![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 276 matches
- 2024
- Md. Tariqul Islam, M. Ahsanul Alam
, M. S. Hossian Lipu
, Md. Siddikur Rahman
, Md. Fayzur Rahman
, Ratil H. Ashique, Mohammed Radoan, Ammar Masaoud
:
Harmonics Minimization of Symmetric Five-Level Inverter Using Improved LSF Modulation Scheme. IEEE Access 12: 62526-62542 (2024) - Tawsifur Rahman, Amith Khandakar, Ashiqur Rahman, Susu M. Zughaier, Muna Al Maslamani, Moajjem Hossain Chowdhury, Anas M. Tahir, Md Sakib Abrar Hossain, Muhammad E. H. Chowdhury:
TB-CXRNet: Tuberculosis and Drug-Resistant Tuberculosis Detection Technique Using Chest X-ray Images. Cogn. Comput. 16(3): 1393-1412 (2024) - Nur Imtiazul Haque
, Mohammad Ashiqur Rahman
, A. Selcuk Uluagac:
Formal threat analysis of machine learning-based control systems: A study on smart healthcare systems. Comput. Secur. 139: 103709 (2024) - Aditi Saha
, Mohammad Ashiqur Rahman
, Fan Wu
:
Evaluating LSTM Time Series Prediction Performance on Benchmark CPUs and GPUs in Cloud Environments. ACM Southeast Regional Conference 2024: 321-322 - Md Towhidul Absar Chowdhury, Naveen Sharma, Ashiqur R. KhudaBukhsh:
Community Needs and Assets: A Computational Analysis of Community Conversations. ICWSM 2024: 302-314 - Md Towhidul Absar Chowdhury
, Soumyajit Datta
, Naveen Sharma
, Ashiqur R. KhudaBukhsh
:
Infrastructure Ombudsman: Mining Future Failure Concerns from Structural Disaster Response. WWW 2024: 4664-4673 - Md Towhidul Absar Chowdhury, Soumyajit Datta, Naveen Sharma, Ashiqur R. KhudaBukhsh:
Infrastructure Ombudsman: Mining Future Failure Concerns from Structural Disaster Response. CoRR abs/2402.13528 (2024) - Md Towhidul Absar Chowdhury, Naveen Sharma, Ashiqur R. KhudaBukhsh:
Community Needs and Assets: A Computational Analysis of Community Conversations. CoRR abs/2403.13272 (2024) - Md. Faiyaz Abdullah Sayeedi, Fahim Hafiz, Md Ashiqur Rahman:
MosquitoFusion: A Multiclass Dataset for Real-Time Detection of Mosquitoes, Swarms, and Breeding Sites Using Deep Learning. CoRR abs/2404.01501 (2024) - Nazia Tasnim, Sujan Sen Gupta, Md. Istiak Hossain Shihab, Fatiha Islam Juee, Arunima Tahsin, Pritom Ghum, Kanij Fatema, Marshia Haque, Wasema Farzana, Prionti Nasir, Ashiqur R. KhudaBukhsh, Farig Sadeque, Asif Shahriyar Sushmit:
Mapping Violence: Developing an Extensive Framework to Build a Bangla Sectarian Expression Dataset from Social Media Interactions. CoRR abs/2404.11752 (2024) - 2023
- Marcos Díaz-Gay, Raviteja Vangara, Mark Barnes, Xi Wang, S. M. Ashiqul Islam, Ian Vermes, Stephen Duke, Nithish Bharadhwaj Narasimman, Ting Yang, Zichen Jiang, Sarah J. Moody, Sergey Senkin, Paul Brennan, Michael R. Stratton, Ludmil B. Alexandrov:
Assigning mutational signatures to individual samples and individual somatic mutations with SigProfilerAssignment. Bioinform. 39(12) (2023) - Md Ashiqur Rahman
, Abdullah Aman Tutul, Mahfuza Sharmin, Md. Shamsuzzoha Bayzid:
BEENE: deep learning-based nonlinear embedding improves batch effect estimation. Bioinform. 39(8) (2023) - Alvi Ataur Khalil
, Mohamed Y. Selim
, Mohammad Ashiqur Rahman
:
Deep learning-based energy harvesting with intelligent deployment of RIS-assisted UAV-CFmMIMOs. Comput. Networks 229: 109784 (2023) - Md. Ashiqur Rahman, Shuhena Salam Aonty
, Kaushik Deb
, Iqbal H. Sarker
:
Attention-Based Human Age Estimation from Face Images to Enhance Public Security. Data 8(10): 145 (2023) - Tayebeh Rajab
, Alvi Ataur Khalil
, Mohammad Hossein Manshaei
, Mohammad Ashiqur Rahman
, Mohammad Dakhilalian
, Maurice Ngouen
, Murtuza Jadliwala
, A. Selcuk Uluagac
:
Feasibility Analysis for Sybil Attacks in Shard-Based Permissionless Blockchains. Distributed Ledger Technol. Res. Pract. 2(4): 1-21 (2023) - M. Saad Bin Arif
, Uvais Mustafa
, Shahbaz Ahmad, Shahrin Bin Md. Ayob
, Ratil Hasnat Ashique
, Mohammad Tayyab:
Asymmetrical 21-level inverter topology with minimum variety of dc sources and reduced component counts. Int. J. Circuit Theory Appl. 51(4): 1697-1718 (2023) - Ali Siddique, Abdul Rauf Bhatti
, Arslan Dawood Butt
, Ahmed Bilal Awan, Ratil Hasnat Ashique, Muhammad Usman Younus:
A hardware-friendly motion estimation algorithm for the HEVC standard in the context of low-delay video coding. Multim. Tools Appl. 82(11): 16519-16532 (2023) - Ashiqur Rahaman
, Yichuan Tang
, Shang Gao
, Xihan Ma
, Igor Sorokin, Haichong K. Zhang
:
Needle Aligned Ultrasound Image-Guided Access Through Dual-Segment Array. IEEE Trans. Biomed. Eng. 70(9): 2645-2654 (2023) - Madhukrishna Priyadarsini
, Padmalochan Bera
, Sajal K. Das
, Mohammad Ashiqur Rahman
:
A Security Enforcement Framework for SDN Controller Using Game Theoretic Approach. IEEE Trans. Dependable Secur. Comput. 20(2): 1500-1515 (2023) - Mohamadsaleh Jafari
, Mohammad Ashiqur Rahman
, Sumit Paudyal
:
Optimal False Data Injection Attack Against Load-Frequency Control in Power Systems. IEEE Trans. Inf. Forensics Secur. 18: 5200-5212 (2023) - A. H. M. Jakaria
, Mohammad Ashiqur Rahman
, Muneeba Asif, Alvi Ataur Khalil
, Hisham A. Kholidy
, Matthew Anderson, Steven Drager:
Trajectory Synthesis for a UAV Swarm Based on Resilient Data Collection Objectives. IEEE Trans. Netw. Serv. Manag. 20(1): 138-151 (2023) - Mohamadsaleh Jafari
, Mohammad Ashiqur Rahman
, Sumit Paudyal
:
Optimal False Data Injection Attacks Against Power System Frequency Stability. IEEE Trans. Smart Grid 14(2): 1276-1288 (2023) - Tharindu Cyril Weerasooriya
, Sarah Luger, Saloni Poddar, Ashiqur R. KhudaBukhsh, Christopher Homan:
Subjective Crowd Disagreements for Subjective Data: Uncovering Meaningful CrowdOpinion with Population-level Learning. ACL (1) 2023: 950-966 - Hisham A. Kholidy, Keven Disen, Andrew Karam, Elhadj Benkhelifa, Mohammad Ashiqur Rahman, Atta-Ur Rahman, Ibrahim Almazyad, Ahmed F. Sayed, Rakia Jaziri:
Secure the 5G and Beyond Networks with Zero Trust and Access Control Systems for Cloud Native Architectures. AICCSA 2023: 1-8 - Mohammed Afaan Ansari
, Jiten Sidhpura
, Vivek Kumar Mandal
, Ashiqur R. KhudaBukhsh
:
Quantifying the Transience of Social Web Datasets. ASONAM 2023: 286-293 - Muneeba Asif, Mohammad Ashiqur Rahman, Kemal Akkaya, Hossain Shahriar, Alfredo Cuzzocrea:
Adversarial Data-Augmented Resilient Intrusion Detection System for Unmanned Aerial Vehicles. IEEE Big Data 2023: 5428-5437 - Adrian Petterson
, Ashique Ali Thuppilikkat
, Paridhi Gupta
, Shamika Klassen
, Margaret C. Jack
, Jun Liu
, Priyank Chandra
:
Supporting Social Movements Through HCI and Design. CHI Extended Abstracts 2023: 364:1-364:5 - Mst. Shapna Akter, Hossain Shahriar, Sheikh Iqbal Ahamed, Kishor Datta Gupta, Muhammad Rahman, Atef Mohamed, Mohammad Ashiqur Rahman
, Akond Rahman, Fan Wu:
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection. COMPSAC 2023: 1057-1063 - Nur Imtiazul Haque, Maurice Ngouen, Mohammad Ashiqur Rahman, A. Selcuk Uluagac, Laurent Njilla:
SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems. DSN 2023: 1-13 - Tharindu Cyril Weerasooriya, Sujan Dutta, Tharindu Ranasinghe, Marcos Zampieri, Christopher Homan, Ashiqur R. KhudaBukhsh:
Vicarious Offense and Noise Audit of Offensive Speech Classifiers: Unifying Human and Machine Disagreement on What is Offensive. EMNLP 2023: 11648-11668
skipping 246 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-23 06:31 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint