default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 413 matches
- 2024
- Vinod Kumar, Seema, Kamal Kumar, Ramakant Prasad, Khalid Al Mutib, M. Shamim Hossain:
SEPCVN: Secure and Efficient Protocol for Cloud Vehicular Networking. IEEE Access 12: 108657-108672 (2024) - Sunil Prajapat, Pankaj Kumar, Sandeep Kumar, Ashok Kumar Das, Sachin Shetty, M. Shamim Hossain:
Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security. IEEE Access 12: 14647-14658 (2024) - Esraa Hassan, M. Shamim Hossain, Abeer Saber, Samir Elmougy, Ahmed Ghoneim, Ghulam Muhammad:
A quantum convolutional network and ResNet (50)-based classification architecture for the MNIST medical dataset. Biomed. Signal Process. Control. 87(Part B): 105560 (2024) - Junfeng Miao, Zhaoshun Wang, Mei Wang, Sahil Garg, M. Shamim Hossain, Joel J. P. C. Rodrigues:
Secure and efficient communication approaches for Industry 5.0 in edge computing. Comput. Networks 242: 110244 (2024) - Amara Umar, Syed Ali Hassan, Haejoon Jung, Sahil Garg, M. Shamim Hossain, Mohsen Guizani:
Computation offloading in NOMA-MEC-enabled aerial-vehicular networks exploiting mmWave capabilities. Comput. Networks 246: 110335 (2024) - Rahatara Ferdousi, Chunsheng Yang, M. Anwar Hossain, Fedwa Laamarti, M. Shamim Hossain, Abdulmotaleb El-Saddik:
Generative Model-Driven Synthetic Training Image Generation: An Approach to Cognition in Railway Defect Detection. Cogn. Comput. 16(5): 1-16 (2024) - Md. Yousuf Ali, Bin Jiang, Oindrila Chowdhury, Md. Harun-Ar-Rashid, M. Shamim Hossain, Khalid Al Mutib:
Cosine modulated filter bank-based architecture for extracting and fusing saliency features. Expert Syst. J. Knowl. Eng. 41(3) (2024) - Liguo Dong, Xinliang Ye, Libin Zhuang, Ruidian Zhan, M. Shamim Hossain:
AES software and hardware system co-design for resisting side channel attacks. Expert Syst. J. Knowl. Eng. 41(10) (2024) - Esraa Hassan, M. Shamim Hossain, Samir Elmuogy, Ahmed Ghoneim, Khalid Al Mutib, Abeer Saber:
Ultimate pose estimation: A comparative study. Expert Syst. J. Knowl. Eng. 41(9) (2024) - Yi Wu, Jiayi Chen, Tianbao Lei, Jiahua Yu, M. Shamim Hossain:
Web 3.0 security: Backdoor attacks in federated learning-based automatic speaker verification systems in the 6G era. Future Gener. Comput. Syst. 160: 433-441 (2024) - Md Shamim Hossain, Leisa J. Armstrong, David M. Cook, Pauline Zaenker:
Application of Histopathology Image Analysis Using Deep Learning Networks. Hum. Centric Intell. Syst. 4(3): 417-436 (2024) - Tingting Fu, Liyao Wang, Sahil Garg, M. Shamim Hossain, Qianwen Yu, Hua Hu:
Adaptive signal light timing for regional traffic optimization based on graph convolutional network empowered traffic forecasting. Inf. Fusion 103: 102072 (2024) - Jun Lyu, Xiudong Chen, Salman A. AlQahtani, M. Shamim Hossain:
Multi-modality MRI fusion with patch complementary pre-training for internet of medical things-based smart healthcare. Inf. Fusion 107: 102342 (2024) - Muna Al-Hawawreh, Mamoun Alazab, Mohamed Amine Ferrag, M. Shamim Hossain:
Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms. J. Netw. Comput. Appl. 223: 103809 (2024) - Muna Al-Hawawreh, M. Shamim Hossain:
Digital twin-driven secured edge-private cloud Industrial Internet of Things (IIoT) framework. J. Netw. Comput. Appl. 226: 103888 (2024) - Yuanhang Qi, M. Shamim Hossain:
Harnessing federated generative learning for green and sustainable Internet of Things. J. Netw. Comput. Appl. 222: 103812 (2024) - Zihang Zhen, Xiaoding Wang, Hui Lin, Sahil Garg, Prabhat Kumar, M. Shamim Hossain:
A dynamic state sharding blockchain architecture for scalable and secure crowdsourcing systems. J. Netw. Comput. Appl. 222: 103785 (2024) - Muna Al-Hawawreh, M. Shamim Hossain:
Federated Learning-Assisted Distributed Intrusion Detection Using Mesh Satellite Nets for Autonomous Vehicle Protection. IEEE Trans. Consumer Electron. 70(1): 854-862 (2024) - Suli He, Chengwen Du, M. Shamim Hossain:
6G-Enabled Consumer Electronics Device Intrusion Detection With Federated Meta-Learning and Digital Twins in a Meta-Verse Environment. IEEE Trans. Consumer Electron. 70(1): 3111-3119 (2024) - M. Shamim Hossain, M. Saiful Islam, Md. Abdur Rahman:
A Cyber Range Framework for Emulating Secure and Private IT/OT Consumer Service Verticals Toward 6G. IEEE Trans. Consumer Electron. 70(2): 4709-4716 (2024) - Xumin Huang, Yang Zhang, Yuanhang Qi, Caishi Huang, M. Shamim Hossain:
Energy-Efficient UAV Scheduling and Probabilistic Task Offloading for Digital Twin-Empowered Consumer Electronics Industry. IEEE Trans. Consumer Electron. 70(1): 2145-2154 (2024) - Md. Moniruzzaman, Abdulsalam Yassine, M. Shamim Hossain:
Energizing Charging Services for Next-Generation Consumers E-Mobility With Reinforcement Learning and Blockchain. IEEE Trans. Consumer Electron. 70(1): 2269-2280 (2024) - Lu Rong, Yijie Ding, Mengyao Wang, Abdulmotaleb El-Saddik, M. Shamim Hossain:
A Multi-Modal ELMo Model for Image Sentiment Recognition of Consumer Data. IEEE Trans. Consumer Electron. 70(1): 3697-3708 (2024) - Zeinab Teimoori, Abdulsalam Yassine, M. Shamim Hossain:
Smart Vehicles Recommendation System for Artificial Intelligence-Enabled Communication. IEEE Trans. Consumer Electron. 70(1): 3914-3925 (2024) - Yazhou Zhang, Yu He, Rui Chen, Prayag Tiwari, Abdulmotaleb El-Saddik, M. Shamim Hossain:
A Dual Channel Cyber-Physical Transportation Network for Detecting Traffic Incidents and Driver Emotion. IEEE Trans. Consumer Electron. 70(1): 1766-1774 (2024) - M. Shamim Hossain, Yixue Hao, Long Hu, Jia Liu, Gang Wei, Chen Min:
Immersive Multimedia Service Caching in Edge Cloud with Renewable Energy. ACM Trans. Multim. Comput. Commun. Appl. 20(6): 173:1-173:23 (2024) - Jun Lyu, Guangming Wang, M. Shamim Hossain:
Iterative Temporal-spatial Transformer-based Cardiac T1 Mapping MRI Reconstruction. ACM Trans. Multim. Comput. Commun. Appl. 20(6): 179:1-179:18 (2024) - Jun Lyu, Shouang Yan, M. Shamim Hossain:
DBGAN: Dual Branch Generative Adversarial Network for Multi-Modal MRI Translation. ACM Trans. Multim. Comput. Commun. Appl. 20(8): 235:1-235:22 (2024) - Yazhou Zhang, Yang Yu, Mengyao Wang, Min Huang, M. Shamim Hossain:
Self-Adaptive Representation Learning Model for Multi-Modal Sentiment and Sarcasm Joint Analysis. ACM Trans. Multim. Comput. Commun. Appl. 20(5): 125:1-125:17 (2024) - Rahatara Ferdousi, Chunsheng Yang, M. Anwar Hossain, Fedwa Laamarti, M. Shamim Hossain, Abdulmotaleb El-Saddik:
Generative Model-Driven Synthetic Training Image Generation: An Approach to Cognition in Rail Defect Detection. CoRR abs/2401.00393 (2024)
skipping 383 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-05 05:31 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint