Journal and Conference  

[1] J.-h. Yeh, M. M. Arifin, N. Shen, U. Karki, Y. Xie, and A. Nanjundarao, “Integrity coded databases–protecting data integrity for outsourced databases,” Computers & Security, vol. 136, p. 103569, 2024.


[2] M. M. Arifin and J.-h. Yeh, “cTIMS: Correlated Textual and Image based Metrics Suites for Assessing GAN-Synthesized Android Malware Images,” in Proc. IEEE 29th Pacific Rim Int. Symp. Dependable Computing (PRDC), 2024, pp. 55–65.


[3] M. M. Arifin, T. S. Tolman, and J.-h. Yeh, “Unveiling the Efficacy of BERT’s Attention in Memory Obfuscated Malware Detection,” in Proc. 19th Int. Conf. Information Security Practice and Experience (ISPEC), Wuhan, China, 2024, pp. 273–291.


[4] M. N. Sakib, M. A. Islam, and M. M. Arifin, “Automatic pull request description generation using LLMs: A T5 model approach,” in Proc. 2nd Int. Conf. Artificial Intelligence, Blockchain, and Internet of Things (AIBThings), 2024, pp. 1–5.


[5] M. N. Sakib, M. A. Islam, R. Pathak, and M. M. Arifin, “Risks, causes, and mitigations of widespread deployments of large language models (LLMs): A survey,” in Proc. 2nd Int. Conf. Artificial Intelligence, Blockchain, and Internet of Things (AIBThings), 2024, pp. 1–7.


[6] M. M. Arifin, M. A. Based, K. M. Mumenin, A. Imran, M. A. Azim, Z. Alom, and M. A. Awal, “OLGBM: Optuna optimized light gradient boosting machine for intrusion detection,” in Proc. Int. Conf. Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2), 2021, pp. 1–4.


[7] M. M. Arifin, M. T. Hasan, M. T. Islam, M. A. Hasan, and H. S. Mondal, “Design and implementation of high performance parallel CRC architecture for advanced data communication,” in Proc. 4th Int. Conf. Electrical Information and Communication Technology (EICT), 2019, pp. 1–5.


[8] H. S. Mondal, M. T. Hasan, M. M. Hossain, M. M. Arifin, and R. Saha, “A RSA-based efficient dynamic secure algorithm for ensuring data security,” in Proc. Int. Joint Conf. Computational Intelligence (IJCCI), 2018, pp. 643–653.



Undergrad Research

[9] B. Abrew, J.-h. Yeh, D. Hubbs, and M. M. Arifin, “Generating Feature-Space Functional Adversarial Malware Using LLMs,” 2025.
[10] D. Kim, M. M. Arifin, and J.-h. Yeh, “Survey on Adversarial Attack for Malware Detection,” 2024.
[11] T. Tolman, M. M. Arifin, and J.-h. Yeh, “Enhancing Malware Analysis and Detection Using Adversarial Machine Learning Techniques,” 2023.


Preprints (arXiv)

[12] M. M. Arifin, M. S. Ahmed, T. K. Ghosh, I. A. Udoy, J. Zhuang, and J.-h. Yeh, “A survey on the application of generative adversarial networks in cybersecurity: Prospective, direction and open research scopes,” arXiv:2407.08839, 2024.


[13] J. Fairbanks, M. M. Arifin, S. Afreen, and A. Curtis, “Survey and Analysis of IoT Operating Systems,” arXiv:2407.01474, 2024.