0"><na f="t/Tang:Yujian_Charles" pid="234/2806">Yujian Charles Tang</na></co>
<co c="0"><na f="t/Tasnim:Samia" pid="151/9239">Samia Tasnim</na></co>
<co c="0"><na f="t/Taylor:Jarrett" pid="282/6269">Jarrett Taylor</na></co>
<co c="0"><na f="t/Taylor:Jonathan" pid="68/6729">Jonathan Taylor</na></co>
<co c="0"><na f="v/Varela=Conover:Maite" pid="196/4058">Maite Varela-Conover</na></co>
<co c="0"><na f="w/Wu:Peter_Y=" pid="27/3826">Peter Y. Wu</na></co>
<co c="0"><na f="y/Yang:Ning" pid="67/1751">Ning Yang</na></co>
<co c="0"><na f="z/Zaman:Saika" pid="340/6397">Saika Zaman</na></co>
<co c="0"><na f="z/Zangoti:Hussein" pid="343/4228">Hussein Zangoti</na></co>
<co c="0"><na f="z/Zeng_0002:Wei" pid="80/1961-2">Wei Zeng 0002</na></co>
<co c="0"><na f="z/Zolfaghari:Keyan" pid="243/2810">Keyan Zolfaghari</na></co>
</coauthors>
</dblpperson>

