Profile image of Shamsul Huda

Dr Shamsul Huda

STAFF PROFILE

Position

Senior Lecturer, Computer Science

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Melbourne Burwood Campus

Qualifications

Graduate Certificate of Higher Education, Deakin University, 2018
Doctor of Philosophy, University of Ballarat, 2009
Master of Science (Computer Science and Engineering), Bangladesh Uni. of Eng & Tech, 2003
Bachelor of Science in Engineering (Electrical & Electronic), Bangladesh Inst of Tech Khulna, 1997

Contact

shamsul.huda@deakin.edu.au
+61 3 924 45509

Biography

Shamsul Huda received his PhD degree in Computer Science from the Center for Informatics and Applied Optimization (CIAO), School of Science, Information Technology and Engineering (SITE), Federation University, in 2009 under the supervision of Professor John Yearwood, Head, School of IT, Deakin University and Professor Roberto Tognieri, Head, School of Electrical, Electronic and Computer Engineering, University of Western Australia (UWA). During his PhD, he jointly worked with CIAO, Signal Processing and Recognition Laboratory, UWA with Prof Roberto Tognieri where he spent significant time in UWA, at Perth, WA for completion of his PhD and gained research experiences from both universities.
He achieved “Certified Information System Security Professional (CISSP)” certification from the topmost organization of the world for training and certifications for cybersecurity: “The International Information System Security Certification Consortium, (ISC)² ”. He also has achieved a full membership of (ISC)² as part of the recognition of his contribution and expertise in cybersecurity areas and industry based research engagement.

Read more on Shamsul's profile

Career highlights

  • January 2016  to date: Lecturer, School of IT, Deakin University, Australia 
  • January 2015  to December 2015:Research Fellow, School of IT, Deakin University, Australia 
  • October  2015 to 2016 February: Development team member and consultant on behalf of Deakin, Sparx Systems, Australia 
  • January 2010   to 2014 December: Research Fellow, School of IT, Federation University, Australia
  • February 2008  to August 2008: Programmer, ArgusConnect, Australia
  • July  2003  to March 2009, Assistant professor, (2005-2009 on study leave), Department of Computer Science and Engineering, Khulna university of Engineering and Technology, Bangladesh

Research interests

  • Cyber-security for critical infrastructure
  • Secure authentication and communication protocols and network components for secure operations of industrial control systems
  • Industrial IoT networks and security
  • National and portfolio level cyber strategy development and Global cybersecurity indices
  • Critical assets, services portfolio level risk assessments
  • Endpoint security and anti-malware solutions for mobile system and client-based systems
  • Software vulnerability analysis and detection
  • Innovative strategies in teaching and learning, testing the effectiveness of innovation for learning design

Teaching interests

  • Cyber Security Management
  • Systems security
  • Software requirement analysis and modelling
  • Database management systems
  • Networks and Communications
  • Service oriented architecture
  • Data Mining and Machine Learning

Units taught

  • SIT725 Software Engineering
  • SIT773 Software requirement analysis and modelling
  • SIT202 Networks and Communications
  • SIT737 Service oriented architecture
  • SIT790/SIT792 Major Thesis/Minor thesis
  • SIT207 Android Programming
  • SIT382 Systems Security (current)

Knowledge areas

  • Cyber security
  • Critical infrastructure and IIoT security
  • Cyber risk assessment for critical assets and services
  • National and portfolio level cyber strategy development
  • Global cybersecurity indices
  • Artificial intelligence, Deep learning
  • Software Engineering
  • Malware

Professional activities

  • Recent conference committee member:
  • 5th North American International Conference on Industrial Engineering and Operations Management Detroit, Michigan, USA, August 10-14, 2020,
  • http://ieomsociety.org/detroit2020/committee/
  • 11th Annual International Conference on Industrial Engineering and Operations Management, Singapore, March 9-11.
  • http://ieomsociety.org/singapore2021/committee/
  • Journal Reviewer for:
  • IEEE transaction on Industrial informatics,
  • Information science
  • IEEE access
  • Future Generation Computer Systems
  • Applied soft computing

Research groups

Member of Centre for Cyber Security Research and Innovation
Member of Security and PrivacY Research in IoT Lab (SPYRIT)
Member of Cyber Physical Systems (CPS) and the Internet of Things (IoT) group

Projects

  • Obfuscation-resilient novel algorithms and techniques for the analysis, detection and prevention of emerging time variant malware, Crypto malware, Funding (2020): 30,000AUD by Innovation Agency in the Ministry of Education, Saudi Arabia.
  • Cybersecurity risk modeling framework, detective and preventive measure in security operations for Industrial control systems, Critical Infrastructure, Smart grid.
  • National and portfolio level cyber strategy development including risk assessment for critical assets at the national level:Vanuatu Cybersecurity Capacity Building Project, Cybersecurity Maturity Model for Nations; with the Oceania Cyber Security Centre and Global Cyber Security Capacity Centre, Oxford University, Funding (2020): $125K jointly with Melbourne University, Latrobe University and Federation University

Publications

Filter by

2024

MDS-Based Cloned Device Detection in IoT-Fog Network

Z AlJabri, J Abawajy, S Huda

(2024), pp. 1-12, IEEE Internet of Things Journal, Piscataway, NJ., C1

journal article
2023

Feature Cloning and Feature Fusion Based Transportation Mode Detection Using Convolutional Neural Network

M Alam, M Haque, M Hassan, S Huda, M Hassan, F Strickland, S AlQahtani

(2023), pp. 1-11, IEEE Transactions on Intelligent Transportation Systems, Piscataway, N.J., C1

journal article

A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices

Z Aljabri, J Abawajy, S Huda

(2023), Vol. 2023, pp. 1-31, Wireless Communications and Mobile Computing, London, Eng., C1

journal article

Machine Learning-Based Hybrid Ensemble Model Achieving Precision Education for Online Education Amid the Lockdown Period of COVID-19 Pandemic in Pakistan

Rimsha Asad, Saud Altaf, Shafiq Ahmad, Haitham Mahmoud, Shamsul Huda, Sofia Iqbal

(2023), Vol. 15, pp. 1-24, Sustainability, Basel, Switzerland, C1

journal article

Customer Analysis Using Machine Learning-Based Classification Algorithms for Effective Segmentation Using Recency, Frequency, Monetary, and Time

Asmat Ullah, Muhammad Mohmand, Hameed Hussain, Sumaira Johar, Inayat Khan, Shafiq Ahmad, Haitham Mahmoud, Shamsul Huda

(2023), Vol. 23, pp. 1-18, Sensors, Basel, Switzerland, C1

journal article

A Privacy Frequent Itemsets Mining Framework for Collaboration in IoT Using Federated Learning

J Wu, Q Teng, S Huda, Y Chen, C Chen

(2023), Vol. 19, pp. 1-15, ACM Transactions on Sensor Networks, New York, N.Y., C1

journal article

A Novel Approach to Improve Software Defect Prediction Accuracy Using Machine Learning

I Mehmood, S Shahid, H Hussain, I Khan, S Ahmad, S Rahman, N Ullah, S Huda

(2023), Vol. 11, pp. 63579-63597, IEEE Access, Piscataway, N.J., C1

journal article

Pashto Handwritten Invariant Character Trajectory Prediction Using a Customized Deep Learning Technique

Fazli Khaliq, Muhammad Shabir, Inayat Khan, Shafiq Ahmad, Muhammad Usman, Muhammad Zubair, Shamsul Huda

(2023), Vol. 23, pp. 1-16, Sensors, Basel, Switzerland, C1

journal article

Non Functional Requirements Identification and Classification Using Transfer Learning Model

M Khan, M Khan, I Khan, S Ahmad, S Huda

(2023), Vol. 11, pp. 74997-75005, IEEE Access, Piscataway, N.J., C1

journal article

Near Feasibility Driven Adaptive Penalty Functions Embedded MOEA/D

A Khan, M Jan, M Sagheer, R Khanum, M Uddin, S Ahmad, S Huda

(2023), Vol. 11, pp. 105182-105213, IEEE Access, C1

journal article

A Comprehensive Survey of Machine Learning Methods for Surveillance Videos Anomaly Detection

N Choudhry, J Abawajy, S Huda, I Rao

(2023), Vol. 11, pp. 114680-114713, IEEE Access, Piscataway, N.J., C1

journal article

Optimizing the performance of machine learning algorithms for the condition assessment of utility timber poles

I Das, M Arif, S Huda, A Oo, A Das, M Subhani

(2023), Nondestructive Testing and Evaluation, C1

journal article

Advancing Text Summarization through the Utilization of Arbitrary Aspect Learning

Hou Ziwei, Bahadorreza Ofoghi, Nayyar Zaidi, Mammadov Musa, Huda Shamsul, Yearwood John

(2023), pp. 22-33, MDAI 2023 : Proceedings of the 20th International Conference on Modeling Decisions for Artificial Intelligence 2023, Umeå, Sweden, E1

conference
2022

Early detection of cardiovascular autonomic neuropathy: A multi-class classification model based on feature selection and deep learning feature fusion

M Hassan, S Huda, M Hassan, J Abawajy, A Alsanad, G Fortino

(2022), Vol. 77, pp. 70-80, Information Fusion, Amsterdam, The Netherlands, C1

journal article

An Advanced Boundary Protection Control for the Smart Water Network Using Semisupervised and Deep Learning Approaches

S Sharmeen, S Huda, J Abawajy, C Ahmed, M Hassan, G Fortino

(2022), Vol. 9, pp. 7298-7310, IEEE Internet of Things Journal, C1

journal article

Prostate cancer classification from ultrasound and MRI images using deep learning based Explainable Artificial Intelligence

M Hassan, M Islam, M Uddin, G Ghoshal, M Hassan, S Huda, G Fortino

(2022), Vol. 127, pp. 462-472, Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications, Amsterdam, The Netherlands, C1

journal article

A global training model for beat classification using basic electrocardiogram morphological features

S Sumesh, J Yearwood, S Huda, S Ahmad

(2022), Vol. 70, pp. 4503-4521, Computers, Materials and Continua, Encino, Calif., C1

journal article

An edge tier task offloading to identify sources of variance shifts in smart grid using a hybrid of wrapper and filter approaches

N Gunaratne, M Abdollahian, S Huda, M Ali, G Frontino

(2022), Vol. 6, pp. 329-340, IEEE Transactions on Green Communications and Networking, Piscataway, NJ, C1

journal article

A framework of genetic algorithm-based CNN on multi-access edge computing for automated detection of COVID-19

M Hassan, W Ismail, A Chowdhury, S Hossain, S Huda, M Hassan

(2022), Vol. 78, pp. 10250-10274, Journal of Supercomputing, United States, C1

journal article

A Weighted Minimum Redundancy Maximum Relevance Technique for Ransomware Early Detection in Industrial IoT

Y Ahmed, S Huda, B Al-Rimy, N Alharbi, F Saeed, F Ghaleb, I Ali

(2022), Vol. 14, pp. 1-15, Sustainability, Basel, Switzerland, C1

journal article

An Industry 4.0 Complaint Sustainable Bitcoin Model through Optimized Transaction Selection & Sustainable Block Integration

M Monem, M Alam, M Abdullah-Al-Wadud, M Hassan, S Huda, G Fortino

(2022), pp. 1-1, IEEE Transactions on Industrial Informatics, Piscataway, N.J., C1

journal article

Advanced Authentication Scheme with Bio-Key Using Artificial Neural Network

Z Rehman, S Altaf, S Ahmad, M Alqahtani, S Huda, S Iqbal

(2022), Vol. 14, pp. 1-14, Sustainability, Basel, Switzerland, C1

journal article

Multiple Industrial Induction Motors Fault Diagnosis Model within Powerline System Based on Wireless Sensor Network

S Altaf, S Ahmad, M Zaindin, S Huda, S Iqbal, M Soomro

(2022), Vol. 14, Sustainability (Switzerland), C1

journal article

Application of Industrial Internet of Things (IIoT) in Crude Oil Production Optimization Using Pump Efficiency Control

A Allahloh, M Sarfraz, M Alqahtani, S Ahmad, S Huda

(2022), Vol. 2022, Wireless Communications and Mobile Computing, C1

journal article

Hand Gesture Recognition with Symmetric Pattern under Diverse Illuminated Conditions Using Artificial Neural Network

M Haroon, S Altaf, S Ahmad, M Zaindin, S Huda, S Iqbal

(2022), Vol. 14, Symmetry, C1

journal article

Dynamic Key Extraction Technique Using Pulse Signal and Lightweight Cryptographic Authentication Scheme for WBAN

Shafiq Ahmad, Zia Rehman, Saud Altaf, Mazen Zaindin, Shamsul Huda, Muhammad Haroon, Sofia Iqbal

(2022), Vol. 14, SUSTAINABILITY, C1

journal article

Combining Innovative Technology and Context based Approaches in Teaching Software Engineering

S Huda, S Alyahya, L Pan, H Al-Dossari

(2022), Vol. 13, pp. 305-314, International Journal of Advanced Computer Science and Applications, C1

journal article
2021

An Adaptive Trust Boundary Protection for IIoT Networks Using Deep-Learning Feature-Extraction-Based Semisupervised Model

M Hassan, S Huda, S Sharmeen, J Abawajy, G Fortino

(2021), Vol. 17, pp. 2860-2870, IEEE Transactions on Industrial Informatics, C1

journal article

A Robust Deep-Learning-Enabled Trust-Boundary Protection for Adversarial Industrial IoT Environment

M Hassan, M Hassan, S Huda, V De Albuquerque

(2021), Vol. 8, pp. 9611-9621, IEEE Internet of Things Journal, C1

journal article

Improving malicious PDF classifier with feature engineering: A data-driven approach

A Falah, L Pan, S Huda, S Pokhrel, A Anwar

(2021), Vol. 115, pp. 314-326, Future Generation Computer Systems, C1

journal article

A predictive intelligence approach to classify brain-computer interface based eye state for smart living

M Hassan, M Hassan, S Huda, M Uddin, A Gumaei, A Alsanad

(2021), Vol. 108, Applied Soft Computing, C1

journal article

An Unsupervised Model for Identifying and Characterizing Dark Web Forums

S Nazah, S Huda, J Abawajy, M Hassan

(2021), Vol. 9, pp. 112871-112892, IEEE Access, Piscataway, N.J., C1

journal article

An efficient, hybrid authentication using ecg and lightweight cryptographic scheme for wban

Z Rehman, S Altaf, S Ahmad, S Huda, A Al-Shayea, S Iqbal

(2021), Vol. 9, pp. 133809-133819, IEEE Access, C1

journal article

Lightweight authenticated encryption for cloud-assisted IoT applications

Z AlJabri, J Abawajy, S Huda

(2021), Vol. 740, pp. 295-299, EWCIS 2020 : Trends in wireless communication and information security : proceedings of EWCIS 2020, Ranchi, India, E1

conference
2020

An adaptive framework against android privilege escalation threats using deep learning and semi-supervised approaches

S Sharmeen, S Huda, J Abawajy, M Hassan

(2020), Vol. 89, Applied Soft Computing Journal, C1

journal article

Avoiding future digital extortion through robust protection against ransomware threats using deep learning based adaptive approaches

Shaila Sharmeen, Yahye Ahmed, Shamsul Huda, Bari Kocer, Mohammad Hassan

(2020), Vol. 8, pp. 24522-24534, IEEE Access, Piscataway, N.J., C1

journal article

Increasing the Trustworthiness in the Industrial IoT Networks through a Reliable Cyberattack Detection Model

M Hassan, A Gumaei, S Huda, A Almogren

(2020), Vol. 16, pp. 6154-6162, IEEE Transactions on Industrial Informatics, C1

journal article

A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection

Y Ahmed, B Koçer, S Huda, B Saleh Al-rimy, M Hassan

(2020), Vol. 167, Journal of Network and Computer Applications, C1

journal article

A robust cyberattack detection approach using optimal features of SCADA power systems in smart grids

A Gumaei, M Hassan, S Huda, M Hassan, D Camacho, J Del Ser, G Fortino

(2020), Vol. 96, Applied Soft Computing Journal, C1

journal article

Evolution of dark web threat analysis and detection: A systematic approach

S Nazah, S Huda, J Abawajy, M Hassan

(2020), Vol. 8, pp. 171796-171819, IEEE Access, C1

journal article
2019

Human emotion recognition using deep belief network architecture

Mohammad Hassan, Md Alam, Md Uddin, Shamsul Huda, Ahmad Almogren, Giancarlo Fortino

(2019), Vol. 51, pp. 10-18, Information fusion, Amsterdam, The Netherlands, C1

journal article

Automatic extraction and integration of behavioural indicators of malware for protection of cyber-physical networks

S Huda, J Abawajy, B Al-Rubaie, L Pan, M Hassan

(2019), Vol. 101, pp. 1247-1258, Future Generation Computer Systems, C1

journal article

Identifying malware on cyber physical systems by incorporating semi-supervised approach and deep learning

S Sharmeen, S Huda, J Abawajy

(2019), Vol. 322, pp. 1-8, Proceedings of the 2019 International Conference on Smart Power & Internet Energy Systems 25–27 April 2019, Deakin University, Melbourne, Australia, Melbourne, Victoria, E1

conference
2018

Multistage fusion approaches based on a generative model and multivariate exponentially weighted moving average for diagnosis of cardiovascular autonomic nerve dysfunction

M Hassan, S Huda, J Yearwood, H Jelinek, A Almogren

(2018), Vol. 41, pp. 105-118, Information fusion, Amsterdam, The Netherlands, C1

journal article

A Framework for Software Defect Prediction and Metric Selection

S Huda, S Alyahya, M Mohsin Ali, S Ahmad, J Abawajy, H Al-Dossari, J Yearwood

(2018), Vol. 6, pp. 2844-2858, IEEE Access, C1

journal article

A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection

S Huda, R Islam, J Abawajy, J Yearwood, M Hassan, G Fortino

(2018), Vol. 83, pp. 193-207, Future Generation Computer Systems, C1

journal article

Malware Threats and Detection for Industrial Mobile-IoT Networks

S Sharmeen, S Huda, J Abawajy, W Ismail, M Hassan

(2018), Vol. 6, pp. 15941-15957, IEEE Access, C1

journal article

An Ensemble Oversampling Model for Class Imbalance Problem in Software Defect Prediction

S Huda, K Liu, M Abdelrazek, A Ibrahim, S Alyahya, H Al-Dossari, S Ahmad

(2018), Vol. 6, pp. 24184-24195, IEEE Access, C1

journal article

Human Activity Recognition from Body Sensor Data using Deep Learning

M Hassan, S Huda, M Uddin, A Almogren, M Alrubaian

(2018), Vol. 42, Journal of Medical Systems, United States, C1

journal article

A malicious threat detection model for cloud assisted internet of things (CoT) based industrial control system (ICS) networks using deep belief network

S Huda, S Miah, J Yearwood, S Alyahya, H Al-Dossari, R Doss

(2018), Vol. 120, pp. 23-31, Journal of parallel and distributed computing, Amsterdam, The Netherlands, C1

journal article

Securing the operations in SCADA-IoT platform based industrial control system using ensemble of deep belief networks

S Huda, J Yearwood, M Hassan, A Almogren

(2018), Vol. 71, pp. 66-77, Applied Soft Computing Journal, C1

journal article

Identifying cyber threats to mobile-IoT applications in edge computing paradigm

J Abawajy, S Huda, S Sharmeen, M Hassan, A Almogren

(2018), Vol. 89, pp. 525-538, Future Generation Computer Systems, C1

journal article

Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA)

N Gunaratne, M Abdollahian, S Huda

(2018), Vol. 738, pp. 295-300, ITNG 2018 : Proceedings of the International Conference on Information Technology - New Generations, Las Vegas, Nevada, E1

conference
2017

Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data

S Huda, S Miah, M Mehedi Hassan, R Islam, J Yearwood, M Alrubaian, A Almogren

(2017), Vol. 379, pp. 211-228, Information Sciences, C1

journal article

A fast malware feature selection approach using a hybrid of multi-linear and stepwise binary logistic regression

S Huda, J Abawajy, M Abdollahian, R Islam, J Yearwood

(2017), Vol. 29, Concurrency and Computation: Practice and Experience, C1

journal article

Exponentially weighted control charts to monitor multivariate process variability for high dimensions

N Gunaratne, M Abdollahian, S Huda, J Yearwood

(2017), Vol. 55, pp. 4948-4962, International journal of production research, Abingdon, Eng., C1

journal article

A parallel framework for software defect detection and metric selection on cloud computing

M Ali, S Huda, J Abawajy, S Alyahya, H Al-Dossari, J Yearwood

(2017), Vol. 20, pp. 2267-2281, Cluster Computing, C1

journal article
2016

Hybrids of support vector machine wrapper and filter based framework for malware detection

S Huda, J Abawajy, M Alazab, M Abdollalihian, R Islam, J Yearwood

(2016), Vol. 55, pp. 376-390, Future Generation Computer Systems, C1

journal article

A Hybrid Feature Selection with Ensemble Classification for Imbalanced Healthcare Data: A Case Study for Brain Tumor Diagnosis

S Huda, J Yearwood, H Jelinek, M Hassan, G Fortino, M Buckland

(2016), Vol. 4, pp. 9145-9154, IEEE Access, C1

journal article
2014

A hybrid wrapper-filter approach for malware detection

M Alazab, S Huda, J Abawajy, R Islam, J Yearwood, S Venkatraman, R Broadhurst

(2014), Vol. 9, pp. 2878-2891, Journal of networks, Oulu, Finland, C1

journal article

A hybrid wrapper-filter approach to detect the source(s) of out-of-control signals in multivariate manufacturing process

S Huda, M Abdollahian, M Mammadov, J Yearwood, S Ahmed, I Sultan

(2014), Vol. 237, pp. 857-870, European journal of operational research, Amsterdam, The Netherlands, C1-1

journal article

Hybrid metaheuristic approaches to the expectation maximization for estimation of the hidden markov model for signal modeling

S Huda, J Yearwood, R Togneri

(2014), Vol. 44, pp. 1962-1977, IEEE transactions on cybernetics, Piscataway, United States, C1-1

journal article
2013

An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy

A Strainieri, J Abawajy, A Kelarev, S Huda, M Chowdhury, H Jelinek

(2013), Vol. 58, pp. 185-193, Artificial intelligence in medicine, Amsterdam, The Netherlands, C1

journal article
2012

Performance evaluation of multivariate non-normal process using metaheuristic approaches

S Ahmad, M Abdollahian, M Bhatti, S Huda, J Yearwood

(2012), Vol. 20, pp. 299-315, Journal of applied statistical science, Hauppage, N.Y., C1-1

journal article
2011

Smart RFID reader protocol for malware detection

B Ray, S Huda, M Chowdhury

(2011), pp. 64-69, SNPD 2011 : Proceedings of the 12th ACIS International Conference on Software Engineering, Artificial Intelligence Networking and Parallel Distributed Computing, Sydney, N. S. W., E1

conference

Hybrid wrapper-filter approaches for input feature selection using maximum relevance-minimum redundancy and artificial neural network input gain measurement approximation (ANNIGMA)

S Huda, J Yearwood, A Stranieri

(2011), Vol. 113, pp. 43-52, ACSC 2011 :, Perth, W.A., E1-1

conference

Reinforcement learning approach to AIBO robot's decision making process in Robosoccer's goal keeper problem

S Mukherjee, J Yearwood, P Vamplew, S Huda

(2011), pp. 24-30, SNPD 2011 : Proceedings of the 2011 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Sydney, N.S.W., E1-1

conference

A reinforcement learning approach with spline-fit object tracking for AIBO robot's high level decision making

S Mukherjee, S Huda, J Yearwood

(2011), Vol. 368, pp. 169-183, SNPD 2011 : Proceedings of the 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Sydney, N.S.W., E1-1

conference

Multivariate control charts for surgical procedures

M Abdollahian, S Ahmad, S Huda

(2011), ISABEL '11: Proceedings of the International Symposium on Applied Sciences in Biomedical and Communication Technologies, Barcelona, Spain, E1-1

conference
undefined

Achieving Personalized Precision Education Using the Catboost Model during the COVID-19 Lockdown Period in Pakistan

Rimsha Asad, Saud Altaf, Shafiq Ahmad, Adamali Shah Noor Mohamed, Shamsul Huda, Sofia Iqbal

(), Vol. 15, pp. 2714-2714, Sustainability, C1

journal article

Radio-Frequency-Identification-Based 3D Human Pose Estimation Using Knowledge-Level Technique

Saud Altaf, Muhammad Haroon, Shafiq Ahmad, Emad Nasr, Mazen Zaindin, Shamsul Huda, Zia Rehman

(), Vol. 12, pp. 374-374, Electronics, C1

journal article

Funded Projects at Deakin

Other Public Sector Funding

Kronos: Towards Fast Feedback Fuzzers for Discovering Vulnerabilities in Software Binaries

Prof Robin Ram Mohan Doss, Dr Shamsul Huda

Data61

  • 2023: $20,000
  • 2022: $13,333
  • 2021: $6,667

Industry and Other Funding

Intelligent software engineering techniques to monitor and improve the quality of software development and managing the productivity of the developers

Dr Shamsul Huda, Prof John Yearwood, Prof Jemal Abawajy

King Saud University, Sparx Systems

  • 2016: $20,000
  • 2015: $40,000

Obfuscation-resilient Algorithm for Early Detection of Malicious Software

Prof Jemal Abawajy, Dr Shamsul Huda

Research and and Innovation Agency, Ministry of Education, Saudi Arabia

  • 2021: $30,000

Other Funding Sources

Sharing Cybersecurity Data for Australian Research (SCReeD).

Prof Jemal Abawajy, Prof Chang-Tsun Li, Prof Gang Li, A/Prof William Yeoh, Dr Shamsul Huda, Dr Frank Jiang, Dr Jack Li

Cyber Security Research Centre Limited

  • 2024: $25,000
  • 2023: $12,500
  • 2022: $10,320

Socrates: Software Security with a focus on critical technologies.

A/Prof Lei Pan, Dr Syed Wajid Ali Shah, Prof Robin Ram Mohan Doss, Dr Zubair Baig, Prof Jemal Abawajy, Prof Shiri Krebs, Dr Jayson Lamchek, Dr Shamsul Huda, Dr Muna Al-Hawawreh, Dr Naeem Syed, Dr Jack Li, Dr Ye Zhu, Dr Frank Jiang, A/Prof William Yeoh, Prof Chang-Tsun Li, A/Prof Lennon Chang, Prof Patrick Emerton, Dr Hourieh Khalajzadeh, Dr Van-Hau Trieu, Dr Yanjun Zhang, Dr Leo Zhang

Cyber Security Research Centre Limited

  • 2024: $30,244
  • 2023: $120,976

Supervisions

Associate Supervisor
2023

Ipshita Das

Thesis entitled: Developing a novel algorithm for the condition assessment of utility timber poles

Doctor of Philosophy (Engineering), School of Engineering

2022

Shaila Sharmeen

Thesis entitled: Semi-Supervised Models for Android Malware Detection

Doctor of Philosophy (Information Technology), School of Information Technology

2021

Saiba Nazah

Thesis entitled: Understanding the Characteristics of Dark Web Forum Using Machine Learning Techniques

Master of Science (Information Technology), School of Information Technology

2020

Ahmed Falah

Thesis entitled: Improving PDF Maldoc Detection via Data-Driven Feature Engineering

Doctor of Philosophy (Information Technology), School of Information Technology