BibTeX records: Md. Shamsul Huda

download as .bib file

@article{DBLP:journals/access/MehmoodSHKARUH23,
  author       = {Iqra Mehmood and
                  Sidra Shahid and
                  Hameed Hussain and
                  Inayat Khan and
                  Shafiq Ahmad and
                  Shahid Rahman and
                  Najeeb Ullah and
                  Shamsul Huda},
  title        = {A Novel Approach to Improve Software Defect Prediction Accuracy Using
                  Machine Learning},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {63579--63597},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3287326},
  doi          = {10.1109/ACCESS.2023.3287326},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MehmoodSHKARUH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KhanKKAH23,
  author       = {Muhammad Amin Khan and
                  Muhammad Sohail Khan and
                  Inayat Khan and
                  Shafiq Ahmad and
                  Shamsul Huda},
  title        = {Non Functional Requirements Identification and Classification Using
                  Transfer Learning Model},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {74997--75005},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3295238},
  doi          = {10.1109/ACCESS.2023.3295238},
  timestamp    = {Fri, 28 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KhanKKAH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KhanJSKUAH23,
  author       = {Akhtar Munir Khan and
                  Muhammad Asif Jan and
                  Muhammad Sagheer and
                  Rashida Adeeb Khanum and
                  Muhammad Irfan Uddin and
                  Shafiq Ahmad and
                  Shamsul Huda},
  title        = {Near Feasibility Driven Adaptive Penalty Functions Embedded {MOEA/D}},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {105182--105213},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3317818},
  doi          = {10.1109/ACCESS.2023.3317818},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KhanJSKUAH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChoudhryAHR23,
  author       = {Nomica Choudhry and
                  Jemal H. Abawajy and
                  Shamsul Huda and
                  Imran Rao},
  title        = {A Comprehensive Survey of Machine Learning Methods for Surveillance
                  Videos Anomaly Detection},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {114680--114713},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3321800},
  doi          = {10.1109/ACCESS.2023.3321800},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ChoudhryAHR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/UllahMHJKAMH23,
  author       = {Asmat Ullah and
                  Muhammad Ismail Mohmand and
                  Hameed Hussain and
                  Sumaira Johar and
                  Inayat Khan and
                  Shafiq Ahmad and
                  Haitham A. Mahmoud and
                  Shamsul Huda},
  title        = {Customer Analysis Using Machine Learning-Based Classification Algorithms
                  for Effective Segmentation Using Recency, Frequency, Monetary, and
                  Time},
  journal      = {Sensors},
  volume       = {23},
  number       = {6},
  pages        = {3180},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23063180},
  doi          = {10.3390/S23063180},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/UllahMHJKAMH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KhaliqSKAUZH23,
  author       = {Fazli Khaliq and
                  Muhammad Shabir and
                  Inayat Khan and
                  Shafiq Ahmad and
                  Muhammad Usman and
                  Muhammad Zubair and
                  Shamsul Huda},
  title        = {Pashto Handwritten Invariant Character Trajectory Prediction Using
                  a Customized Deep Learning Technique},
  journal      = {Sensors},
  volume       = {23},
  number       = {13},
  pages        = {6060},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23136060},
  doi          = {10.3390/S23136060},
  timestamp    = {Fri, 11 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/KhaliqSKAUZH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/AlamHHHHSA23,
  author       = {Md. Golam Rabiul Alam and
                  Mahmudul Haque and
                  Md. Rafiul Hassan and
                  Shamsul Huda and
                  Mohammad Mehedi Hassan and
                  Fred L. Strickland and
                  Salman A. AlQahtani},
  title        = {Feature Cloning and Feature Fusion Based Transportation Mode Detection
                  Using Convolutional Neural Network},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {24},
  number       = {4},
  pages        = {4671--4681},
  year         = {2023},
  url          = {https://doi.org/10.1109/TITS.2023.3240500},
  doi          = {10.1109/TITS.2023.3240500},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/AlamHHHHSA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/HassanICHHH23,
  author       = {Md Raful Hassan and
                  Walaa N. Ismail and
                  Ahmad Chowdhury and
                  Sharara Hossain and
                  Shamsul Huda and
                  Mohammad Mehedi Hassan},
  title        = {Correction to: {A} framework of genetic algorithm-based {CNN} on multi-access
                  edge computing for automated detection of {COVID-19}},
  journal      = {J. Supercomput.},
  volume       = {79},
  number       = {9},
  pages        = {10507--10508},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11227-023-05063-z},
  doi          = {10.1007/S11227-023-05063-Z},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/HassanICHHH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/WuTHCC23,
  author       = {Jimmy Ming{-}Tai Wu and
                  Qian Teng and
                  Shamsul Huda and
                  Yeh{-}Cheng Chen and
                  Chien{-}Ming Chen},
  title        = {A Privacy Frequent Itemsets Mining Framework for Collaboration in
                  IoT Using Federated Learning},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {19},
  number       = {2},
  pages        = {27:1--27:15},
  year         = {2023},
  url          = {https://doi.org/10.1145/3532090},
  doi          = {10.1145/3532090},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/WuTHCC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/HassanIUGHHF22,
  author       = {Md. Rafiul Hassan and
                  Md. Fakrul Islam and
                  Md. Zia Uddin and
                  Goutam Ghoshal and
                  Mohammad Mehedi Hassan and
                  Shamsul Huda and
                  Giancarlo Fortino},
  title        = {Prostate cancer classification from ultrasound and {MRI} images using
                  deep learning based Explainable Artificial Intelligence},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {127},
  pages        = {462--472},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.future.2021.09.030},
  doi          = {10.1016/J.FUTURE.2021.09.030},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/HassanIUGHHF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inffus/HassanHHAAF22,
  author       = {Md. Rafiul Hassan and
                  Shamsul Huda and
                  Mohammad Mehedi Hassan and
                  Jemal H. Abawajy and
                  Ahmed Alsanad and
                  Giancarlo Fortino},
  title        = {Early detection of cardiovascular autonomic neuropathy: {A} multi-class
                  classification model based on feature selection and deep learning
                  feature fusion},
  journal      = {Inf. Fusion},
  volume       = {77},
  pages        = {70--80},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.inffus.2021.07.010},
  doi          = {10.1016/J.INFFUS.2021.07.010},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/inffus/HassanHHAAF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/SharmeenHAAHF22,
  author       = {Shaila Sharmeen and
                  Shamsul Huda and
                  Jemal H. Abawajy and
                  Chuadhry Mujeeb Ahmed and
                  Mohammad Mehedi Hassan and
                  Giancarlo Fortino},
  title        = {An Advanced Boundary Protection Control for the Smart Water Network
                  Using Semisupervised and Deep Learning Approaches},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {10},
  pages        = {7298--7310},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3100461},
  doi          = {10.1109/JIOT.2021.3100461},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/SharmeenHAAHF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/HaroonAAZHI22,
  author       = {Muhammad Haroon and
                  Saud Altaf and
                  Shafiq Ahmad and
                  Mazen Zaindin and
                  Shamsul Huda and
                  Sofia Iqbal},
  title        = {Hand Gesture Recognition with Symmetric Pattern under Diverse Illuminated
                  Conditions Using Artificial Neural Network},
  journal      = {Symmetry},
  volume       = {14},
  number       = {10},
  pages        = {2045},
  year         = {2022},
  url          = {https://doi.org/10.3390/sym14102045},
  doi          = {10.3390/SYM14102045},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/HaroonAAZHI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgcn/GunaratneAHAF22,
  author       = {Nadeera Gnan Tilshan Gunaratne and
                  Mali Abdollahian and
                  Shamsul Huda and
                  Marwan Ali and
                  Giancarlo Fortino},
  title        = {An Edge Tier Task Offloading to Identify Sources of Variance Shifts
                  in Smart Grid Using a Hybrid of Wrapper and Filter Approaches},
  journal      = {{IEEE} Trans. Green Commun. Netw.},
  volume       = {6},
  number       = {1},
  pages        = {329--340},
  year         = {2022},
  url          = {https://doi.org/10.1109/TGCN.2021.3137330},
  doi          = {10.1109/TGCN.2021.3137330},
  timestamp    = {Thu, 24 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tgcn/GunaratneAHAF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/MonemAAHHF22,
  author       = {Maruf Monem and
                  Md. Golam Rabiul Alam and
                  Mohammad Abdullah{-}Al{-}Wadud and
                  Shamsul Huda and
                  Mohammad Mehedi Hassan and
                  Giancarlo Fortino},
  title        = {An Industry-4.0-Complaint Sustainable Bitcoin Model Through Optimized
                  Transaction Selection and Sustainable Block Integration},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {18},
  number       = {12},
  pages        = {9162--9172},
  year         = {2022},
  url          = {https://doi.org/10.1109/TII.2022.3159673},
  doi          = {10.1109/TII.2022.3159673},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/MonemAAHHF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/HassanICHHH22,
  author       = {Md. Rafiul Hassan and
                  Walaa N. Ismail and
                  Ahmad Chowdhury and
                  Sharara Hossain and
                  Shamsul Huda and
                  Mohammad Mehedi Hassan},
  title        = {A framework of genetic algorithm-based {CNN} on multi-access edge
                  computing for automated detection of {COVID-19}},
  journal      = {J. Supercomput.},
  volume       = {78},
  number       = {7},
  pages        = {10250--10274},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11227-021-04222-4},
  doi          = {10.1007/S11227-021-04222-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/HassanICHHH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/NazahHAH21,
  author       = {Saiba Nazah and
                  Md. Shamsul Huda and
                  Jemal H. Abawajy and
                  Mohammad Mehedi Hassan},
  title        = {An Unsupervised Model for Identifying and Characterizing Dark Web
                  Forums},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {112871--112892},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3103319},
  doi          = {10.1109/ACCESS.2021.3103319},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/NazahHAH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RehmanAAHAI21,
  author       = {Zia ur Rehman and
                  Saud Altaf and
                  Shafiq Ahmad and
                  Md. Shamsul Huda and
                  Adel Al{-}Shayea and
                  Sofia Iqbal},
  title        = {An Efficient, Hybrid Authentication Using {ECG} and Lightweight Cryptographic
                  Scheme for {WBAN}},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {133809--133819},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3115706},
  doi          = {10.1109/ACCESS.2021.3115706},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/RehmanAAHAI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/HassanHHUGA21,
  author       = {Mohammad Mehedi Hassan and
                  Md. Rafiul Hassan and
                  Md. Shamsul Huda and
                  Md. Zia Uddin and
                  Abdu Gumaei and
                  Ahmed Alsanad},
  title        = {A predictive intelligence approach to classify brain-computer interface
                  based eye state for smart living},
  journal      = {Appl. Soft Comput.},
  volume       = {108},
  pages        = {107453},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.asoc.2021.107453},
  doi          = {10.1016/J.ASOC.2021.107453},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/asc/HassanHHUGA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/FalahPHPA21,
  author       = {Ahmed Falah and
                  Lei Pan and
                  Md. Shamsul Huda and
                  Shiva Raj Pokhrel and
                  Adnan Anwar},
  title        = {Improving malicious {PDF} classifier with feature engineering: {A}
                  data-driven approach},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {115},
  pages        = {314--326},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.future.2020.09.015},
  doi          = {10.1016/J.FUTURE.2020.09.015},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/FalahPHPA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/HassanHHA21,
  author       = {Mohammad Mehedi Hassan and
                  Md. Rafiul Hassan and
                  Md. Shamsul Huda and
                  Victor Hugo C. de Albuquerque},
  title        = {A Robust Deep-Learning-Enabled Trust-Boundary Protection for Adversarial
                  Industrial IoT Environment},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {12},
  pages        = {9611--9621},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3019225},
  doi          = {10.1109/JIOT.2020.3019225},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/HassanHHA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/HassanHSAF21,
  author       = {Mohammad Mehedi Hassan and
                  Md. Shamsul Huda and
                  Shaila Sharmeen and
                  Jemal H. Abawajy and
                  Giancarlo Fortino},
  title        = {An Adaptive Trust Boundary Protection for IIoT Networks Using Deep-Learning
                  Feature-Extraction-Based Semisupervised Model},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {17},
  number       = {4},
  pages        = {2860--2870},
  year         = {2021},
  url          = {https://doi.org/10.1109/TII.2020.3015026},
  doi          = {10.1109/TII.2020.3015026},
  timestamp    = {Mon, 22 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/HassanHSAF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SharmeenAHKH20,
  author       = {Shaila Sharmeen and
                  Yahye Abukar Ahmed and
                  Md. Shamsul Huda and
                  Baris Ko{\c{c}}er and
                  Mohammad Mehedi Hassan},
  title        = {Avoiding Future Digital Extortion Through Robust Protection Against
                  Ransomware Threats Using Deep Learning Based Adaptive Approaches},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {24522--24534},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2970466},
  doi          = {10.1109/ACCESS.2020.2970466},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SharmeenAHKH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/NazahHAH20,
  author       = {Saiba Nazah and
                  Md. Shamsul Huda and
                  Jemal H. Abawajy and
                  Mohammad Mehedi Hassan},
  title        = {Evolution of Dark Web Threat Analysis and Detection: {A} Systematic
                  Approach},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {171796--171819},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3024198},
  doi          = {10.1109/ACCESS.2020.3024198},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/NazahHAH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/SharmeenHAH20,
  author       = {Shaila Sharmeen and
                  Md. Shamsul Huda and
                  Jemal H. Abawajy and
                  Mohammad Mehedi Hassan},
  title        = {An adaptive framework against android privilege escalation threats
                  using deep learning and semi-supervised approaches},
  journal      = {Appl. Soft Comput.},
  volume       = {89},
  pages        = {106089},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.asoc.2020.106089},
  doi          = {10.1016/J.ASOC.2020.106089},
  timestamp    = {Mon, 04 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/asc/SharmeenHAH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/GumaeiHHHCSF20,
  author       = {Abdu Gumaei and
                  Mohammad Mehedi Hassan and
                  Md. Shamsul Huda and
                  Md. Rafiul Hassan and
                  David Camacho and
                  Javier Del Ser and
                  Giancarlo Fortino},
  title        = {A robust cyberattack detection approach using optimal features of
                  {SCADA} power systems in smart grids},
  journal      = {Appl. Soft Comput.},
  volume       = {96},
  pages        = {106658},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.asoc.2020.106658},
  doi          = {10.1016/J.ASOC.2020.106658},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/asc/GumaeiHHHCSF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AhmedKHAH20,
  author       = {Yahye Abukar Ahmed and
                  Baris Ko{\c{c}}er and
                  Md. Shamsul Huda and
                  Bander Ali Saleh Al{-}rimy and
                  Mohammad Mehedi Hassan},
  title        = {A system call refinement-based enhanced Minimum Redundancy Maximum
                  Relevance method for ransomware early detection},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {167},
  pages        = {102753},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jnca.2020.102753},
  doi          = {10.1016/J.JNCA.2020.102753},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/AhmedKHAH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/HassanGHA20,
  author       = {Mohammad Mehedi Hassan and
                  Abdu Gumaei and
                  Md. Shamsul Huda and
                  Ahmad Almogren},
  title        = {Increasing the Trustworthiness in the Industrial IoT Networks Through
                  a Reliable Cyberattack Detection Model},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {16},
  number       = {9},
  pages        = {6154--6162},
  year         = {2020},
  url          = {https://doi.org/10.1109/TII.2020.2970074},
  doi          = {10.1109/TII.2020.2970074},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/HassanGHA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/HudaAAPH19,
  author       = {Md. Shamsul Huda and
                  Jemal H. Abawajy and
                  Baker Al{-}Rubaie and
                  Lei Pan and
                  Mohammad Mehedi Hassan},
  title        = {Automatic extraction and integration of behavioural indicators of
                  malware for protection of cyber-physical networks},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {101},
  pages        = {1247--1258},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2019.07.005},
  doi          = {10.1016/J.FUTURE.2019.07.005},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/HudaAAPH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inffus/HassanAUHAF19,
  author       = {Mohammad Mehedi Hassan and
                  Md. Golam Rabiul Alam and
                  Md. Zia Uddin and
                  Md. Shamsul Huda and
                  Ahmad Almogren and
                  Giancarlo Fortino},
  title        = {Human emotion recognition using deep belief network architecture},
  journal      = {Inf. Fusion},
  volume       = {51},
  pages        = {10--18},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.inffus.2018.10.009},
  doi          = {10.1016/J.INFFUS.2018.10.009},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/inffus/HassanAUHAF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HudaAAAAAY18,
  author       = {Md. Shamsul Huda and
                  Sultan Alyahya and
                  Md. Mohsin Ali and
                  Shafiq Ahmad and
                  Jemal H. Abawajy and
                  Hmood Al{-}Dossari and
                  John Yearwood},
  title        = {A Framework for Software Defect Prediction and Metric Selection},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {2844--2858},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2017.2785445},
  doi          = {10.1109/ACCESS.2017.2785445},
  timestamp    = {Thu, 01 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/HudaAAAAAY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SharmeenHAIH18,
  author       = {Shaila Sharmeen and
                  Md. Shamsul Huda and
                  Jemal H. Abawajy and
                  Walaa N. Ismail and
                  Mohammad Mehedi Hassan},
  title        = {Malware Threats and Detection for Industrial Mobile-IoT Networks},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {15941--15957},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2815660},
  doi          = {10.1109/ACCESS.2018.2815660},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SharmeenHAIH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HudaLAIAAA18,
  author       = {Md. Shamsul Huda and
                  Kevin Liu and
                  Mohamed Abdelrazek and
                  Amani S. Ibrahim and
                  Sultan Alyahya and
                  Hmood Al{-}Dossari and
                  Shafiq Ahmad},
  title        = {An Ensemble Oversampling Model for Class Imbalance Problem in Software
                  Defect Prediction},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {24184--24195},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2817572},
  doi          = {10.1109/ACCESS.2018.2817572},
  timestamp    = {Thu, 01 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/HudaLAIAAA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/HudaYHA18,
  author       = {Md. Shamsul Huda and
                  John Yearwood and
                  Mohammad Mehedi Hassan and
                  Ahmad Almogren},
  title        = {Securing the operations in SCADA-IoT platform based industrial control
                  system using ensemble of deep belief networks},
  journal      = {Appl. Soft Comput.},
  volume       = {71},
  pages        = {66--77},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.asoc.2018.06.017},
  doi          = {10.1016/J.ASOC.2018.06.017},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/asc/HudaYHA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/HudaIAYHF18,
  author       = {Md. Shamsul Huda and
                  Md. Rafiqul Islam and
                  Jemal H. Abawajy and
                  John Yearwood and
                  Mohammad Mehedi Hassan and
                  Giancarlo Fortino},
  title        = {A hybrid-multi filter-wrapper framework to identify run-time behaviour
                  for fast malware detection},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {83},
  pages        = {193--207},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.12.037},
  doi          = {10.1016/J.FUTURE.2017.12.037},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/HudaIAYHF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/AbawajyHSHA18,
  author       = {Jemal H. Abawajy and
                  Md. Shamsul Huda and
                  Shaila Sharmeen and
                  Mohammad Mehedi Hassan and
                  Ahmad Almogren},
  title        = {Identifying cyber threats to mobile-IoT applications in edge computing
                  paradigm},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {89},
  pages        = {525--538},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2018.06.053},
  doi          = {10.1016/J.FUTURE.2018.06.053},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/AbawajyHSHA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inffus/HassanHYJA18,
  author       = {Mohammad Mehedi Hassan and
                  Md. Shamsul Huda and
                  John Yearwood and
                  Herbert F. Jelinek and
                  Ahmad Almogren},
  title        = {Multistage fusion approaches based on a generative model and multivariate
                  exponentially weighted moving average for diagnosis of cardiovascular
                  autonomic nerve dysfunction},
  journal      = {Inf. Fusion},
  volume       = {41},
  pages        = {105--118},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.inffus.2017.08.004},
  doi          = {10.1016/J.INFFUS.2017.08.004},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/inffus/HassanHYJA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/HassanHUAA18,
  author       = {Mohammad Mehedi Hassan and
                  Md. Shamsul Huda and
                  Md. Zia Uddin and
                  Ahmad Almogren and
                  Majed A. AlRubaian},
  title        = {Human Activity Recognition from Body Sensor Data using Deep Learning},
  journal      = {J. Medical Syst.},
  volume       = {42},
  number       = {6},
  pages        = {99:1--99:8},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10916-018-0948-z},
  doi          = {10.1007/S10916-018-0948-Z},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/HassanHUAA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/HudaMYAAD18,
  author       = {Md. Shamsul Huda and
                  Md. Suruz Miah and
                  John Yearwood and
                  Sultan Alyahya and
                  Hmood Al{-}Dossari and
                  Robin Doss},
  title        = {A malicious threat detection model for cloud assisted internet of
                  things (CoT) based industrial control system {(ICS)} networks using
                  deep belief network},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {120},
  pages        = {23--31},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jpdc.2018.04.005},
  doi          = {10.1016/J.JPDC.2018.04.005},
  timestamp    = {Thu, 01 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/HudaMYAAD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/AliHAAAY17,
  author       = {Md. Mohsin Ali and
                  Md. Shamsul Huda and
                  Jemal H. Abawajy and
                  Sultan Alyahya and
                  Hmood Al{-}Dossari and
                  John Yearwood},
  title        = {A parallel framework for software defect detection and metric selection
                  on cloud computing},
  journal      = {Clust. Comput.},
  volume       = {20},
  number       = {3},
  pages        = {2267--2281},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10586-017-0892-6},
  doi          = {10.1007/S10586-017-0892-6},
  timestamp    = {Thu, 01 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cluster/AliHAAAY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/HudaAA0Y17,
  author       = {Md. Shamsul Huda and
                  Jemal H. Abawajy and
                  Mali Abdollahian and
                  Md. Rafiqul Islam and
                  John Yearwood},
  title        = {A fast malware feature selection approach using a hybrid of multi-linear
                  and stepwise binary logistic regression},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {29},
  number       = {23},
  year         = {2017},
  url          = {https://doi.org/10.1002/cpe.3912},
  doi          = {10.1002/CPE.3912},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/HudaAA0Y17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijpr/GunaratneAHY17,
  author       = {Nadeera Gnan Tilshan Gunaratne and
                  Malihe Akhavan Abdollahian and
                  Shamsul Huda and
                  John Yearwood},
  title        = {Exponentially weighted control charts to monitor multivariate process
                  variability for high dimensions},
  journal      = {Int. J. Prod. Res.},
  volume       = {55},
  number       = {17},
  pages        = {4948--4962},
  year         = {2017},
  url          = {https://doi.org/10.1080/00207543.2016.1278081},
  doi          = {10.1080/00207543.2016.1278081},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijpr/GunaratneAHY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/HudaMHIYAA17,
  author       = {Md. Shamsul Huda and
                  Md. Suruz Miah and
                  Mohammad Mehedi Hassan and
                  Md. Rafiqul Islam and
                  John Yearwood and
                  Majed A. AlRubaian and
                  Ahmad Almogren},
  title        = {Defending unknown attacks on cyber-physical systems by semi-supervised
                  approach and available unlabeled data},
  journal      = {Inf. Sci.},
  volume       = {379},
  pages        = {211--228},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ins.2016.09.041},
  doi          = {10.1016/J.INS.2016.09.041},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/HudaMHIYAA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HudaYJHFB16,
  author       = {Md. Shamsul Huda and
                  John Yearwood and
                  Herbert F. Jelinek and
                  Mohammad Mehedi Hassan and
                  Giancarlo Fortino and
                  Michael Buckland},
  title        = {A Hybrid Feature Selection With Ensemble Classification for Imbalanced
                  Healthcare Data: {A} Case Study for Brain Tumor Diagnosis},
  journal      = {{IEEE} Access},
  volume       = {4},
  pages        = {9145--9154},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACCESS.2016.2647238},
  doi          = {10.1109/ACCESS.2016.2647238},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/HudaYJHFB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/HudaAAA0Y16,
  author       = {Md. Shamsul Huda and
                  Jemal H. Abawajy and
                  Mamoun Alazab and
                  Mali Abdollahian and
                  Md. Rafiqul Islam and
                  John Yearwood},
  title        = {Hybrids of support vector machine wrapper and filter based framework
                  for malware detection},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {55},
  pages        = {376--390},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.future.2014.06.001},
  doi          = {10.1016/J.FUTURE.2014.06.001},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/HudaAAA0Y16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eor/HudaAMYAS14,
  author       = {Md. Shamsul Huda and
                  Mali Abdollahian and
                  Musa A. Mammadov and
                  John Yearwood and
                  Shafiq Ahmad and
                  Ibrahim A. Sultan},
  title        = {A hybrid wrapper-filter approach to detect the source(s) of out-of-control
                  signals in multivariate manufacturing process},
  journal      = {Eur. J. Oper. Res.},
  volume       = {237},
  number       = {3},
  pages        = {857--870},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ejor.2014.02.032},
  doi          = {10.1016/J.EJOR.2014.02.032},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eor/HudaAMYAS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AlazabHAIYVB14,
  author       = {Mamoun Alazab and
                  Md. Shamsul Huda and
                  Jemal H. Abawajy and
                  Md. Rafiqul Islam and
                  John Yearwood and
                  Sitalakshmi Venkatraman and
                  Roderic Broadhurst},
  title        = {A Hybrid Wrapper-Filter Approach for Malware Detection},
  journal      = {J. Networks},
  volume       = {9},
  number       = {11},
  pages        = {2878--2891},
  year         = {2014},
  url          = {https://doi.org/10.4304/jnw.9.11.2878-2891},
  doi          = {10.4304/JNW.9.11.2878-2891},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/AlazabHAIYVB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/HudaYT14,
  author       = {Md. Shamsul Huda and
                  John Yearwood and
                  Roberto Togneri},
  title        = {Hybrid Metaheuristic Approaches to the Expectation Maximization for
                  Estimation of the Hidden Markov Model for Signal Modeling},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {44},
  number       = {10},
  pages        = {1962--1977},
  year         = {2014},
  url          = {https://doi.org/10.1109/TCYB.2014.2308917},
  doi          = {10.1109/TCYB.2014.2308917},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcyb/HudaYT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/artmed/StranieriAKHCJ13,
  author       = {Andrew Stranieri and
                  Jemal H. Abawajy and
                  Andrei V. Kelarev and
                  Md. Shamsul Huda and
                  Morshed U. Chowdhury and
                  Herbert F. Jelinek},
  title        = {An approach for Ewing test selection to support the clinical assessment
                  of cardiac autonomic neuropathy},
  journal      = {Artif. Intell. Medicine},
  volume       = {58},
  number       = {3},
  pages        = {185--193},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.artmed.2013.04.007},
  doi          = {10.1016/J.ARTMED.2013.04.007},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/artmed/StranieriAKHCJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsc/HudaYS11,
  author       = {Md. Shamsul Huda and
                  John Yearwood and
                  Andrew Stranieri},
  editor       = {Mark Reynolds},
  title        = {Hybrid Wrapper-filter Aapproaches for Input Feature Selection using
                  Maximum relevance-Minimum redundancy and Artificial Neural Network
                  Input Gain Measurement Approximation {(ANNIGMA)}},
  booktitle    = {Thirty-Fourth Australasian Computer Science Conference, {ACSC} 2011,
                  Perth, Australia, January 2011},
  series       = {{CRPIT}},
  volume       = {113},
  pages        = {43--52},
  publisher    = {Australian Computer Society},
  year         = {2011},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV113Huda.html},
  timestamp    = {Fri, 02 Jul 2021 14:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/acsc/HudaYS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isabel/AbdollahianAH11,
  author       = {Mali Abdollahian and
                  Shafiq Ahmad and
                  Shamsul Huda},
  editor       = {Simone Frattasi and
                  Nicola Marchetti},
  title        = {Multivariate control charts for surgical procedures},
  booktitle    = {Proceedings of the 4th International Symposium on Applied Sciences
                  in Biomedical and Communication Technologies, {ISABEL} '11, Barcelona,
                  Spain, October 26-29, 2011},
  pages        = {18:1--18:5},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2093698.2093716},
  doi          = {10.1145/2093698.2093716},
  timestamp    = {Sat, 22 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isabel/AbdollahianAH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/snpd/MukherjeeYVH11,
  author       = {Subhasis Mukherjee and
                  John Yearwood and
                  Peter Vamplew and
                  Md. Shamsul Huda},
  editor       = {Morshed U. Chowdhury and
                  Sid Ray and
                  Roger Y. Lee},
  title        = {Reinforcement Learning Approach to {AIBO} Robot's Decision Making
                  Process in Robosoccer's Goal Keeper Problem},
  booktitle    = {12th {ACIS} International Conference on Software Engineering, Artificial
                  Intelligence, Networking, and Parallel {\&} Distributed Computing,
                  {SNPD} 2011, Sydney, Australia, July 6-8, 2011},
  pages        = {24--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SNPD.2011.39},
  doi          = {10.1109/SNPD.2011.39},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/snpd/MukherjeeYVH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/snpd/RayHC11,
  author       = {Biplob R. Ray and
                  Md. Shamsul Huda and
                  Morshed U. Chowdhury},
  editor       = {Morshed U. Chowdhury and
                  Sid Ray and
                  Roger Y. Lee},
  title        = {Smart {RFID} Reader Protocol for Malware Detection},
  booktitle    = {12th {ACIS} International Conference on Software Engineering, Artificial
                  Intelligence, Networking, and Parallel {\&} Distributed Computing,
                  {SNPD} 2011, Sydney, Australia, July 6-8, 2011},
  pages        = {64--69},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SNPD.2011.41},
  doi          = {10.1109/SNPD.2011.41},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/snpd/RayHC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/snpd/MukherjeeHY11,
  author       = {Subhasis Mukherjee and
                  Md. Shamsul Huda and
                  John Yearwood},
  editor       = {Roger Y. Lee},
  title        = {A Reinforcement Learning Approach with Spline-Fit Object Tracking
                  for {AIBO} Robot's High Level Decision Making},
  booktitle    = {Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed
                  Computing 2011 [Selected Papers from {SNPD} 2011, Sydney, Australia,
                  July 6-8, 2011]},
  series       = {Studies in Computational Intelligence},
  volume       = {368},
  pages        = {169--183},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22288-7\_14},
  doi          = {10.1007/978-3-642-22288-7\_14},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/snpd/MukherjeeHY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/HudaYB10,
  author       = {Md. Shamsul Huda and
                  John Yearwood and
                  Ron Borland},
  editor       = {Yang Xiang and
                  Pierangela Samarati and
                  Jiankun Hu and
                  Wanlei Zhou and
                  Ahmad{-}Reza Sadeghi},
  title        = {Cluster Based Rule Discovery Model for Enhancement of Government's
                  Tobacco Control Strategy},
  booktitle    = {Fourth International Conference on Network and System Security, {NSS}
                  2010, Melbourne, Victoria, Australia, September 1-3, 2010},
  pages        = {383--390},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/NSS.2010.14},
  doi          = {10.1109/NSS.2010.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/HudaYB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/HudaYS10,
  author       = {Md. Shamsul Huda and
                  John Yearwood and
                  Andrew Stranieri},
  editor       = {Yang Xiang and
                  Pierangela Samarati and
                  Jiankun Hu and
                  Wanlei Zhou and
                  Ahmad{-}Reza Sadeghi},
  title        = {Hybrid Wrapper-Filter Approaches for Input Feature Selection Using
                  Maximum Relevance and Artificial Neural Network Input Gain Measurement
                  Approximation {(ANNIGMA)}},
  booktitle    = {Fourth International Conference on Network and System Security, {NSS}
                  2010, Melbourne, Victoria, Australia, September 1-3, 2010},
  pages        = {442--449},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/NSS.2010.7},
  doi          = {10.1109/NSS.2010.7},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/HudaYS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/HudaYB10,
  author       = {Md. Shamsul Huda and
                  John Yearwood and
                  Ron Borland},
  title        = {Smokers' Characteristics and Cluster Based Quitting Rule Discovery
                  Model for Enhancement of Government's Tobacco Control Systems},
  booktitle    = {Pacific Asia Conference on Information Systems, {PACIS} 2010, Taipei,
                  Taiwan, 9-12 July 2010},
  pages        = {26},
  publisher    = {AISeL},
  year         = {2010},
  url          = {http://aisel.aisnet.org/pacis2010/26},
  timestamp    = {Tue, 28 Feb 2012 16:59:14 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/HudaYB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/prl/HudaYT09,
  author       = {Md. Shamsul Huda and
                  John Yearwood and
                  Roberto Togneri},
  title        = {A stochastic version of Expectation Maximization algorithm for better
                  estimation of Hidden Markov Model},
  journal      = {Pattern Recognit. Lett.},
  volume       = {30},
  number       = {14},
  pages        = {1301--1309},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.patrec.2009.06.006},
  doi          = {10.1016/J.PATREC.2009.06.006},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/prl/HudaYT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/HudaYT09,
  author       = {Md. Shamsul Huda and
                  John Yearwood and
                  Roberto Togneri},
  title        = {A Constraint-Based Evolutionary Learning Approach to the Expectation
                  Maximization for Optimal Estimation of the Hidden Markov Model for
                  Speech Signal Modeling},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Part {B}},
  volume       = {39},
  number       = {1},
  pages        = {182--197},
  year         = {2009},
  url          = {https://doi.org/10.1109/TSMCB.2008.2004051},
  doi          = {10.1109/TSMCB.2008.2004051},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/HudaYT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ike/AhmadHBAZ09,
  author       = {Shafiq Ahmad and
                  Md. Shamsul Huda and
                  Sujak Bakir and
                  Mali Abdollahian and
                  Panlop Zeephongsekul},
  editor       = {Hamid R. Arabnia and
                  Ray R. Hashemi and
                  Frederick I. Moxley},
  title        = {Process Performance Evaluation Using Evolutionary Algorithm},
  booktitle    = {Proceedings of the 2009 International Conference on Information {\&}
                  Knowledge Engineering, {IKE} 2009, July 13-16, 2009, Las Vegas Nevada,
                  USA, 2 Volumes},
  pages        = {731--737},
  publisher    = {{CSREA} Press},
  year         = {2009},
  timestamp    = {Sat, 12 Jul 2014 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ike/AhmadHBAZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACISicis/HudaYG07,
  author       = {Md. Shamsul Huda and
                  John Yearwood and
                  Ranadhir Ghosh},
  title        = {A Hybrid Algorithm for Estimation of the Parameters of Hidden Markov
                  Model based Acoustic Modeling of Speech Signals using Constraint-Based
                  Genetic Algorithm and Expectation Maximization},
  booktitle    = {6th Annual {IEEE/ACIS} International Conference on Computer and Information
                  Science {(ICIS} 2007), 11-13 July 2007, Melbourne, Australia},
  pages        = {438--443},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICIS.2007.23},
  doi          = {10.1109/ICIS.2007.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ACISicis/HudaYG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incdm/HudaGY06,
  author       = {Md. Shamsul Huda and
                  Ranadhir Ghosh and
                  John Yearwood},
  editor       = {Petra Perner},
  title        = {A Variable Initialization Approach to the {EM} Algorithm for Better
                  Estimation of the Parameters of Hidden Markov Model Based Acoustic
                  Modeling of Speech Signals},
  booktitle    = {Advances in Data Mining, Applications in Medicine, Web Mining, Marketing,
                  Image and Signal Mining, 6th Industrial Conference on Data Mining,
                  {ICDM} 2006, Leipzig, Germany, July 14-15, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4065},
  pages        = {416--430},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11790853\_33},
  doi          = {10.1007/11790853\_33},
  timestamp    = {Tue, 22 Feb 2022 10:29:40 +0100},
  biburl       = {https://dblp.org/rec/conf/incdm/HudaGY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics