Publications & Presentations

A comprehensive record of the Cyber Innovation Lab's scholarly contributions sorted by date, including book chapters, peer-reviewed journal articles, conference proceedings, and preprints.

Book Chapters

Rahimi, N. N., Murad, S. A., Lee, S. B. (2024). Entrepreneurship Opportunities in Cybersecurity. Generating Entrepreneurial Ideas With AI (pp. 172--191). IGI Global.

Murad, s. A., Rahimi, N. (2024). Security Challenges in the Industrial Internet of Things (IIoT). Quality Assessment and Security in Industrial Internet of Things (IIoT). CRC press Taylor and Fransis Group.

Rahimi, N., Gudapati, S. S. V. (2023). The Emergence of Blockchain Technology in Healthcare and Insurance Industry. Blockchain Technology Solutions for Secure of IoT-based Health Systems (pp. 167-182). Elsevier Science, Academic Press.

Rahimi, N., Roy, I., Gupta, B., Bhandari, P., Debnath, N. C. (2021). Blockchain technology and its emerging applications. Blockchain Technology for Data Privacy Management (1st ed., pp. 133--157). CRC Press.

Rahimi, N., Gupta, B. (2021). Security Issues, Vulnerabilities, and Defense Mechanisms in Wireless Sensor Networks: State of the Art and Recommendation. Integration of WSNs into Internet of Things (1st ed., pp. 1--15). CRC Press.

Journal Articles

Fatima, R., Madububambachu, U., Sherif, A., Hataba, M., Rahimi, N., Khalil, K. (2026). Physical Unclonable Function Based Privacy-Preserving Authentication Scheme for Autonomous Vehicles Using Hardware Acceleration. Sensors (Basel, Switzerland) 26 (4), 1088.

Rahimi, N., Jones, H. (2025). Cyber Warfare: Strategies, impacts, and future directions in the digital battlefield. Journal of Information Security 16 (2), 252-269.

Murad, S. A., Dahal, A., Rahimi, N. (2025). Multilingual Cyber Threat Detection in Tweets/X Using ML, DL, and LLM: A Comparative Analysis. IEEE Transactions on Computational Social Systems.

Rajkarnikar, J., Poudel, N., Rahimi, N. (2025). Unsupervised Anomaly Detection in OpenStack Logs via Fine-Tuned RoBERTa Embeddings. Journal of Cybersecurity, Digital Forensics, and Jurisprudence 1, 9-20.

Dahal, A., Murad, S. A., Rahimi, N. (2025). Heuristical comparison of vision transformers against convolutional neural networks for semantic segmentation on remote sensing imagery. IEEE Sensors Journal.

Penchala, S., Rahimi, N. (2025). Maximizing Cyber Resilience through Efficient Vulnerability Prioritization: The WBTS Model. International Journal of Computers and Applications 32 (1).

Rahimi, N., Barati, M., Lee, S. (2025). Evolving Cybersecurity Policy: Addressing Modern Threats and Enhancing Resilience in a Digital Age. Journal of Information Security.

Murad, S. A., Rahimi, N. (2024). Secure and efficient hierarchical P2P fog architecture: A novel approach for IoT. IEEE Internet of Things Journal 11 (10), 18796-18807.

Murad, S. A., Rahimi, N. (2024). Unveiling Thoughts: A Review of Advancements in EEG Brain Signal Decoding into Text. IEEE Transactions on Cognitive and Developmental Systems, 1-16.

Roy, I., Kaluvakuri, S., Rahimi, N., Gupta, B., Debnath, N. C. (2024). Design of a Hybrid Interest-Based Peer-to-Peer Network Using Residue Class-based Topology and Star Topology. International Journal for Computers & Their Applications 31 (3).

Baluguri, A., Pasumarthy, V., Roy, I., Gupta, B., Rahimi, N. (2024). Optimizing network security via ensemble learning: a nexus with intrusion detection. Journal of Information Security 15 (4), 545-556.

Murad, S. A., Azmi, Z. R. M., Muzahid, A. J. M., Sarker, M. M. H., Miah, M. S. U., Bhuiyan, M. K. B., Rahimi, S. N., Bairagi, A. K. (2024). Priority based job scheduling technique that utilizes gaps to increase the efficiency of job distribution in cloud computing. Sustainable Computing: Informatics and Systems 41, 100942.

Murad, S. A., Azmi, Z. R. M., Muzahid, A. J. M., Bhuiyan, M. K. B., Saib, M., Rahimi, N., Prottasha, N. J., Bairagi, A. K. (2024). SG-PBFS: Shortest gap-priority based fair scheduling technique for job scheduling in cloud environment. Future Generation Computer Systems 150, 232-242.

Rahimi, N., Roy, I., Liu, Z., Gupta, B., Debnath, N. (2023). Secured Communication in Generalized Non DHT-based Pyramid Tree P2P Architecture. International Journal of Computers and Their Applications 30 (3).

Williams, D. F., Rahimi, N., Smay, J. E., Hemmati, S. (2023). Optimizing silver nanowire synthesis: machine learning improves and predicts yield for a polyol, millifluidic flow reactor. Applied Nanoscience 13 (9), 6539-6552.

Roy, I., Mitra, R., Rahimi, N., Gupta, B. (2023). Efficient non-DHT-based RC-based architecture for fog computing in healthcare 4.0. IoT 4 (2), 131-149.

Roy, I., Rahimi, N., Liu, Z., Gupta, B., Debnath, N. (2023). On Generalization of Residue Class Based Pyramid Tree P2P Network Architecture. International Journal of Computers and Their Applications.

Maddali, K., Kaluvakuri, S., Roy, I., Rahimi, N., Gupta, B., Debnath, N. (2022). A Comprehensive Study of Some Recent Proximity Awareness Models and Common-Interest Architectural Formulations Among P2P Systems. International Journal for Computers & Their Applications 28 (4).

Kaluvakuri, S., Maddali, K., Rahimi, N., Gupta, B., Debnath, N. (2020). Generalization of rc-based low diameter hierarchical structured p2p network architecture. International Journal of Computers and Their Applications 27 (2), 74-83.

Rahimi, N. (2020). Security Consideration In Peer-to-Peer Networks with a Case Study Application. International Journal of Network Security & Its Applications (IJNSA) 12 (2).

Rahimi, N., Nolan, J., Gupta, B. (2019). Android Security and Its Rooting—A Possible Improvement of Its Security Architecture. Journal of Information Security 10 (2), 91-102.

Praveen, M. V., Majumder, P., Sinha, K., Rahimi, N., Gupta, B. (2018). A Highly Secured Three-Phase Symmetric Cipher Technique. International Journal of Computers and Their Applications 25 (4), 1-10.

Rahimi, N., Reed, J. J., Gupta, B. (2018). On the Significance of Cryptography as a Service. Journal of Information Security 9 (4), 242-256.

Gupta, B., Alyanbaawi, A., Rahimi, N., Sinha, K., Liu, Z. (2018). A Novel Low Latency Load Shared Multicore Multicasting Schemes. International Journal of Computers and Their Applications.

Rahimi, N., Sadeghi, M. H., Mahjoob, M. J. (2007). Performance of the geometric approach to fault detection and isolation in SISO, MISO, SIMO and MIMO systems. Journal of Zhejiang University-SCIENCE A 8 (9), 1443-1451.

Subreena, M. A. H., Raquib, M., Murad, S. A., Prity, F. S., Hanif, M., Rahimi, N. (2007). Robust and Real-Time Bangladeshi Currency Recognition: A Dual-Stream MobileNet and EfficientNet Approach. IJNSA.

Peer Reviewed Conference Publications & Presentations

Poudel, M., Rahimi, N. (2025). Machine Learning-Based AES Key Recovery via Side-Channel Analysis on the ASCAD Dataset. International Conference on Software Engineering and Data Engineering, 334-352.

Jha, P., Hamid, H., Olukola, O., Dahal, A., Rahimi, N. (2025). Adversarial Machine Learning for Robust Password Strength Estimation. International Conference on Software Engineering and Data Engineering, 289-301.

Rahimi, N., Margapuri, V., Golilarz, N. A. (2025). Software and Data Engineering: 34th International Conference, SEDE 2025, New Orleans, LA, USA, October 20-21, 2025, Proceedings. Springer Nature.

Ferreira, L. D. J., Rahimi, N. (2025). The Fight Against Fake News Leveraging Machine Learning, NLP as Deterring Methods. 2025 IEEE 4th International Conference on Computing and Machine Intelligence.

Precious-Esue, D., Rajkarnikar, J., Bellrose, B., Upadhyay, K., Rahimi, N. (2025). Ensemble Machine Learning Approach to Phishing Website Detection. International Conference on Computers and Their Applications, 88-97.

Nader, T., Murad, S. A., Rahimi, N. (2025). Human Activity Recognition Using an Ensemble Learning Approach. International Conference on Computers and Their Applications, 98-112.

Dahal, A., Murad, S. A., Rahimi, N. (2025). Embedding Shift Dissection on CLIP: Effects of Augmentations on VLM's Representation Learning. Proceedings of the Computer Vision and Pattern Recognition Conference, 4814-4818.

McNair, A., Precious-Esue, D., Newson, S., Rahimi, N. (2024). A Comparative Study of Machine Learning. Software and Data Engineering: 33rd International Conference, SEDE 2024, San Diego.

Vinaganti, H., Tannedi, N. C., Nannuri, P., Roy, I., Mitra, R., Rahimi, N., Gupta, B. (2024). Enabling Seamless Healthcare Services with RC-Based Geographical Peer-to-Peer Fog Architecture in the Healthcare 4.0. International Conference on Computer Applications in Industry and Engineering.

Harrison, N., Broome, H., Shrestha, Y., Robles, A., Gautam, A., Rahimi, N. (2024). Adversarial Attack Optimization. Software and Data Engineering: 33rd International Conference, SEDE 2024, San Diego.

Feng, W., Rahimi, N., Margapuri, V. (2024). Software and Data Engineering. Springer Nature.

Harrison, N., Broome, H., Shrestha, Y., Robles, A., Rahimi, N. (2024). Adversarial Attack Optimization and Evaluation for Machine Learning-Based Dark Web Traffic Analysis. International Conference on Software Engineering and Data Engineering.

McNair, A., Precious-Esue, D., Newson, S., Rahimi, N. (2024). Enhancing IoT Network Defense: A Comparative Study of Machine Learning Algorithms for Attack Classification. Software and Data Engineering: 33rd International Conference, SEDE 2024.

Rahimi, N., Lee, S. (2024). Navigating the Ethical Landscape of Big Data Collection and Analysis. World Congress in Computer Science, Computer Engineering & Applied Computing.

Dahal, A., Bajgai, P., Rahimi, N. (2024). Analysis of zero day attack detection using MLP and XAI. World Congress in Computer Science, Computer Engineering & Applied Computing.

Roy, I., Mitra, R., Rahimi, N., Gupta, B. (2024). Enabling Seamless Healthcare Service with RC-Based Geographical Peer-to-Peer Fog Architecture. Computer Applications in Industry and Engineering, 189.

Roy, I., Mitra, R., Kaluvakuri, S., Rahimi, N., Gupta, B. (2024). On further improvement of data look-up latency in Residue Class (RC) based Peer-2-Peer networks. Proceedings of 39th International Conference 98, 69-76.

Penchala, S., Murad, S. A., Roy, I., Gupta, B., Rahimi, N. (2024). Unveiling text mining potential: a comparative analysis of document classification algorithms. Proceedings of 39th International Conference 98, 103-115.

Murad, S. A., Rahimi, N., Muzahid, A. J. M. (2024). PhishGuard: Machine Learning-Powered Phishing URL Detection.

Murad, S. A., Rahimi, N. (2023). Secure and scalable permissioned blockchain using LDE-P2P networks. 2023 10th International Conference on Internet of Things: Systems, Management and Security.

Murad, S. A., Rahimi, N., Roy, I., Gupta, B. (2023). Design of a New Secured Hierarchical Peer-to-Peer Fog Architecture Based on Linear Diophantine Equation. Proceedings of 38th International Conference on Computers and Their Applications.

Gautam, A., Rahimi, N. (2023). Viability of Machine Learning in Android Scareware Detection. Proceedings of 38th International Conference on Computers and Their Applications.

Roy, I., Rahimi, N., Gupta, B., Debnath, N. (2023). Infrastructure development of non DHT-based pyramid tree network architecture. Proceedings of 38th International Conference 91, 116-123.

Rahimi, N., Gudapati, S. S. V. (2023). Emergence of Blockchain Technology in the Healthcare and Insurance Industries. Elsevier.

Ables, J., Kirby, T., Anderson, W., Mittal, S., Rahimi, S., Banicescu, I., Seale, M. (2022). Creating an explainable intrusion detection system using self organizing maps. 2022 IEEE Symposium Series on Computational Intelligence (SSCI), 404-412.

Broome, H., Shrestha, Y., Harrison, N., Rahimi, N. (2022). SMS Malware Detection: A Machine Learning Approach. 2022 International Conference on Computational Science and Computational Intelligence.

Rahimi, N. (2022). A Study of the Landscape of Security Issues, Vulnerabilities, and Defense Mechanisms in Web Based Applications. 2022 International Conference on Computational Science and Computational Intelligence.

Roy, I., Rahimi, N., Mitra, R., Kaluvakuri, S. (2022). Efficient secured public-key based data lookup and multicast protocols with anonymity in RC-based two-level hierarchical structured P2P network. Proceedings of 35th International Conference 89, 62-71.

Maddali, K., Kaluvakuri, S., Rahimi, N., Gupta, B., Debnath, N. (2021). On designing secured communication protocols along with anonymity for crt based structured p2p network architecture. EPiC Series in Computing 75, 59-68.

Rahimi, N., Martin, N. (2020). Challenges and Strategies for Online Teaching in Information Technology and Other Computing Programs. ACM-SIGITE 20.

Rahimi, N., Nolan, J., Gupta, B. (2020). Adversarial Machine Learning: Difficulties in Applying Machine Learning to Existing Cybersecurity Systems. Proceedings of 35th International Conference on Computers and Their Applications (CATA), San Diego, CA, March 2020.

Rahimi, N., Gupta, B. (2020). A Study of the Landscape of Internet Censorship and Anti-Censorship in Middle East. Proceedings of 35th International Conference on Computers and Their Applications (CATA), San Diego, CA, March 2020.

Roy, I., Rahimi, N., Maddali, K., Kaluvakuri, S., Gupta, B., Debnath, N. (2020). Design of Efficient Broadcast Protocol for Pyramid Tree-based P2P Network Architecture. EPiC Series in Computing, Proceedings of 33rd Int. Conf. Computer Applications in Industry and Engineering.

Gupta, B., Rahimi, N., Hexmoor, H. (2018). Design of Very Efficient Lookup Algorithms for a Low Diameter Hierarchical Structured Peer-to-Peer Network. Industrial Informatics (INDIN), IEEE 16th International Conference.

Gupta, B., Rahimi, N., Hexmoor, H., Maddali, K. (2018). Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem. Proceedings of the 33rd International Conference on Computers and Their Applications.

Rahimi, N., Gupta, B., Rahimi, S. (2018). Secured Data Lookup in LDE Based Low Diameter Structured P2P Network.

Asadzadeh, L., Rahimi, N. (2017). Analyzing Facebook activities for personality recognition. 2017 16th IEEE International Conference on Machine Learning and Applications.

Ahmed, T., Bosu, A., Iqbal, A., Rahimi, S. (2017). SentiCR: A customized sentiment analysis tool for code review interactions. 2017 32nd IEEE/ACM International Conference on Automated Software Engineering.

Alyanbaawi, A., Gupta, B., Rahimi, S., Rahimi, N., Sinha, K. (2017). An efficient approach for load-shared and fault-tolerant multicore shared tree multicasting. 2017 IEEE 15th International Conference on Industrial Informatics (INDIN).

Gupta, B., Rahimi, N., Rahimi, S., Alyanbaawi, A. (2017). Efficient data lookup in non-DHT based low diameter structured P2P network. 2017 IEEE 15th International Conference on Industrial Informatics (INDIN).

Rahimi, N. (2017). A Novel Linear Diophantine Equation-Based Low Diameter Structured Peer-to-Peer Network. Southern Illinois University.

Gupta, B., Koneru, S., Alyanbaawi, A., Rahimi, N. (2017). A modified version of DVR-based multicasting with security. Industrial Informatics (INDIN), 2017 IEEE 15th International Conference.

Rahimi, N., Sinha, K., Gupta, B., Rahimi, S., Debnath, N. C. (2016). LDEPTH: A low diameter hierarchical P2P network architecture. Industrial Informatics (INDIN), 2016 IEEE 14th International Conference.

Rahimi, N., Raeisi, H., Ghasemi, G. A., Sadeghi, M. (2016). A comparison of occupational burnout among athletic and non athletic military personnel.

Zhu, M., Rahimi, N. (2015). Experience Towards Integrating Parallel and Distributed Computing Concepts at Different Levels of Undergraduate Courses. EduPar Workshop in conjunction with IEEE IPDPS 2015.

Zhu, M. M., Rahimi, S. N. (2015). Promoting Teaching Effectiveness and Cultivating Interests in Parallel and Distributed Computing. Proceedings of IEEE IPDPS 2015.

Gupta, B., Rahimi, N., Liu, Z., Koneru, S. (2015). Design of structured peer-to-peer networks using linear diophantine equation. Proc. CAINE, 147-151.

Gupta, B., Rahimi, N., Debnath, N. C., Videm, D. S., Ethirajan, K. (2014). Pseudo Diameter-Based Pruning-A QOS Based Broadcasting for Wide Area Networks. CATA, 138-141.

Preprints & arXiv Articles

Olukola, O., Rahimi, N. (2026). AMDS: Attack-Aware Multi-Stage Defense System for Network Intrusion Detection with Two-Stage Adaptive Weight Learning. arXiv preprint arXiv:2603.00859.

View arXiv Paper

Raquib, M., Polok, A. P., Biswas, K. N., Azad, R. U., Murad, S. A., Rahimi, N. (2026). A Fusion of context-aware based BanglaBERT and Two-Layer Stacked LSTM Framework for Multi-Label Cyberbullying Detection. arXiv preprint arXiv:2602.22449.

View arXiv Paper

Hossain, M. A., Raquib, M., Murad, S. A., Prity, F. S., Hanif, M., Rahimi, N. (2026). Robust and Real-Time Bangladeshi Currency Recognition: A Dual-Stream MobileNet and EfficientNet Approach. arXiv preprint arXiv:2602.07015.

View arXiv Paper

Jahan, S., Murad, S. A., Rahimi, N., Golilarz, N. A. (2026). Gamma2Patterns: Deep Cognitive Attention Region Identification and Gamma-Alpha Pattern Analysis. arXiv preprint arXiv:2601.06257.

View arXiv Paper

Raquib, M., Akash, M. M., Ahmed, T., Murad, S. A., Prity, F. S., Hossain, M. A., ... (2025). A Unified BERT-CNN-BiLSTM Framework for Simultaneous Headline Classification and Sentiment Analysis of Bangla News. arXiv preprint arXiv:2511.18618.

View arXiv Paper

Dahal, A., Ghimire, A., Murad, S. A., Rahimi, N. (2025). POVQA: Preference-Optimized Video Question Answering with Rationales for Data Efficiency. arXiv preprint arXiv:2510.01009.

View arXiv Paper

Jha, P., Hamid, H., Olukola, O., Dahal, A., Rahimi, N. (2025). Adversarial Machine Learning for Robust Password Strength Estimation. arXiv preprint arXiv:2506.00373.

View arXiv Paper

Dahal, A., Ghimire, A., Murad, S. A., Rahimi, N. (2025). Redemption Score: A Multi-Modal Evaluation Framework for Image Captioning via Distributional, Perceptual, and Linguistic Signal Triangulation. arXiv preprint arXiv:2505.16180.

View arXiv Paper

Murad, S. A., Dahal, A., Rahimi, N. (2025). EEG-to-Text Translation: A Model for Deciphering Human Brain Activity. arXiv preprint arXiv:2505.13936.

View arXiv Paper

Murad, S. A., Dahal, A., Rahimi, N. (2025). Multi-Lingual Cyber Threat Detection in Tweets/X Using ML, DL, and LLM: A Comparative Analysis. arXiv preprint arXiv:2502.04346.

View arXiv Paper

Dahal, A., Bajgai, P., Rahimi, N. (2025). Analysis of Zero Day Attack Detection Using MLP and XAI. arXiv preprint arXiv:2501.16638.

View arXiv Paper

Dahal, A., Murad, S. A., Rahimi, N. (2025). Efficiency Bottlenecks of Convolutional Kolmogorov-Arnold Networks: A Comprehensive Scrutiny with ImageNet, AlexNet, LeNet and Tabular Classification. arXiv preprint arXiv:2501.15757.

View arXiv Paper

Poudel, M., Rahimi, N. (2025). Machine Learning-Based AES Key Recovery via Side-Channel Analysis on the ASCAD Dataset. arXiv preprint arXiv:2508.11817.

View arXiv Paper

Dahal, A., Murad, S. A., Rahimi, N. (2024). Heuristical Comparison of Vision Transformers Against Convolutional Neural Networks for Semantic Segmentation on Remote Sensing Imagery. arXiv preprint arXiv:2411.09101.

View arXiv Paper