Books
- Amanul Islam, Information Technology in Financial Services, Chatrabondu Publications, 2012, pp. 378.
- Amanul Islam, E-Banking, Chatrabondu Publications, 2013, pp. 416.
- Amanul Islam, ICT in Financial Institutions, Chatrabondu Publications, 2023, pp. 416.
Peer-reviewed Journal Articles
- Por, L. Y., Ku, C. S., Islam A., & Ang, T. F.. Graphical password: prevent shoulder-surfing attacks using digraph substitution rules. Frontiers of Computer Science, 11, 1098–1108.
- Alsulaimani, B., & Islam, A.. Impact of 4IR technology and its impact on the current deployment. International Journal of Computer Science and Information Technology (IJCSIT), 14(4), 53–67.
- Islam, A., Othman, F., Sakib, N., & Babu, H. M. H.. Prevention of Shoulder Surfing Attack Using Shifting Condition with the Digraph Substitution Rules. Artificial Intelligence and Applications, 1(1), 58–68.
- Islam, A., Rashid, M. M., Othman, F., Kaosar, M. G., & Islam, L.. Identifying Personality Traits Associated with Phishing Susceptibility. Security Journal 38 (2025): 18.
- Islam, A., Noor, N. F., & Abdul Rahman, S.. Systematic mapping study of tools to identify emotions and personality traits. Discover Artificial Intelligence, 5, 58 (2025).
- Islam, A., Sakib, N., Zhang, K., Wuthier, S., & Chang, S.-Y.. Anonymous Networking Detection in Cryptocurrency Using Network Fingerprinting and Machine Learning. Electronics, 14(11), 2101.
- KR Katti, KK Katti, Islam A.. Exploring the Applications of Neural Turing Machines in Natural Language Processing: A Study on Efficient Text Generation and Summarization. Neural Computing and Applications. (Under Review)
- KR Katti, KK Katti, Islam A.. A Study on Adversarial Attacks and Defenses for Neural Networks: Focusing on Image Classification and Object Detection Tasks. Neural Processing Letters. (Under Review)
- Rahman, M. M., Noor, N. F., Abdul Rahman, S., Muhamad, H., & Islam, A.. Categorization of words and common phrases of Dark Triad Personality on social media. Journal of Ambient Intelligence and Humanized Computing. (Under Review)
- Islam A., & Othman, F.. Renewable Energy MicroGrid Power Forecasting: AI Techniques with Environmental Perspective. (Preprint Available)
- Islam A., & Rashid, M. M.. Cyberattack Detection Using Unsupervised Learning Techniques. (Preprint Available)
Peer-reviewed Conference Publications
- Islam A., Por, L. Y., Othman, F., & Ku, C. S.. A review on recognition-based graphical password techniques. Computational Science and Technology: 5th ICCST 2018, Kota Kinabalu, Malaysia, 29-30 August 2018, 503-512.
- Islam A., Chang, S.-Y., Kim, J., & Kim, J.. Anomaly Detection in 5G using Variational Autoencoders. . In 2024 Silicon Valley Cybersecurity Conference (SVCC) (pp. 1-6). IEEE.
- Islam A., Sakib, N., Zhang, K., Wuthier, S., Chang, S.. Network Fingerprinting Using Machine Learning for Anonymous Networking Detection in Cryptocurrency. In 2025 IEEE 22nd Consumer Communications & Networking Conference (CCNC) (pp. 1-6). IEEE.
- Islam A., Purification, S., Chang, S.. Anomaly Detection Using Machine Learning Against Fake Base Station Threat. Submitted in IEEE MASS-2025, Chicago, USA..
- Sakib, N., Wuthier, S., Islam A., Zhou, X., Kim, J., Kim, I., Chang, S.. Dynamic Beneficialness Prediction of Cryptocurrency P2P Connections. Submitted in ICCCN-2025, Tokyo, Japan.
Peer-reviewed Poster Publication
- Zhang, K., Islam A., Chang, S.-Y.. Reinforcement Learning on Tor: Prioritizing Performance Compromises Anonymity. Accepted in Silicon Valley Cybersecurity Conference (SVCC)-2025, San Francisco, USA.
Peer-reviewed Book Chapter
- Islam A., Por, L.Y., Othman, F., Ku, C.S.. A Review on Recognition-Based Graphical Password. Lecture Notes in Electrical Engineering, vol 481. Springer, Singapore.