Search Results for author: Hossain Shahriar

Found 16 papers, 1 papers with code

A Trustable LSTM-Autoencoder Network for Cyberbullying Detection on Social Media Using Synthetic Data

no code implementations15 Aug 2023 Mst Shapna Akter, Hossain Shahriar, Alfredo Cuzzocrea

This paper proposes a trustable LSTM-Autoencoder Network for cyberbullying detection on social media using synthetic data.

Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks

no code implementations1 Jun 2023 Mst Shapna Akter, Hossain Shahriar, Juan Rodriguez Cardenas, Sheikh Iqbal Ahamed, Alfredo Cuzzocrea

We have conducted a comparative analysis between results derived from features containing a minimal text representation and semantic and syntactic information.

Feature Engineering Vulnerability Detection

Multi-class Skin Cancer Classification Architecture Based on Deep Convolutional Neural Network

no code implementations13 Mar 2023 Mst Shapna Akter, Hossain Shahriar, Sweta Sneha, Alfredo Cuzzocrea

Furthermore, we develop five different stacking models such as inceptionv3-inceptionv3, Densenet-mobilenet, inceptionv3-Xception, Resnet50-Vgg16, and stack-six for classifying the skin lesions and found that the stacking models perform poorly.

Data Augmentation Skin Cancer Classification +1

Deep Learning Approach for Classifying the Aggressive Comments on Social Media: Machine Translated Data Vs Real Life Data

no code implementations13 Mar 2023 Mst Shapna Akter, Hossain Shahriar, Nova Ahmed, Alfredo Cuzzocrea

This paper particularly worked on the Hindi, Bangla, and English datasets to detect aggressive comments and have shown a novel way of generating machine-translated data to resolve data unavailability issues.

Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing

no code implementations13 Mar 2023 Mst Shapna Akter, Hossain Shahriar, Zakirul Alam Bhuiya

One of the most important challenges in the field of software code audit is the presence of vulnerabilities in software source code.

Quantum Machine Learning Vulnerability Detection

An Investigation on Non-Invasive Brain-Computer Interfaces: Emotiv Epoc+ Neuroheadset and Its Effectiveness

no code implementations24 Jun 2022 Md Jobair Hossain Faruk, Maria Valero, Hossain Shahriar

In this study, we illustrate the progress of BCI research and present scores of unveiled contemporary approaches.

EEG

Cannot find the paper you are looking for? You can Submit a new open access paper.