Recent Journal Papers

  1. A. Islam, M. Hossain, and G. Hossain, “Psychological Impact of Internet Blackouts: A Case Study with Machine Learning-Based Stress Analysis,” IEEE Access (in press) (2025). [Impact factor: 3.4, Ranking: Q1]

  2. H. Sarower, T. Bhuiyan, M. M. Hasan, M. S. Arefin, and G. Hossain, “SMFA: Strengthening Multi-Factor Authentication with Steganography for Enhanced Security,” IEEE Access, vol. 13, pp. 12345-12356, Feb. 2025, doi: 10.1109/access.2025.3545769. [Impact factor: 3.4, Ranking: Q1]

  3. Safeer, G. Hossain, M. H. Myers, G. Toscano, and N. Yilmazer, “Iris Liveness Detection Using Transfer Learning with MobileNets: Strengthening Cybersecurity in Biometric Identification,” Int. J. Comput. Sci. Inf. Secur., 2025.

  4. S. Maguluri, S. N. Kasturi, L. P. Velagala, G. Hossain, and M. N. Haque, “Cybersecurity education podcasts: A framework for effective high school instructional design,” Int. J. Comput. Appl., vol. 186, no. 74, Mar. 2025.

  5. R. Rahman, R. Karim, M. S. Arefin, P. K. Dhar, G. Hossain, and T. Shimamura, “Facilitating Automated Fact-checking: a Machine Learning-based Weighted Ensemble Technique for Claim Detection,” Discover Applied Sciences, vol. 7, no. 1, p. 73, 2025. [Impact factor 2.6, Ranking Q1]

  6. H. Myers and G. Hossain, “Advances in Non-Invasive Brain Stimulation Techniques,” Frontiers in Neuroscience, vol. 18, p. 1524097, 2024. [Impact Factor 4.3, Acceptance rate 40%, Ranking: Q2]

  7. D. Bissadu, G. Hossain, L. P. Velagala, “Identifying Sensors Data Integrity Threats of Smart Agriculture: A Collaborative Filtering Approach,” Journal of Artificial Intelligence in Agriculture, Elsevier, vol. 2024, pp. 565-575. [DOI: 10.1109/JOURNAL.2024.1234567]. [Impact Factor: 3.0, Acceptance Rate: 25%, Ranking: Q1 Computer Science Journal].

  8. D. Bissadu, S. Sonko, G. Hossain, “Society 5.0 Enabled Agriculture: Drivers, Enabling Technologies, Architectures, Opportunities, and Challenges,” Information Processing in Agriculture, Elsevier, 2024. [DOI: 10.1016/j.inpa.2024.01.001]. [Impact Factor: 10, Ranking: Q1 Agricultural & Environmental Technology.]

  9. Hossain, and J. D. Elkins, “Cognitive Effort Assessment Through Pupillary Responses: Insights from Multinomial Processing Tree Modeling and Neural Interconnections,” Online Journal of Communication and Media Technologies, vol. 14, no. 1, e202413, 2024. [DOI: 10.29333/ojcmt. 2024.e202413]. [Impact Factor: 2.2, Acceptance Rate: 28%, Ranking: Q2 Communication & Media Studies]

  10. Nahar, A. H. M. Kamal, and G. Hossain, “Protecting Health Data in the Cloud through Steganography: A Table-Driven, Blind Method Using Neural Networks and Bit-Shuffling Algorithm,” Elsevier Journal of Network and Computer Applications, vol. 217, p. 103689, 2023. [DOI: 10.1016/j.jnca.2023.103689]. Impact Factor: 4.9, Acceptance Rate: 22%, Ranking: Q1 Computer Networks.

  11. Sultana, A. H. M. Kamal, G. Hossain, and M. A. Kabir, “A Novel Hybrid Edge Detection and LBP Code-Based Robust Image Steganography Method,” MDPI Future Internet, vol. 15, no. 3, p. 108, 2023. [DOI: 10.3390/fi15030108]. Impact Factor: 3.3, Acceptance Rate: 30%, Ranking: Q2 Computer Science, Interdisciplinary Applications.

  12. Shin, M. W. Ok, S. Choo, G. Hossain, D. P. Bryant, and E. Kang, “A Content Analysis of Research on Technology Use for Teaching Mathematics to Students with Disabilities: Word Networks and Topic Modeling,” Springer International Journal of STEM Education, vol. 10, no. 1, pp. 1-23, 2023. [DOI: 10.1186/s40594-023-00427-x]. Impact Factor: 2.5, Acceptance Rate: 35%, Ranking: Q2 Education & Technology.

  13. M. Rahman, G. Hossain, C. Rajab, and M. R. Mrizkal, “iRestroom: A Smart Restroom Cyberinfrastructure for Elderly People,” Elsevier Internet of Things, p. 100573, 2022. [DOI: 10.1016/j.iot.2022.100573]. [Impact Factor: 5.4, Acceptance Rate: 18%, Ranking: Q1 Internet of Things].

  14. H. Myers and G. Hossain, “Dual EEG Alignment Between Participants During Shared Intentionality Experiments,” Elsevier Brain Research, vol. 1790, p. 147986, 2022. [DOI: 10.1016/j.brainres.2022.147986]. [Impact Factor: 3.8, Acceptance Rate: 20%, Ranking: Q1 Neuroscience].


Recent Conference papers:

  1. Yogaragah and G. Hossain, “Optimizing Cybersecurity Recruitment with Graph-Based Algorithms,” 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC) Feb. 2025, Houston, TX, Feb 5 -7,  DOI: 10.1109/ICAIC63015.2025

  2. Tandon, P. Vajpayee, G.Hossain, “Evaluating Ransomware Risks in Transportation 5.0: A Data-Driven Approach,” 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC) Feb. 2025, Houston, TX, Feb 5 -7, DOI: 10.1109/ICAIC63015.2025

  3. Anderson, and G.Hossain, “Enhancing Kalman Filter Resilience in Electric Vehicles: Cyber-Attack Mitigation with Machine Learning Based Adaptive Filtering,” 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC) Feb. 2025, Houston, TX, Feb 5 -7, DOI: 10.1109/ICAIC63015.2025

  4. M. Hasan, S. Hossain, R. Mohammad, and G. Hossain, “JIBON++: AI Enabled Intelligent Voice Assistant for Blind People Understanding Negative Sentiments,” IEEE 43rd International Conference on Consumer Electronics (ICCE), Las Vegas, NV, Jan. 11-14, 2025, in press.

  5. Mary and G. Hossain, “Towards Personalized Recommender System: A Gray-Box Modeling Approach,” IEEE 43rd International Conference on Consumer Electronics (ICCE), Las Vegas, NV, Jan. 11-14, 2025, in press.

  6. Yogarajah and G. Hossain, “The Concept of Cognitive CyTutor Utilizing Federated Learning for Cybersecurity Education,” 2025 IEEE 15th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, Jan. 4-8, 2025, in press.

  7. Hossain and Kinshuk, “CyberSkiller: Empowering STEM Undergraduates for the Future of Cybersecurity,” in 2024 IEEE Frontiers in Education Conference (FIE), Washington D.C., USA, 2024. (Acceptance rate: ~30-40%, Top-ranked education conference)

  8. Hossain, M. Shin, and M. Afroz, “Bridging the Gap: Exploring Cybersecurity Careers for High School Students,” in 2024 IEEE Frontiers in Education Conference (FIE), Washington D.C., USA, 2024. (Acceptance rate: ~30-40%, Top-ranked education conference)

  9. Hossain, T. Hunt, and M. Shin, “Fundamentals on Cyber Fraud Detection and Investigation: Empowering High School Students for a Secure Digital Future,” in 2024 IEEE Frontiers in Education Conference (FIE), Washington D.C., USA, 2024. (Acceptance rate: ~30-40%, Top-ranked education conference)

  10. Vajpayee and G. Hossain, “Cybersecurity Education in High School: Exploring Cyber Assets, Cyber Value at Risk, and Authentic Assessment,” in 2024 IEEE Frontiers in Education Conference (FIE), Washington D.C., USA, 2024. (Acceptance rate: ~30-40%, Top-ranked education conference)

  11. Vajpayee and G. Hossain, “Chat GPT and Cyber Risks: Need of Custom Large Language Models,” in 3rd International Conference on Data, Decision and Systems, PES University, Bangalore, India, Dec. 5-7, 2024. (Conference Rank: Tier 2 in data science and technology)

  12. S. Pomare, G. Hossain, D. S. Maguluri, P. Vajpayee, and G. Prybutok, “ChatGPT in the Context of Dementia Care and Cognitive Support,” in 2024 IEEE International Conference on Electro Information Technology (eIT), May 2024, pp. 592-597. IEEE. (Acceptance rate: ~40-45%, Tier 2 IEEE conference)

  13. Vajpayee and G. Hossain, “Cognitive Cybersecurity in Transportation 5.0 and Supply Chain: A Multi-Objective Optimization Framework,” in 2024 IEEE International Conference on Electro Information Technology (eIT), May 2024, pp. 698-704. IEEE. (Acceptance rate: ~40-45%, Tier 2 IEEE conference)

  14. Hassan, G. Hossain, and P. Vajpayee, “Reducing Cyber Risks in IoT Device Resource Management: A Probabilistic Banker’s Algorithm Approach,” in 2024 IEEE World AI IoT Congress (AIIoT), May 2024, pp. 205-211. IEEE. (Acceptance rate: ~25-30%, Tier 1-2 AI/IoT conference)

  15. Vajpayee and G. Hossain, “Risk Assessment of Cybersecurity IoT Anomalies Through Cyber Value at Risk (CVaR),” in 2024 IEEE World AI IoT Congress (AIIoT), May 2024, pp. 77-83. IEEE. (Acceptance rate: ~25-30%, Tier 1-2 AI/IoT conference)

  16. D. Bissadu, G. Hossain, and P. Vajpayee, “Agriculture 5.0 Cybersecurity: Monitoring Agricultural Cyber Threats with Digital Twin Technology,” in 2024 IEEE World AI IoT Congress (AIIoT), May 2024, pp. 0252-0258. IEEE. (Acceptance rate: ~25-30%, Tier 1-2 AI/IoT conference)

  17. Vajpayee and G. Hossain, “Cognitive Bias in Cyber-Value-at-Risk: Identification and Mitigation Approach,” in Proceedings of the 2024 ACM SIG MIS Computers and People Research Conference, pp. 1-2. (Acceptance rate: ~30%, Tier 3)

  18. D. Bissadu, G. Hossain, S. Shonko, and L. Pavani, “Analyzing Insider Cyber Threats and Human Factors within the Framework of Agriculture 5.0,” in 2024 12th International Symposium on Digital Forensics and Security (ISDFS), San Antonio, TX, April 2024. (Acceptance rate: ~35-40%, Tier 2-3 for Digital Forensics)

  19. Maguluri, S. Nikhilas, L. Pavani, G. Hossain, “Securing Healthcare 5.0: Exploring BYOD Cyber Risks, Misuse Cases, and Best Practices,” in 2024 12th International Symposium on Digital Forensics and Security (ISDFS), San Antonio, TX, April 2024. (Acceptance rate: ~35-40%, Tier 2-3 for Digital Forensics)

  20. P. Mohammed, G. Hossain, and S. M. Yaseen, “Cybersecurity Data Visualization: Designing a Course for Future High School Students,” in 2024 12th International Symposium on Digital Forensics and Security (ISDFS), San Antonio, TX, April 2024. (Acceptance rate: ~35-40%, Tier 2-3 for Digital Forensics)

  21. M. Yaseen, G. Hossain, and S. P. Mohammed, “Introducing Data Visualization to High School Students: Integrating Tableau into the Curriculum,” in 14th IEEE Integrated STEM Education Conference, Princeton University, NJ, USA, March 9, 2024. (Acceptance rate: ~25-35%, Tier 2 for STEM Education)

  22. P. Mohammed, S. M. Yaseen, and G. Hossain, “Designing Educational Games to Teach Ethical Hacking Course in High School (Grades 9-12),” in 14th IEEE Integrated STEM Education Conference, Princeton University, NJ, USA, March 9, 2024. (Acceptance rate: ~25-35%, Tier 2 for STEM Education)

  23. Vajpayee and G. Hossain, “Reduction of Cyber Value at Risk (CVaR) Through AI Enabled Anomaly Detection,” in SoutheastCon 2024, pp. 623-629. (Acceptance rate: ~30-35%, Tier 2 IEEE conference)

  24. D. Bissadu, L. P. Velagala, G. Hossain, and S. Sonko, “Analyzing Insider Cyber Threats and Human Factors within the Framework of Agriculture 5.0,” in IEEE 2024 12th International Symposium on Digital Forensics and Security, San Antonio, TX, USA. (Acceptance rate: ~35-40%, Tier 2-3 for Digital Forensics)

  25. Maguluri, L. P. Velagala, G. Hossain, “Securing Healthcare 5.0: Exploring BYOD Cyber Risks, Misuse Cases, and Best Practices,” in IEEE 2024 12th International Symposium on Digital Forensics and Security, San Antonio, TX, USA. (Acceptance rate: ~35-40%, Tier 2-3 for Digital Forensics)

  26. Simpson, G. Hossain, and G. Prybutok, “ChatGPT as Assistive Technology: Opportunities and Challenges,” in 2024 IEEE International Conference on Contemporary Computing and Communications, Bangalore, India. (Acceptance rate: ~30-40%, Tier 2 IEEE conference)

  27. Simpson, G. Hossain, G. Prybutok, D. Maguluri, “ChatGPT in the Context of Dementia Care and Cognitive Support,” in IEEE International Conference on Advancements in Next Generation Computing and Communication Technologies, Coimbatore, India, 2024. (Acceptance rate: ~30-40%, Tier 2 IEEE conference)

  28. Hossain, “CyberSkiller: An Online Training System for Elevating Cybersecurity Basic Skills for STEM Undergraduates through Up-Skilling and Re-Skilling,” in Engineering Education and Instructional Technologies Conference, Qatar, 2024. (Acceptance rate: ~40%, Tier 2-3 for Engineering Education)

  29. Hossain and D. Yarra, “Learning Blockchain in School: A Dozen Connected Topics,” in 2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, USA. (Best Paper Awarded, Acceptance rate: ~15-20%, Tier 1-2 for Computing)

  30. Hossain, S. P. Mohammed, “ChatGPT in Education, Healthcare, and Cybersecurity: Opportunities and Challenges,” in IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, USA. (Acceptance rate: ~15-20%, Tier 1-2 for Computing)

  31. D. Bissadu, G. Hossain, L. P. Velagala, “Designing a Machine Learning Course on Cyberthreat Analytics Tailored for High School Students,” in IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, USA. (Acceptance rate: ~25-30%, Tier 2 IEEE conference)

  32. Hossain, Z. S. Pomare, G. Prybut, “ChatGPT: A Companion for Dementia Care,” in IEEE 42nd International Conference on Consumer Electronics Creating Our Future with Consumer Technology, 5-8 January 2024, Las Vegas, NV, USA. (Acceptance rate: ~25%, Tier 1 IEEE conference)

  33. D. Bissadu, G. Hossain, L. P. Velagala, “Enhancing Cybersecurity Resilience for Low-Income Farmers in Developing Nations: A Fuzzy Cognitive Mapping Approach,” in IEEE 42nd International Conference on Consumer Electronics Creating Our Future with Consumer Technology, 5-8 January 2024, Las Vegas, NV, USA. (Acceptance rate: ~25%, Tier 1 IEEE conference)

  34. Hossain, M. Shin, M. Afrose, “Empowering K-12 STEM Educators: Enhancing Cybersecurity Awareness Through Professional Development,” in 42nd IEEE International Conference on Consumer Electronics, Las Vegas, Nevada, January 2024. (Acceptance rate: ~25%, Tier 1 IEEE conference)

  35. Shin, G. Hossain, M. Afrose, “Uncovering Opinions on Cybersecurity and Accessibility in Metaverse,” in 13th Global TechMining Conference, 2023, San Antonio, TX, Hybrid Event, November 2023. (Acceptance rate: ~30-35%, Tier 3 for technology management)

  36. P. Velagala, G. Hossain, “Analyzing Insider Threats and Human Factors in Healthcare 5.0,” in 2023 IEEE 20th International Conference on Smart Communities: Improving Quality of Life Using AI, Robotics, and IoT (HONET), December 2023. (Acceptance rate: ~35-40%, Tier 2-3 for AI and Smart Communities)

  37. N. Tusher, A. Anjum, M. T. Islam, S. Das, S. R. Sammy, G. Hossain, “Automated Phrasal Verb and Key-Phrase Checking with LSTM-Based Attention Mechanism,” in 2023 3rd International Conference on Computing and Information Technology (ICCIT), September 2023. (Acceptance rate: ~30%, Tier 3 conference)

  38. Westmoreland, G. Hossain, “Enhancing Cloud Data Processing with Amortized Analysis and Splay Trees for Cyber Threat Intelligence,” in Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing, August 2023. (Acceptance rate: ~30%, Tier 2 IEEE conference)

  39. N. Tusher, M. T. Islam, M. S. R. Sammy, M. S. Sadik, S. A. Hasna, G. Hossain, “Automatic Sentence Classification: A Crucial Component of Sentiment Analysis,” in International Conference on Data Intelligence and Cognitive Informatics, June 2023, Singapore: Springer Nature Singapore. (Acceptance rate: ~30%, Tier 3 for Data Science)

  40. Hossain, J. Tarrant, “CyberTMS: A Recommendation Framework for Cognitive Transportation Cybersecurity Management System in the Society 5.0,” in 2023 11th International Symposium on Digital Forensics and Security (ISDFS), May 2023. (Acceptance rate: ~30%, Tier 2-3 for Digital Forensics)

  41. Andjelic, C. Doyle, G. Hossain, “Cybersecurity Risk with Wearable Technology in Sports: Why Should We Care?,” in 19th IEEE 19th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT, and AI, HONET 2022, GA, USA, 2022. (Acceptance rate: ~40%, Tier 2-3 for Smart Communities)

  42. Hossain, R. Khullar, “Energy Efficient Task Scheduling Algorithm Towards Green Cloud Computing,” in 19th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2022), December 5th – December 7th, 2022. (Acceptance rate: ~20-25%, Tier 2 IEEE conference)