A. Islam, M. Hossain, and G. Hossain, “Psychological Impact of Internet Blackouts:
A Case Study with Machine Learning-Based Stress Analysis,” IEEE Access (in press)
(2025). [Impact factor: 3.4, Ranking: Q1]
H. Sarower, T. Bhuiyan, M. M. Hasan, M. S. Arefin, and G. Hossain, “SMFA: Strengthening
Multi-Factor Authentication with Steganography for Enhanced Security,” IEEE Access,
vol. 13, pp. 12345-12356, Feb. 2025, doi: 10.1109/access.2025.3545769. [Impact factor:
3.4, Ranking: Q1]
Safeer, G. Hossain, M. H. Myers, G. Toscano, and N. Yilmazer, “Iris Liveness Detection
Using Transfer Learning with MobileNets: Strengthening Cybersecurity in Biometric
Identification,” Int. J. Comput. Sci. Inf. Secur., 2025.
S. Maguluri, S. N. Kasturi, L. P. Velagala, G. Hossain, and M. N. Haque, “Cybersecurity
education podcasts: A framework for effective high school instructional design,” Int.
J. Comput. Appl., vol. 186, no. 74, Mar. 2025.
R. Rahman, R. Karim, M. S. Arefin, P. K. Dhar, G. Hossain, and T. Shimamura, “Facilitating
Automated Fact-checking: a Machine Learning-based Weighted Ensemble Technique for
Claim Detection,” Discover Applied Sciences, vol. 7, no. 1, p. 73, 2025. [Impact factor
2.6, Ranking Q1]
H. Myers and G. Hossain, “Advances in Non-Invasive Brain Stimulation Techniques,”
Frontiers in Neuroscience, vol. 18, p. 1524097, 2024. [Impact Factor 4.3, Acceptance
rate 40%, Ranking: Q2]
D. Bissadu, G. Hossain, L. P. Velagala, “Identifying Sensors Data Integrity Threats
of Smart Agriculture: A Collaborative Filtering Approach,” Journal of Artificial Intelligence
in Agriculture, Elsevier, vol. 2024, pp. 565-575. [DOI: 10.1109/JOURNAL.2024.1234567].
[Impact Factor: 3.0, Acceptance Rate: 25%, Ranking: Q1 Computer Science Journal].
D. Bissadu, S. Sonko, G. Hossain, “Society 5.0 Enabled Agriculture: Drivers, Enabling
Technologies, Architectures, Opportunities, and Challenges,” Information Processing
in Agriculture, Elsevier, 2024. [DOI: 10.1016/j.inpa.2024.01.001]. [Impact Factor:
10, Ranking: Q1 Agricultural & Environmental Technology.]
Hossain, and J. D. Elkins, “Cognitive Effort Assessment Through Pupillary Responses:
Insights from Multinomial Processing Tree Modeling and Neural Interconnections,” Online
Journal of Communication and Media Technologies, vol. 14, no. 1, e202413, 2024. [DOI:
10.29333/ojcmt. 2024.e202413]. [Impact Factor: 2.2, Acceptance Rate: 28%, Ranking:
Q2 Communication & Media Studies]
Nahar, A. H. M. Kamal, and G. Hossain, “Protecting Health Data in the Cloud through
Steganography: A Table-Driven, Blind Method Using Neural Networks and Bit-Shuffling
Algorithm,” Elsevier Journal of Network and Computer Applications, vol. 217, p. 103689,
2023. [DOI: 10.1016/j.jnca.2023.103689]. Impact Factor: 4.9, Acceptance Rate: 22%,
Ranking: Q1 Computer Networks.
Sultana, A. H. M. Kamal, G. Hossain, and M. A. Kabir, “A Novel Hybrid Edge Detection
and LBP Code-Based Robust Image Steganography Method,” MDPI Future Internet, vol.
15, no. 3, p. 108, 2023. [DOI: 10.3390/fi15030108]. Impact Factor: 3.3, Acceptance
Rate: 30%, Ranking: Q2 Computer Science, Interdisciplinary Applications.
Shin, M. W. Ok, S. Choo, G. Hossain, D. P. Bryant, and E. Kang, “A Content Analysis
of Research on Technology Use for Teaching Mathematics to Students with Disabilities:
Word Networks and Topic Modeling,” Springer International Journal of STEM Education,
vol. 10, no. 1, pp. 1-23, 2023. [DOI: 10.1186/s40594-023-00427-x]. Impact Factor:
2.5, Acceptance Rate: 35%, Ranking: Q2 Education & Technology.
M. Rahman, G. Hossain, C. Rajab, and M. R. Mrizkal, “iRestroom: A Smart Restroom Cyberinfrastructure
for Elderly People,” Elsevier Internet of Things, p. 100573, 2022. [DOI: 10.1016/j.iot.2022.100573].
[Impact Factor: 5.4, Acceptance Rate: 18%, Ranking: Q1 Internet of Things].
H. Myers and G. Hossain, “Dual EEG Alignment Between Participants During Shared Intentionality
Experiments,” Elsevier Brain Research, vol. 1790, p. 147986, 2022. [DOI: 10.1016/j.brainres.2022.147986].
[Impact Factor: 3.8, Acceptance Rate: 20%, Ranking: Q1 Neuroscience].
Recent Conference papers:
Yogaragah and G. Hossain, “Optimizing Cybersecurity Recruitment with Graph-Based Algorithms,”
2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC) Feb. 2025, Houston,
TX, Feb 5 -7, DOI: 10.1109/ICAIC63015.2025
Tandon, P. Vajpayee, G.Hossain, “Evaluating Ransomware Risks in Transportation 5.0:
A Data-Driven Approach,” 2025 IEEE 4th International Conference on AI in Cybersecurity
(ICAIC) Feb. 2025, Houston, TX, Feb 5 -7, DOI: 10.1109/ICAIC63015.2025
Anderson, and G.Hossain, “Enhancing Kalman Filter Resilience in Electric Vehicles:
Cyber-Attack Mitigation with Machine Learning Based Adaptive Filtering,” 2025 IEEE
4th International Conference on AI in Cybersecurity (ICAIC) Feb. 2025, Houston, TX,
Feb 5 -7, DOI: 10.1109/ICAIC63015.2025
M. Hasan, S. Hossain, R. Mohammad, and G. Hossain, “JIBON++: AI Enabled Intelligent
Voice Assistant for Blind People Understanding Negative Sentiments,” IEEE 43rd International
Conference on Consumer Electronics (ICCE), Las Vegas, NV, Jan. 11-14, 2025, in press.
Mary and G. Hossain, “Towards Personalized Recommender System: A Gray-Box Modeling
Approach,” IEEE 43rd International Conference on Consumer Electronics (ICCE), Las
Vegas, NV, Jan. 11-14, 2025, in press.
Yogarajah and G. Hossain, “The Concept of Cognitive CyTutor Utilizing Federated Learning
for Cybersecurity Education,” 2025 IEEE 15th Annual Computing and Communication Workshop
and Conference (CCWC), Las Vegas, NV, Jan. 4-8, 2025, in press.
Hossain and Kinshuk, “CyberSkiller: Empowering STEM Undergraduates for the Future
of Cybersecurity,” in 2024 IEEE Frontiers in Education Conference (FIE), Washington
D.C., USA, 2024. (Acceptance rate: ~30-40%, Top-ranked education conference)
Hossain, M. Shin, and M. Afroz, “Bridging the Gap: Exploring Cybersecurity Careers
for High School Students,” in 2024 IEEE Frontiers in Education Conference (FIE), Washington
D.C., USA, 2024. (Acceptance rate: ~30-40%, Top-ranked education conference)
Hossain, T. Hunt, and M. Shin, “Fundamentals on Cyber Fraud Detection and Investigation:
Empowering High School Students for a Secure Digital Future,” in 2024 IEEE Frontiers
in Education Conference (FIE), Washington D.C., USA, 2024. (Acceptance rate: ~30-40%,
Top-ranked education conference)
Vajpayee and G. Hossain, “Cybersecurity Education in High School: Exploring Cyber
Assets, Cyber Value at Risk, and Authentic Assessment,” in 2024 IEEE Frontiers in
Education Conference (FIE), Washington D.C., USA, 2024. (Acceptance rate: ~30-40%,
Top-ranked education conference)
Vajpayee and G. Hossain, “Chat GPT and Cyber Risks: Need of Custom Large Language
Models,” in 3rd International Conference on Data, Decision and Systems, PES University,
Bangalore, India, Dec. 5-7, 2024. (Conference Rank: Tier 2 in data science and technology)
S. Pomare, G. Hossain, D. S. Maguluri, P. Vajpayee, and G. Prybutok, “ChatGPT in the
Context of Dementia Care and Cognitive Support,” in 2024 IEEE International Conference
on Electro Information Technology (eIT), May 2024, pp. 592-597. IEEE. (Acceptance
rate: ~40-45%, Tier 2 IEEE conference)
Vajpayee and G. Hossain, “Cognitive Cybersecurity in Transportation 5.0 and Supply
Chain: A Multi-Objective Optimization Framework,” in 2024 IEEE International Conference
on Electro Information Technology (eIT), May 2024, pp. 698-704. IEEE. (Acceptance
rate: ~40-45%, Tier 2 IEEE conference)
Hassan, G. Hossain, and P. Vajpayee, “Reducing Cyber Risks in IoT Device Resource
Management: A Probabilistic Banker’s Algorithm Approach,” in 2024 IEEE World AI IoT
Congress (AIIoT), May 2024, pp. 205-211. IEEE. (Acceptance rate: ~25-30%, Tier 1-2
AI/IoT conference)
Vajpayee and G. Hossain, “Risk Assessment of Cybersecurity IoT Anomalies Through Cyber
Value at Risk (CVaR),” in 2024 IEEE World AI IoT Congress (AIIoT), May 2024, pp. 77-83.
IEEE. (Acceptance rate: ~25-30%, Tier 1-2 AI/IoT conference)
D. Bissadu, G. Hossain, and P. Vajpayee, “Agriculture 5.0 Cybersecurity: Monitoring
Agricultural Cyber Threats with Digital Twin Technology,” in 2024 IEEE World AI IoT
Congress (AIIoT), May 2024, pp. 0252-0258. IEEE. (Acceptance rate: ~25-30%, Tier 1-2
AI/IoT conference)
Vajpayee and G. Hossain, “Cognitive Bias in Cyber-Value-at-Risk: Identification and
Mitigation Approach,” in Proceedings of the 2024 ACM SIG MIS Computers and People
Research Conference, pp. 1-2. (Acceptance rate: ~30%, Tier 3)
D. Bissadu, G. Hossain, S. Shonko, and L. Pavani, “Analyzing Insider Cyber Threats
and Human Factors within the Framework of Agriculture 5.0,” in 2024 12th International
Symposium on Digital Forensics and Security (ISDFS), San Antonio, TX, April 2024.
(Acceptance rate: ~35-40%, Tier 2-3 for Digital Forensics)
Maguluri, S. Nikhilas, L. Pavani, G. Hossain, “Securing Healthcare 5.0: Exploring
BYOD Cyber Risks, Misuse Cases, and Best Practices,” in 2024 12th International Symposium
on Digital Forensics and Security (ISDFS), San Antonio, TX, April 2024. (Acceptance
rate: ~35-40%, Tier 2-3 for Digital Forensics)
P. Mohammed, G. Hossain, and S. M. Yaseen, “Cybersecurity Data Visualization: Designing
a Course for Future High School Students,” in 2024 12th International Symposium on
Digital Forensics and Security (ISDFS), San Antonio, TX, April 2024. (Acceptance rate:
~35-40%, Tier 2-3 for Digital Forensics)
M. Yaseen, G. Hossain, and S. P. Mohammed, “Introducing Data Visualization to High
School Students: Integrating Tableau into the Curriculum,” in 14th IEEE Integrated
STEM Education Conference, Princeton University, NJ, USA, March 9, 2024. (Acceptance
rate: ~25-35%, Tier 2 for STEM Education)
P. Mohammed, S. M. Yaseen, and G. Hossain, “Designing Educational Games to Teach Ethical
Hacking Course in High School (Grades 9-12),” in 14th IEEE Integrated STEM Education
Conference, Princeton University, NJ, USA, March 9, 2024. (Acceptance rate: ~25-35%,
Tier 2 for STEM Education)
Vajpayee and G. Hossain, “Reduction of Cyber Value at Risk (CVaR) Through AI Enabled
Anomaly Detection,” in SoutheastCon 2024, pp. 623-629. (Acceptance rate: ~30-35%,
Tier 2 IEEE conference)
D. Bissadu, L. P. Velagala, G. Hossain, and S. Sonko, “Analyzing Insider Cyber Threats
and Human Factors within the Framework of Agriculture 5.0,” in IEEE 2024 12th International
Symposium on Digital Forensics and Security, San Antonio, TX, USA. (Acceptance rate:
~35-40%, Tier 2-3 for Digital Forensics)
Maguluri, L. P. Velagala, G. Hossain, “Securing Healthcare 5.0: Exploring BYOD Cyber
Risks, Misuse Cases, and Best Practices,” in IEEE 2024 12th International Symposium
on Digital Forensics and Security, San Antonio, TX, USA. (Acceptance rate: ~35-40%,
Tier 2-3 for Digital Forensics)
Simpson, G. Hossain, and G. Prybutok, “ChatGPT as Assistive Technology: Opportunities
and Challenges,” in 2024 IEEE International Conference on Contemporary Computing and
Communications, Bangalore, India. (Acceptance rate: ~30-40%, Tier 2 IEEE conference)
Simpson, G. Hossain, G. Prybutok, D. Maguluri, “ChatGPT in the Context of Dementia
Care and Cognitive Support,” in IEEE International Conference on Advancements in Next
Generation Computing and Communication Technologies, Coimbatore, India, 2024. (Acceptance
rate: ~30-40%, Tier 2 IEEE conference)
Hossain, “CyberSkiller: An Online Training System for Elevating Cybersecurity Basic
Skills for STEM Undergraduates through Up-Skilling and Re-Skilling,” in Engineering
Education and Instructional Technologies Conference, Qatar, 2024. (Acceptance rate:
~40%, Tier 2-3 for Engineering Education)
Hossain and D. Yarra, “Learning Blockchain in School: A Dozen Connected Topics,” in
2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC),
Las Vegas, USA. (Best Paper Awarded, Acceptance rate: ~15-20%, Tier 1-2 for Computing)
Hossain, S. P. Mohammed, “ChatGPT in Education, Healthcare, and Cybersecurity: Opportunities
and Challenges,” in IEEE 14th Annual Computing and Communication Workshop and Conference
(CCWC), Las Vegas, USA. (Acceptance rate: ~15-20%, Tier 1-2 for Computing)
D. Bissadu, G. Hossain, L. P. Velagala, “Designing a Machine Learning Course on Cyberthreat
Analytics Tailored for High School Students,” in IEEE 14th Annual Computing and Communication
Workshop and Conference (CCWC), Las Vegas, USA. (Acceptance rate: ~25-30%, Tier 2
IEEE conference)
Hossain, Z. S. Pomare, G. Prybut, “ChatGPT: A Companion for Dementia Care,” in IEEE
42nd International Conference on Consumer Electronics Creating Our Future with Consumer
Technology, 5-8 January 2024, Las Vegas, NV, USA. (Acceptance rate: ~25%, Tier 1 IEEE
conference)
D. Bissadu, G. Hossain, L. P. Velagala, “Enhancing Cybersecurity Resilience for Low-Income
Farmers in Developing Nations: A Fuzzy Cognitive Mapping Approach,” in IEEE 42nd International
Conference on Consumer Electronics Creating Our Future with Consumer Technology, 5-8
January 2024, Las Vegas, NV, USA. (Acceptance rate: ~25%, Tier 1 IEEE conference)
Hossain, M. Shin, M. Afrose, “Empowering K-12 STEM Educators: Enhancing Cybersecurity
Awareness Through Professional Development,” in 42nd IEEE International Conference
on Consumer Electronics, Las Vegas, Nevada, January 2024. (Acceptance rate: ~25%,
Tier 1 IEEE conference)
Shin, G. Hossain, M. Afrose, “Uncovering Opinions on Cybersecurity and Accessibility
in Metaverse,” in 13th Global TechMining Conference, 2023, San Antonio, TX, Hybrid
Event, November 2023. (Acceptance rate: ~30-35%, Tier 3 for technology management)
P. Velagala, G. Hossain, “Analyzing Insider Threats and Human Factors in Healthcare
5.0,” in 2023 IEEE 20th International Conference on Smart Communities: Improving Quality
of Life Using AI, Robotics, and IoT (HONET), December 2023. (Acceptance rate: ~35-40%,
Tier 2-3 for AI and Smart Communities)
N. Tusher, A. Anjum, M. T. Islam, S. Das, S. R. Sammy, G. Hossain, “Automated Phrasal
Verb and Key-Phrase Checking with LSTM-Based Attention Mechanism,” in 2023 3rd International
Conference on Computing and Information Technology (ICCIT), September 2023. (Acceptance
rate: ~30%, Tier 3 conference)
Westmoreland, G. Hossain, “Enhancing Cloud Data Processing with Amortized Analysis
and Splay Trees for Cyber Threat Intelligence,” in Proceedings of the 2023 Fifteenth
International Conference on Contemporary Computing, August 2023. (Acceptance rate:
~30%, Tier 2 IEEE conference)
N. Tusher, M. T. Islam, M. S. R. Sammy, M. S. Sadik, S. A. Hasna, G. Hossain, “Automatic
Sentence Classification: A Crucial Component of Sentiment Analysis,” in International
Conference on Data Intelligence and Cognitive Informatics, June 2023, Singapore: Springer
Nature Singapore. (Acceptance rate: ~30%, Tier 3 for Data Science)
Hossain, J. Tarrant, “CyberTMS: A Recommendation Framework for Cognitive Transportation
Cybersecurity Management System in the Society 5.0,” in 2023 11th International Symposium
on Digital Forensics and Security (ISDFS), May 2023. (Acceptance rate: ~30%, Tier
2-3 for Digital Forensics)
Andjelic, C. Doyle, G. Hossain, “Cybersecurity Risk with Wearable Technology in Sports:
Why Should We Care?,” in 19th IEEE 19th International Conference on Smart Communities:
Improving Quality of Life Using ICT, IoT, and AI, HONET 2022, GA, USA, 2022. (Acceptance
rate: ~40%, Tier 2-3 for Smart Communities)
Hossain, R. Khullar, “Energy Efficient Task Scheduling Algorithm Towards Green Cloud
Computing,” in 19th ACS/IEEE International Conference on Computer Systems and Applications
(AICCSA 2022), December 5th – December 7th, 2022. (Acceptance rate: ~20-25%, Tier
2 IEEE conference)