Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Md. Shamsul Huda
@article{DBLP:journals/access/MehmoodSHKARUH23, author = {Iqra Mehmood and Sidra Shahid and Hameed Hussain and Inayat Khan and Shafiq Ahmad and Shahid Rahman and Najeeb Ullah and Shamsul Huda}, title = {A Novel Approach to Improve Software Defect Prediction Accuracy Using Machine Learning}, journal = {{IEEE} Access}, volume = {11}, pages = {63579--63597}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3287326}, doi = {10.1109/ACCESS.2023.3287326}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MehmoodSHKARUH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KhanKKAH23, author = {Muhammad Amin Khan and Muhammad Sohail Khan and Inayat Khan and Shafiq Ahmad and Shamsul Huda}, title = {Non Functional Requirements Identification and Classification Using Transfer Learning Model}, journal = {{IEEE} Access}, volume = {11}, pages = {74997--75005}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3295238}, doi = {10.1109/ACCESS.2023.3295238}, timestamp = {Fri, 28 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KhanKKAH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KhanJSKUAH23, author = {Akhtar Munir Khan and Muhammad Asif Jan and Muhammad Sagheer and Rashida Adeeb Khanum and Muhammad Irfan Uddin and Shafiq Ahmad and Shamsul Huda}, title = {Near Feasibility Driven Adaptive Penalty Functions Embedded {MOEA/D}}, journal = {{IEEE} Access}, volume = {11}, pages = {105182--105213}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3317818}, doi = {10.1109/ACCESS.2023.3317818}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KhanJSKUAH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChoudhryAHR23, author = {Nomica Choudhry and Jemal H. Abawajy and Shamsul Huda and Imran Rao}, title = {A Comprehensive Survey of Machine Learning Methods for Surveillance Videos Anomaly Detection}, journal = {{IEEE} Access}, volume = {11}, pages = {114680--114713}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3321800}, doi = {10.1109/ACCESS.2023.3321800}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ChoudhryAHR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/UllahMHJKAMH23, author = {Asmat Ullah and Muhammad Ismail Mohmand and Hameed Hussain and Sumaira Johar and Inayat Khan and Shafiq Ahmad and Haitham A. Mahmoud and Shamsul Huda}, title = {Customer Analysis Using Machine Learning-Based Classification Algorithms for Effective Segmentation Using Recency, Frequency, Monetary, and Time}, journal = {Sensors}, volume = {23}, number = {6}, pages = {3180}, year = {2023}, url = {https://doi.org/10.3390/s23063180}, doi = {10.3390/S23063180}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/UllahMHJKAMH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KhaliqSKAUZH23, author = {Fazli Khaliq and Muhammad Shabir and Inayat Khan and Shafiq Ahmad and Muhammad Usman and Muhammad Zubair and Shamsul Huda}, title = {Pashto Handwritten Invariant Character Trajectory Prediction Using a Customized Deep Learning Technique}, journal = {Sensors}, volume = {23}, number = {13}, pages = {6060}, year = {2023}, url = {https://doi.org/10.3390/s23136060}, doi = {10.3390/S23136060}, timestamp = {Fri, 11 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/KhaliqSKAUZH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/AlamHHHHSA23, author = {Md. Golam Rabiul Alam and Mahmudul Haque and Md. Rafiul Hassan and Shamsul Huda and Mohammad Mehedi Hassan and Fred L. Strickland and Salman A. AlQahtani}, title = {Feature Cloning and Feature Fusion Based Transportation Mode Detection Using Convolutional Neural Network}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {24}, number = {4}, pages = {4671--4681}, year = {2023}, url = {https://doi.org/10.1109/TITS.2023.3240500}, doi = {10.1109/TITS.2023.3240500}, timestamp = {Sun, 16 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/AlamHHHHSA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/HassanICHHH23, author = {Md Raful Hassan and Walaa N. Ismail and Ahmad Chowdhury and Sharara Hossain and Shamsul Huda and Mohammad Mehedi Hassan}, title = {Correction to: {A} framework of genetic algorithm-based {CNN} on multi-access edge computing for automated detection of {COVID-19}}, journal = {J. Supercomput.}, volume = {79}, number = {9}, pages = {10507--10508}, year = {2023}, url = {https://doi.org/10.1007/s11227-023-05063-z}, doi = {10.1007/S11227-023-05063-Z}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/HassanICHHH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/WuTHCC23, author = {Jimmy Ming{-}Tai Wu and Qian Teng and Shamsul Huda and Yeh{-}Cheng Chen and Chien{-}Ming Chen}, title = {A Privacy Frequent Itemsets Mining Framework for Collaboration in IoT Using Federated Learning}, journal = {{ACM} Trans. Sens. Networks}, volume = {19}, number = {2}, pages = {27:1--27:15}, year = {2023}, url = {https://doi.org/10.1145/3532090}, doi = {10.1145/3532090}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/WuTHCC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/HassanIUGHHF22, author = {Md. Rafiul Hassan and Md. Fakrul Islam and Md. Zia Uddin and Goutam Ghoshal and Mohammad Mehedi Hassan and Shamsul Huda and Giancarlo Fortino}, title = {Prostate cancer classification from ultrasound and {MRI} images using deep learning based Explainable Artificial Intelligence}, journal = {Future Gener. Comput. Syst.}, volume = {127}, pages = {462--472}, year = {2022}, url = {https://doi.org/10.1016/j.future.2021.09.030}, doi = {10.1016/J.FUTURE.2021.09.030}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/HassanIUGHHF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inffus/HassanHHAAF22, author = {Md. Rafiul Hassan and Shamsul Huda and Mohammad Mehedi Hassan and Jemal H. Abawajy and Ahmed Alsanad and Giancarlo Fortino}, title = {Early detection of cardiovascular autonomic neuropathy: {A} multi-class classification model based on feature selection and deep learning feature fusion}, journal = {Inf. Fusion}, volume = {77}, pages = {70--80}, year = {2022}, url = {https://doi.org/10.1016/j.inffus.2021.07.010}, doi = {10.1016/J.INFFUS.2021.07.010}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/inffus/HassanHHAAF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/SharmeenHAAHF22, author = {Shaila Sharmeen and Shamsul Huda and Jemal H. Abawajy and Chuadhry Mujeeb Ahmed and Mohammad Mehedi Hassan and Giancarlo Fortino}, title = {An Advanced Boundary Protection Control for the Smart Water Network Using Semisupervised and Deep Learning Approaches}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {10}, pages = {7298--7310}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3100461}, doi = {10.1109/JIOT.2021.3100461}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/SharmeenHAAHF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/HaroonAAZHI22, author = {Muhammad Haroon and Saud Altaf and Shafiq Ahmad and Mazen Zaindin and Shamsul Huda and Sofia Iqbal}, title = {Hand Gesture Recognition with Symmetric Pattern under Diverse Illuminated Conditions Using Artificial Neural Network}, journal = {Symmetry}, volume = {14}, number = {10}, pages = {2045}, year = {2022}, url = {https://doi.org/10.3390/sym14102045}, doi = {10.3390/SYM14102045}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/HaroonAAZHI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tgcn/GunaratneAHAF22, author = {Nadeera Gnan Tilshan Gunaratne and Mali Abdollahian and Shamsul Huda and Marwan Ali and Giancarlo Fortino}, title = {An Edge Tier Task Offloading to Identify Sources of Variance Shifts in Smart Grid Using a Hybrid of Wrapper and Filter Approaches}, journal = {{IEEE} Trans. Green Commun. Netw.}, volume = {6}, number = {1}, pages = {329--340}, year = {2022}, url = {https://doi.org/10.1109/TGCN.2021.3137330}, doi = {10.1109/TGCN.2021.3137330}, timestamp = {Thu, 24 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tgcn/GunaratneAHAF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/MonemAAHHF22, author = {Maruf Monem and Md. Golam Rabiul Alam and Mohammad Abdullah{-}Al{-}Wadud and Shamsul Huda and Mohammad Mehedi Hassan and Giancarlo Fortino}, title = {An Industry-4.0-Complaint Sustainable Bitcoin Model Through Optimized Transaction Selection and Sustainable Block Integration}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {18}, number = {12}, pages = {9162--9172}, year = {2022}, url = {https://doi.org/10.1109/TII.2022.3159673}, doi = {10.1109/TII.2022.3159673}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/MonemAAHHF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/HassanICHHH22, author = {Md. Rafiul Hassan and Walaa N. Ismail and Ahmad Chowdhury and Sharara Hossain and Shamsul Huda and Mohammad Mehedi Hassan}, title = {A framework of genetic algorithm-based {CNN} on multi-access edge computing for automated detection of {COVID-19}}, journal = {J. Supercomput.}, volume = {78}, number = {7}, pages = {10250--10274}, year = {2022}, url = {https://doi.org/10.1007/s11227-021-04222-4}, doi = {10.1007/S11227-021-04222-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/HassanICHHH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/NazahHAH21, author = {Saiba Nazah and Md. Shamsul Huda and Jemal H. Abawajy and Mohammad Mehedi Hassan}, title = {An Unsupervised Model for Identifying and Characterizing Dark Web Forums}, journal = {{IEEE} Access}, volume = {9}, pages = {112871--112892}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3103319}, doi = {10.1109/ACCESS.2021.3103319}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/NazahHAH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/RehmanAAHAI21, author = {Zia ur Rehman and Saud Altaf and Shafiq Ahmad and Md. Shamsul Huda and Adel Al{-}Shayea and Sofia Iqbal}, title = {An Efficient, Hybrid Authentication Using {ECG} and Lightweight Cryptographic Scheme for {WBAN}}, journal = {{IEEE} Access}, volume = {9}, pages = {133809--133819}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3115706}, doi = {10.1109/ACCESS.2021.3115706}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/RehmanAAHAI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/HassanHHUGA21, author = {Mohammad Mehedi Hassan and Md. Rafiul Hassan and Md. Shamsul Huda and Md. Zia Uddin and Abdu Gumaei and Ahmed Alsanad}, title = {A predictive intelligence approach to classify brain-computer interface based eye state for smart living}, journal = {Appl. Soft Comput.}, volume = {108}, pages = {107453}, year = {2021}, url = {https://doi.org/10.1016/j.asoc.2021.107453}, doi = {10.1016/J.ASOC.2021.107453}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/asc/HassanHHUGA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/FalahPHPA21, author = {Ahmed Falah and Lei Pan and Md. Shamsul Huda and Shiva Raj Pokhrel and Adnan Anwar}, title = {Improving malicious {PDF} classifier with feature engineering: {A} data-driven approach}, journal = {Future Gener. Comput. Syst.}, volume = {115}, pages = {314--326}, year = {2021}, url = {https://doi.org/10.1016/j.future.2020.09.015}, doi = {10.1016/J.FUTURE.2020.09.015}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/FalahPHPA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/HassanHHA21, author = {Mohammad Mehedi Hassan and Md. Rafiul Hassan and Md. Shamsul Huda and Victor Hugo C. de Albuquerque}, title = {A Robust Deep-Learning-Enabled Trust-Boundary Protection for Adversarial Industrial IoT Environment}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {12}, pages = {9611--9621}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3019225}, doi = {10.1109/JIOT.2020.3019225}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/HassanHHA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/HassanHSAF21, author = {Mohammad Mehedi Hassan and Md. Shamsul Huda and Shaila Sharmeen and Jemal H. Abawajy and Giancarlo Fortino}, title = {An Adaptive Trust Boundary Protection for IIoT Networks Using Deep-Learning Feature-Extraction-Based Semisupervised Model}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {17}, number = {4}, pages = {2860--2870}, year = {2021}, url = {https://doi.org/10.1109/TII.2020.3015026}, doi = {10.1109/TII.2020.3015026}, timestamp = {Mon, 22 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/HassanHSAF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SharmeenAHKH20, author = {Shaila Sharmeen and Yahye Abukar Ahmed and Md. Shamsul Huda and Baris Ko{\c{c}}er and Mohammad Mehedi Hassan}, title = {Avoiding Future Digital Extortion Through Robust Protection Against Ransomware Threats Using Deep Learning Based Adaptive Approaches}, journal = {{IEEE} Access}, volume = {8}, pages = {24522--24534}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2970466}, doi = {10.1109/ACCESS.2020.2970466}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SharmeenAHKH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/NazahHAH20, author = {Saiba Nazah and Md. Shamsul Huda and Jemal H. Abawajy and Mohammad Mehedi Hassan}, title = {Evolution of Dark Web Threat Analysis and Detection: {A} Systematic Approach}, journal = {{IEEE} Access}, volume = {8}, pages = {171796--171819}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3024198}, doi = {10.1109/ACCESS.2020.3024198}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/NazahHAH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/SharmeenHAH20, author = {Shaila Sharmeen and Md. Shamsul Huda and Jemal H. Abawajy and Mohammad Mehedi Hassan}, title = {An adaptive framework against android privilege escalation threats using deep learning and semi-supervised approaches}, journal = {Appl. Soft Comput.}, volume = {89}, pages = {106089}, year = {2020}, url = {https://doi.org/10.1016/j.asoc.2020.106089}, doi = {10.1016/J.ASOC.2020.106089}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/asc/SharmeenHAH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/GumaeiHHHCSF20, author = {Abdu Gumaei and Mohammad Mehedi Hassan and Md. Shamsul Huda and Md. Rafiul Hassan and David Camacho and Javier Del Ser and Giancarlo Fortino}, title = {A robust cyberattack detection approach using optimal features of {SCADA} power systems in smart grids}, journal = {Appl. Soft Comput.}, volume = {96}, pages = {106658}, year = {2020}, url = {https://doi.org/10.1016/j.asoc.2020.106658}, doi = {10.1016/J.ASOC.2020.106658}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/asc/GumaeiHHHCSF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AhmedKHAH20, author = {Yahye Abukar Ahmed and Baris Ko{\c{c}}er and Md. Shamsul Huda and Bander Ali Saleh Al{-}rimy and Mohammad Mehedi Hassan}, title = {A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection}, journal = {J. Netw. Comput. Appl.}, volume = {167}, pages = {102753}, year = {2020}, url = {https://doi.org/10.1016/j.jnca.2020.102753}, doi = {10.1016/J.JNCA.2020.102753}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/AhmedKHAH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/HassanGHA20, author = {Mohammad Mehedi Hassan and Abdu Gumaei and Md. Shamsul Huda and Ahmad Almogren}, title = {Increasing the Trustworthiness in the Industrial IoT Networks Through a Reliable Cyberattack Detection Model}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {16}, number = {9}, pages = {6154--6162}, year = {2020}, url = {https://doi.org/10.1109/TII.2020.2970074}, doi = {10.1109/TII.2020.2970074}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/HassanGHA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/HudaAAPH19, author = {Md. Shamsul Huda and Jemal H. Abawajy and Baker Al{-}Rubaie and Lei Pan and Mohammad Mehedi Hassan}, title = {Automatic extraction and integration of behavioural indicators of malware for protection of cyber-physical networks}, journal = {Future Gener. Comput. Syst.}, volume = {101}, pages = {1247--1258}, year = {2019}, url = {https://doi.org/10.1016/j.future.2019.07.005}, doi = {10.1016/J.FUTURE.2019.07.005}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/HudaAAPH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inffus/HassanAUHAF19, author = {Mohammad Mehedi Hassan and Md. Golam Rabiul Alam and Md. Zia Uddin and Md. Shamsul Huda and Ahmad Almogren and Giancarlo Fortino}, title = {Human emotion recognition using deep belief network architecture}, journal = {Inf. Fusion}, volume = {51}, pages = {10--18}, year = {2019}, url = {https://doi.org/10.1016/j.inffus.2018.10.009}, doi = {10.1016/J.INFFUS.2018.10.009}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/inffus/HassanAUHAF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HudaAAAAAY18, author = {Md. Shamsul Huda and Sultan Alyahya and Md. Mohsin Ali and Shafiq Ahmad and Jemal H. Abawajy and Hmood Al{-}Dossari and John Yearwood}, title = {A Framework for Software Defect Prediction and Metric Selection}, journal = {{IEEE} Access}, volume = {6}, pages = {2844--2858}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2017.2785445}, doi = {10.1109/ACCESS.2017.2785445}, timestamp = {Thu, 01 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/HudaAAAAAY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SharmeenHAIH18, author = {Shaila Sharmeen and Md. Shamsul Huda and Jemal H. Abawajy and Walaa N. Ismail and Mohammad Mehedi Hassan}, title = {Malware Threats and Detection for Industrial Mobile-IoT Networks}, journal = {{IEEE} Access}, volume = {6}, pages = {15941--15957}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2815660}, doi = {10.1109/ACCESS.2018.2815660}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SharmeenHAIH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HudaLAIAAA18, author = {Md. Shamsul Huda and Kevin Liu and Mohamed Abdelrazek and Amani S. Ibrahim and Sultan Alyahya and Hmood Al{-}Dossari and Shafiq Ahmad}, title = {An Ensemble Oversampling Model for Class Imbalance Problem in Software Defect Prediction}, journal = {{IEEE} Access}, volume = {6}, pages = {24184--24195}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2817572}, doi = {10.1109/ACCESS.2018.2817572}, timestamp = {Thu, 01 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/HudaLAIAAA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/HudaYHA18, author = {Md. Shamsul Huda and John Yearwood and Mohammad Mehedi Hassan and Ahmad Almogren}, title = {Securing the operations in SCADA-IoT platform based industrial control system using ensemble of deep belief networks}, journal = {Appl. Soft Comput.}, volume = {71}, pages = {66--77}, year = {2018}, url = {https://doi.org/10.1016/j.asoc.2018.06.017}, doi = {10.1016/J.ASOC.2018.06.017}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/asc/HudaYHA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/HudaIAYHF18, author = {Md. Shamsul Huda and Md. Rafiqul Islam and Jemal H. Abawajy and John Yearwood and Mohammad Mehedi Hassan and Giancarlo Fortino}, title = {A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection}, journal = {Future Gener. Comput. Syst.}, volume = {83}, pages = {193--207}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.12.037}, doi = {10.1016/J.FUTURE.2017.12.037}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/HudaIAYHF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/AbawajyHSHA18, author = {Jemal H. Abawajy and Md. Shamsul Huda and Shaila Sharmeen and Mohammad Mehedi Hassan and Ahmad Almogren}, title = {Identifying cyber threats to mobile-IoT applications in edge computing paradigm}, journal = {Future Gener. Comput. Syst.}, volume = {89}, pages = {525--538}, year = {2018}, url = {https://doi.org/10.1016/j.future.2018.06.053}, doi = {10.1016/J.FUTURE.2018.06.053}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/AbawajyHSHA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inffus/HassanHYJA18, author = {Mohammad Mehedi Hassan and Md. Shamsul Huda and John Yearwood and Herbert F. Jelinek and Ahmad Almogren}, title = {Multistage fusion approaches based on a generative model and multivariate exponentially weighted moving average for diagnosis of cardiovascular autonomic nerve dysfunction}, journal = {Inf. Fusion}, volume = {41}, pages = {105--118}, year = {2018}, url = {https://doi.org/10.1016/j.inffus.2017.08.004}, doi = {10.1016/J.INFFUS.2017.08.004}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/inffus/HassanHYJA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/HassanHUAA18, author = {Mohammad Mehedi Hassan and Md. Shamsul Huda and Md. Zia Uddin and Ahmad Almogren and Majed A. AlRubaian}, title = {Human Activity Recognition from Body Sensor Data using Deep Learning}, journal = {J. Medical Syst.}, volume = {42}, number = {6}, pages = {99:1--99:8}, year = {2018}, url = {https://doi.org/10.1007/s10916-018-0948-z}, doi = {10.1007/S10916-018-0948-Z}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/HassanHUAA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/HudaMYAAD18, author = {Md. Shamsul Huda and Md. Suruz Miah and John Yearwood and Sultan Alyahya and Hmood Al{-}Dossari and Robin Doss}, title = {A malicious threat detection model for cloud assisted internet of things (CoT) based industrial control system {(ICS)} networks using deep belief network}, journal = {J. Parallel Distributed Comput.}, volume = {120}, pages = {23--31}, year = {2018}, url = {https://doi.org/10.1016/j.jpdc.2018.04.005}, doi = {10.1016/J.JPDC.2018.04.005}, timestamp = {Thu, 01 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/HudaMYAAD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/AliHAAAY17, author = {Md. Mohsin Ali and Md. Shamsul Huda and Jemal H. Abawajy and Sultan Alyahya and Hmood Al{-}Dossari and John Yearwood}, title = {A parallel framework for software defect detection and metric selection on cloud computing}, journal = {Clust. Comput.}, volume = {20}, number = {3}, pages = {2267--2281}, year = {2017}, url = {https://doi.org/10.1007/s10586-017-0892-6}, doi = {10.1007/S10586-017-0892-6}, timestamp = {Thu, 01 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cluster/AliHAAAY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/HudaAA0Y17, author = {Md. Shamsul Huda and Jemal H. Abawajy and Mali Abdollahian and Md. Rafiqul Islam and John Yearwood}, title = {A fast malware feature selection approach using a hybrid of multi-linear and stepwise binary logistic regression}, journal = {Concurr. Comput. Pract. Exp.}, volume = {29}, number = {23}, year = {2017}, url = {https://doi.org/10.1002/cpe.3912}, doi = {10.1002/CPE.3912}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/HudaAA0Y17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijpr/GunaratneAHY17, author = {Nadeera Gnan Tilshan Gunaratne and Malihe Akhavan Abdollahian and Shamsul Huda and John Yearwood}, title = {Exponentially weighted control charts to monitor multivariate process variability for high dimensions}, journal = {Int. J. Prod. Res.}, volume = {55}, number = {17}, pages = {4948--4962}, year = {2017}, url = {https://doi.org/10.1080/00207543.2016.1278081}, doi = {10.1080/00207543.2016.1278081}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijpr/GunaratneAHY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/HudaMHIYAA17, author = {Md. Shamsul Huda and Md. Suruz Miah and Mohammad Mehedi Hassan and Md. Rafiqul Islam and John Yearwood and Majed A. AlRubaian and Ahmad Almogren}, title = {Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data}, journal = {Inf. Sci.}, volume = {379}, pages = {211--228}, year = {2017}, url = {https://doi.org/10.1016/j.ins.2016.09.041}, doi = {10.1016/J.INS.2016.09.041}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/HudaMHIYAA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HudaYJHFB16, author = {Md. Shamsul Huda and John Yearwood and Herbert F. Jelinek and Mohammad Mehedi Hassan and Giancarlo Fortino and Michael Buckland}, title = {A Hybrid Feature Selection With Ensemble Classification for Imbalanced Healthcare Data: {A} Case Study for Brain Tumor Diagnosis}, journal = {{IEEE} Access}, volume = {4}, pages = {9145--9154}, year = {2016}, url = {https://doi.org/10.1109/ACCESS.2016.2647238}, doi = {10.1109/ACCESS.2016.2647238}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/HudaYJHFB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/HudaAAA0Y16, author = {Md. Shamsul Huda and Jemal H. Abawajy and Mamoun Alazab and Mali Abdollahian and Md. Rafiqul Islam and John Yearwood}, title = {Hybrids of support vector machine wrapper and filter based framework for malware detection}, journal = {Future Gener. Comput. Syst.}, volume = {55}, pages = {376--390}, year = {2016}, url = {https://doi.org/10.1016/j.future.2014.06.001}, doi = {10.1016/J.FUTURE.2014.06.001}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/HudaAAA0Y16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eor/HudaAMYAS14, author = {Md. Shamsul Huda and Mali Abdollahian and Musa A. Mammadov and John Yearwood and Shafiq Ahmad and Ibrahim A. Sultan}, title = {A hybrid wrapper-filter approach to detect the source(s) of out-of-control signals in multivariate manufacturing process}, journal = {Eur. J. Oper. Res.}, volume = {237}, number = {3}, pages = {857--870}, year = {2014}, url = {https://doi.org/10.1016/j.ejor.2014.02.032}, doi = {10.1016/J.EJOR.2014.02.032}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eor/HudaAMYAS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/AlazabHAIYVB14, author = {Mamoun Alazab and Md. Shamsul Huda and Jemal H. Abawajy and Md. Rafiqul Islam and John Yearwood and Sitalakshmi Venkatraman and Roderic Broadhurst}, title = {A Hybrid Wrapper-Filter Approach for Malware Detection}, journal = {J. Networks}, volume = {9}, number = {11}, pages = {2878--2891}, year = {2014}, url = {https://doi.org/10.4304/jnw.9.11.2878-2891}, doi = {10.4304/JNW.9.11.2878-2891}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/AlazabHAIYVB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/HudaYT14, author = {Md. Shamsul Huda and John Yearwood and Roberto Togneri}, title = {Hybrid Metaheuristic Approaches to the Expectation Maximization for Estimation of the Hidden Markov Model for Signal Modeling}, journal = {{IEEE} Trans. Cybern.}, volume = {44}, number = {10}, pages = {1962--1977}, year = {2014}, url = {https://doi.org/10.1109/TCYB.2014.2308917}, doi = {10.1109/TCYB.2014.2308917}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcyb/HudaYT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/artmed/StranieriAKHCJ13, author = {Andrew Stranieri and Jemal H. Abawajy and Andrei V. Kelarev and Md. Shamsul Huda and Morshed U. Chowdhury and Herbert F. Jelinek}, title = {An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy}, journal = {Artif. Intell. Medicine}, volume = {58}, number = {3}, pages = {185--193}, year = {2013}, url = {https://doi.org/10.1016/j.artmed.2013.04.007}, doi = {10.1016/J.ARTMED.2013.04.007}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/artmed/StranieriAKHCJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsc/HudaYS11, author = {Md. Shamsul Huda and John Yearwood and Andrew Stranieri}, editor = {Mark Reynolds}, title = {Hybrid Wrapper-filter Aapproaches for Input Feature Selection using Maximum relevance-Minimum redundancy and Artificial Neural Network Input Gain Measurement Approximation {(ANNIGMA)}}, booktitle = {Thirty-Fourth Australasian Computer Science Conference, {ACSC} 2011, Perth, Australia, January 2011}, series = {{CRPIT}}, volume = {113}, pages = {43--52}, publisher = {Australian Computer Society}, year = {2011}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV113Huda.html}, timestamp = {Fri, 02 Jul 2021 14:00:51 +0200}, biburl = {https://dblp.org/rec/conf/acsc/HudaYS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isabel/AbdollahianAH11, author = {Mali Abdollahian and Shafiq Ahmad and Shamsul Huda}, editor = {Simone Frattasi and Nicola Marchetti}, title = {Multivariate control charts for surgical procedures}, booktitle = {Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, {ISABEL} '11, Barcelona, Spain, October 26-29, 2011}, pages = {18:1--18:5}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2093698.2093716}, doi = {10.1145/2093698.2093716}, timestamp = {Sat, 22 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isabel/AbdollahianAH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snpd/MukherjeeYVH11, author = {Subhasis Mukherjee and John Yearwood and Peter Vamplew and Md. Shamsul Huda}, editor = {Morshed U. Chowdhury and Sid Ray and Roger Y. Lee}, title = {Reinforcement Learning Approach to {AIBO} Robot's Decision Making Process in Robosoccer's Goal Keeper Problem}, booktitle = {12th {ACIS} International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel {\&} Distributed Computing, {SNPD} 2011, Sydney, Australia, July 6-8, 2011}, pages = {24--30}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SNPD.2011.39}, doi = {10.1109/SNPD.2011.39}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/snpd/MukherjeeYVH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snpd/RayHC11, author = {Biplob R. Ray and Md. Shamsul Huda and Morshed U. Chowdhury}, editor = {Morshed U. Chowdhury and Sid Ray and Roger Y. Lee}, title = {Smart {RFID} Reader Protocol for Malware Detection}, booktitle = {12th {ACIS} International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel {\&} Distributed Computing, {SNPD} 2011, Sydney, Australia, July 6-8, 2011}, pages = {64--69}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SNPD.2011.41}, doi = {10.1109/SNPD.2011.41}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/snpd/RayHC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snpd/MukherjeeHY11, author = {Subhasis Mukherjee and Md. Shamsul Huda and John Yearwood}, editor = {Roger Y. Lee}, title = {A Reinforcement Learning Approach with Spline-Fit Object Tracking for {AIBO} Robot's High Level Decision Making}, booktitle = {Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2011 [Selected Papers from {SNPD} 2011, Sydney, Australia, July 6-8, 2011]}, series = {Studies in Computational Intelligence}, volume = {368}, pages = {169--183}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22288-7\_14}, doi = {10.1007/978-3-642-22288-7\_14}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/snpd/MukherjeeHY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/HudaYB10, author = {Md. Shamsul Huda and John Yearwood and Ron Borland}, editor = {Yang Xiang and Pierangela Samarati and Jiankun Hu and Wanlei Zhou and Ahmad{-}Reza Sadeghi}, title = {Cluster Based Rule Discovery Model for Enhancement of Government's Tobacco Control Strategy}, booktitle = {Fourth International Conference on Network and System Security, {NSS} 2010, Melbourne, Victoria, Australia, September 1-3, 2010}, pages = {383--390}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/NSS.2010.14}, doi = {10.1109/NSS.2010.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/HudaYB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/HudaYS10, author = {Md. Shamsul Huda and John Yearwood and Andrew Stranieri}, editor = {Yang Xiang and Pierangela Samarati and Jiankun Hu and Wanlei Zhou and Ahmad{-}Reza Sadeghi}, title = {Hybrid Wrapper-Filter Approaches for Input Feature Selection Using Maximum Relevance and Artificial Neural Network Input Gain Measurement Approximation {(ANNIGMA)}}, booktitle = {Fourth International Conference on Network and System Security, {NSS} 2010, Melbourne, Victoria, Australia, September 1-3, 2010}, pages = {442--449}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/NSS.2010.7}, doi = {10.1109/NSS.2010.7}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/HudaYS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/HudaYB10, author = {Md. Shamsul Huda and John Yearwood and Ron Borland}, title = {Smokers' Characteristics and Cluster Based Quitting Rule Discovery Model for Enhancement of Government's Tobacco Control Systems}, booktitle = {Pacific Asia Conference on Information Systems, {PACIS} 2010, Taipei, Taiwan, 9-12 July 2010}, pages = {26}, publisher = {AISeL}, year = {2010}, url = {http://aisel.aisnet.org/pacis2010/26}, timestamp = {Tue, 28 Feb 2012 16:59:14 +0100}, biburl = {https://dblp.org/rec/conf/pacis/HudaYB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/prl/HudaYT09, author = {Md. Shamsul Huda and John Yearwood and Roberto Togneri}, title = {A stochastic version of Expectation Maximization algorithm for better estimation of Hidden Markov Model}, journal = {Pattern Recognit. Lett.}, volume = {30}, number = {14}, pages = {1301--1309}, year = {2009}, url = {https://doi.org/10.1016/j.patrec.2009.06.006}, doi = {10.1016/J.PATREC.2009.06.006}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/prl/HudaYT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/HudaYT09, author = {Md. Shamsul Huda and John Yearwood and Roberto Togneri}, title = {A Constraint-Based Evolutionary Learning Approach to the Expectation Maximization for Optimal Estimation of the Hidden Markov Model for Speech Signal Modeling}, journal = {{IEEE} Trans. Syst. Man Cybern. Part {B}}, volume = {39}, number = {1}, pages = {182--197}, year = {2009}, url = {https://doi.org/10.1109/TSMCB.2008.2004051}, doi = {10.1109/TSMCB.2008.2004051}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/HudaYT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ike/AhmadHBAZ09, author = {Shafiq Ahmad and Md. Shamsul Huda and Sujak Bakir and Mali Abdollahian and Panlop Zeephongsekul}, editor = {Hamid R. Arabnia and Ray R. Hashemi and Frederick I. Moxley}, title = {Process Performance Evaluation Using Evolutionary Algorithm}, booktitle = {Proceedings of the 2009 International Conference on Information {\&} Knowledge Engineering, {IKE} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes}, pages = {731--737}, publisher = {{CSREA} Press}, year = {2009}, timestamp = {Sat, 12 Jul 2014 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ike/AhmadHBAZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACISicis/HudaYG07, author = {Md. Shamsul Huda and John Yearwood and Ranadhir Ghosh}, title = {A Hybrid Algorithm for Estimation of the Parameters of Hidden Markov Model based Acoustic Modeling of Speech Signals using Constraint-Based Genetic Algorithm and Expectation Maximization}, booktitle = {6th Annual {IEEE/ACIS} International Conference on Computer and Information Science {(ICIS} 2007), 11-13 July 2007, Melbourne, Australia}, pages = {438--443}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICIS.2007.23}, doi = {10.1109/ICIS.2007.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ACISicis/HudaYG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incdm/HudaGY06, author = {Md. Shamsul Huda and Ranadhir Ghosh and John Yearwood}, editor = {Petra Perner}, title = {A Variable Initialization Approach to the {EM} Algorithm for Better Estimation of the Parameters of Hidden Markov Model Based Acoustic Modeling of Speech Signals}, booktitle = {Advances in Data Mining, Applications in Medicine, Web Mining, Marketing, Image and Signal Mining, 6th Industrial Conference on Data Mining, {ICDM} 2006, Leipzig, Germany, July 14-15, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4065}, pages = {416--430}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11790853\_33}, doi = {10.1007/11790853\_33}, timestamp = {Tue, 22 Feb 2022 10:29:40 +0100}, biburl = {https://dblp.org/rec/conf/incdm/HudaGY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.