default search action
Md. Shamsul Huda
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j58]Farhana Huq
, Nahar Sultana
, Palash Roy
, Md. Abdur Razzaque
, Shamsul Huda, Mohammad Mehedi Hassan
:
Cross regional online food delivery: Service quality optimization and real-time order assignment. Comput. Oper. Res. 173: 106877 (2025) - 2024
- [j57]Lubna Kiran, Asim Zeb, Qazi Nida ur Rehman, Taj Rahman, Muhammad Shehzad Khan, Shafiq Ahmad, Muhammad Irfan Uddin, Muhammad Naeem, Shamsul Huda, Haitham A. Mahmoud:
An enhanced pattern detection and segmentation of brain tumors in MRI images using deep learning technique. Frontiers Comput. Neurosci. 18 (2024) - [j56]Zainab AlJabri
, Jemal H. Abawajy
, Shamsul Huda
:
MDS-Based Cloned Device Detection in IoT-Fog Network. IEEE Internet Things J. 11(12): 22128-22139 (2024) - [j55]Ali Shahidinejad
, Jemal H. Abawajy, Shamsul Huda:
Untraceable blockchain-assisted authentication and key exchange in medical consortiums. J. Syst. Archit. 151: 103143 (2024) - [j54]Shamsul Huda
, Md. Rezaul Islam, Jemal H. Abawajy
, Vinay Naga Vamsi Kottala, Shafiq Ahmad
:
A Cyber Risk Assessment Approach to Federated Identity Management Framework-Based Digital Healthcare System. Sensors 24(16): 5282 (2024) - [j53]Ali Shahidinejad
, Jemal H. Abawajy
, Shamsul Huda
:
Highly-Secure Yet Efficient Blockchain-Based CRL-Free Key Management Protocol for IoT-Enabled Smart Grid Environments. IEEE Trans. Inf. Forensics Secur. 19: 6738-6750 (2024) - [j52]Ali Shahidinejad
, Jemal H. Abawajy, Shamsul Huda:
Anonymous lattice-based authentication protocol for vehicular communications. Veh. Commun. 48: 100803 (2024) - 2023
- [j51]Iqra Mehmood, Sidra Shahid, Hameed Hussain
, Inayat Khan
, Shafiq Ahmad
, Shahid Rahman
, Najeeb Ullah
, Shamsul Huda
:
A Novel Approach to Improve Software Defect Prediction Accuracy Using Machine Learning. IEEE Access 11: 63579-63597 (2023) - [j50]Muhammad Amin Khan, Muhammad Sohail Khan, Inayat Khan, Shafiq Ahmad, Shamsul Huda:
Non Functional Requirements Identification and Classification Using Transfer Learning Model. IEEE Access 11: 74997-75005 (2023) - [j49]Akhtar Munir Khan
, Muhammad Asif Jan
, Muhammad Sagheer
, Rashida Adeeb Khanum
, Muhammad Irfan Uddin
, Shafiq Ahmad
, Shamsul Huda
:
Near Feasibility Driven Adaptive Penalty Functions Embedded MOEA/D. IEEE Access 11: 105182-105213 (2023) - [j48]Nomica Choudhry
, Jemal H. Abawajy
, Shamsul Huda
, Imran Rao:
A Comprehensive Survey of Machine Learning Methods for Surveillance Videos Anomaly Detection. IEEE Access 11: 114680-114713 (2023) - [j47]Asmat Ullah, Muhammad Ismail Mohmand, Hameed Hussain
, Sumaira Johar
, Inayat Khan, Shafiq Ahmad
, Haitham A. Mahmoud
, Shamsul Huda
:
Customer Analysis Using Machine Learning-Based Classification Algorithms for Effective Segmentation Using Recency, Frequency, Monetary, and Time. Sensors 23(6): 3180 (2023) - [j46]Fazli Khaliq, Muhammad Shabir, Inayat Khan, Shafiq Ahmad, Muhammad Usman, Muhammad Zubair, Shamsul Huda:
Pashto Handwritten Invariant Character Trajectory Prediction Using a Customized Deep Learning Technique. Sensors 23(13): 6060 (2023) - [j45]Md. Golam Rabiul Alam
, Mahmudul Haque
, Md. Rafiul Hassan, Shamsul Huda
, Mohammad Mehedi Hassan
, Fred L. Strickland, Salman A. AlQahtani
:
Feature Cloning and Feature Fusion Based Transportation Mode Detection Using Convolutional Neural Network. IEEE Trans. Intell. Transp. Syst. 24(4): 4671-4681 (2023) - [j44]Md Raful Hassan, Walaa N. Ismail
, Ahmad Chowdhury, Sharara Hossain, Shamsul Huda, Mohammad Mehedi Hassan
:
Correction to: A framework of genetic algorithm-based CNN on multi-access edge computing for automated detection of COVID-19. J. Supercomput. 79(9): 10507-10508 (2023) - [j43]Jimmy Ming-Tai Wu
, Qian Teng
, Shamsul Huda
, Yeh-Cheng Chen
, Chien-Ming Chen
:
A Privacy Frequent Itemsets Mining Framework for Collaboration in IoT Using Federated Learning. ACM Trans. Sens. Networks 19(2): 27:1-27:15 (2023) - 2022
- [j42]Md. Rafiul Hassan, Md. Fakrul Islam, Md. Zia Uddin
, Goutam Ghoshal, Mohammad Mehedi Hassan
, Shamsul Huda, Giancarlo Fortino:
Prostate cancer classification from ultrasound and MRI images using deep learning based Explainable Artificial Intelligence. Future Gener. Comput. Syst. 127: 462-472 (2022) - [j41]Md. Rafiul Hassan
, Shamsul Huda, Mohammad Mehedi Hassan, Jemal H. Abawajy
, Ahmed Alsanad, Giancarlo Fortino:
Early detection of cardiovascular autonomic neuropathy: A multi-class classification model based on feature selection and deep learning feature fusion. Inf. Fusion 77: 70-80 (2022) - [j40]Shaila Sharmeen
, Shamsul Huda
, Jemal H. Abawajy
, Chuadhry Mujeeb Ahmed
, Mohammad Mehedi Hassan
, Giancarlo Fortino
:
An Advanced Boundary Protection Control for the Smart Water Network Using Semisupervised and Deep Learning Approaches. IEEE Internet Things J. 9(10): 7298-7310 (2022) - [j39]Muhammad Haroon
, Saud Altaf
, Shafiq Ahmad
, Mazen Zaindin, Shamsul Huda
, Sofia Iqbal:
Hand Gesture Recognition with Symmetric Pattern under Diverse Illuminated Conditions Using Artificial Neural Network. Symmetry 14(10): 2045 (2022) - [j38]Nadeera Gnan Tilshan Gunaratne, Mali Abdollahian
, Shamsul Huda, Marwan Ali, Giancarlo Fortino
:
An Edge Tier Task Offloading to Identify Sources of Variance Shifts in Smart Grid Using a Hybrid of Wrapper and Filter Approaches. IEEE Trans. Green Commun. Netw. 6(1): 329-340 (2022) - [j37]Maruf Monem
, Md. Golam Rabiul Alam
, Mohammad Abdullah-Al-Wadud
, Shamsul Huda
, Mohammad Mehedi Hassan
, Giancarlo Fortino
:
An Industry-4.0-Complaint Sustainable Bitcoin Model Through Optimized Transaction Selection and Sustainable Block Integration. IEEE Trans. Ind. Informatics 18(12): 9162-9172 (2022) - [j36]Md. Rafiul Hassan, Walaa N. Ismail
, Ahmad Chowdhury, Sharara Hossain, Shamsul Huda, Mohammad Mehedi Hassan
:
A framework of genetic algorithm-based CNN on multi-access edge computing for automated detection of COVID-19. J. Supercomput. 78(7): 10250-10274 (2022) - 2021
- [j35]Saiba Nazah
, Md. Shamsul Huda
, Jemal H. Abawajy
, Mohammad Mehedi Hassan
:
An Unsupervised Model for Identifying and Characterizing Dark Web Forums. IEEE Access 9: 112871-112892 (2021) - [j34]Zia ur Rehman
, Saud Altaf, Shafiq Ahmad
, Md. Shamsul Huda, Adel Al-Shayea
, Sofia Iqbal:
An Efficient, Hybrid Authentication Using ECG and Lightweight Cryptographic Scheme for WBAN. IEEE Access 9: 133809-133819 (2021) - [j33]Mohammad Mehedi Hassan, Md. Rafiul Hassan
, Md. Shamsul Huda, Md. Zia Uddin
, Abdu Gumaei, Ahmed Alsanad:
A predictive intelligence approach to classify brain-computer interface based eye state for smart living. Appl. Soft Comput. 108: 107453 (2021) - [j32]Ahmed Falah, Lei Pan, Md. Shamsul Huda, Shiva Raj Pokhrel
, Adnan Anwar
:
Improving malicious PDF classifier with feature engineering: A data-driven approach. Future Gener. Comput. Syst. 115: 314-326 (2021) - [j31]Mohammad Mehedi Hassan
, Md. Rafiul Hassan, Md. Shamsul Huda
, Victor Hugo C. de Albuquerque
:
A Robust Deep-Learning-Enabled Trust-Boundary Protection for Adversarial Industrial IoT Environment. IEEE Internet Things J. 8(12): 9611-9621 (2021) - [j30]Mohammad Mehedi Hassan
, Md. Shamsul Huda
, Shaila Sharmeen
, Jemal H. Abawajy, Giancarlo Fortino
:
An Adaptive Trust Boundary Protection for IIoT Networks Using Deep-Learning Feature-Extraction-Based Semisupervised Model. IEEE Trans. Ind. Informatics 17(4): 2860-2870 (2021) - 2020
- [j29]Shaila Sharmeen
, Yahye Abukar Ahmed
, Md. Shamsul Huda
, Baris Koçer
, Mohammad Mehedi Hassan
:
Avoiding Future Digital Extortion Through Robust Protection Against Ransomware Threats Using Deep Learning Based Adaptive Approaches. IEEE Access 8: 24522-24534 (2020) - [j28]Saiba Nazah
, Md. Shamsul Huda
, Jemal H. Abawajy, Mohammad Mehedi Hassan
:
Evolution of Dark Web Threat Analysis and Detection: A Systematic Approach. IEEE Access 8: 171796-171819 (2020) - [j27]Shaila Sharmeen, Md. Shamsul Huda, Jemal H. Abawajy, Mohammad Mehedi Hassan
:
An adaptive framework against android privilege escalation threats using deep learning and semi-supervised approaches. Appl. Soft Comput. 89: 106089 (2020) - [j26]Abdu Gumaei
, Mohammad Mehedi Hassan
, Md. Shamsul Huda, Md. Rafiul Hassan
, David Camacho, Javier Del Ser
, Giancarlo Fortino
:
A robust cyberattack detection approach using optimal features of SCADA power systems in smart grids. Appl. Soft Comput. 96: 106658 (2020) - [j25]Yahye Abukar Ahmed
, Baris Koçer, Md. Shamsul Huda, Bander Ali Saleh Al-rimy, Mohammad Mehedi Hassan:
A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection. J. Netw. Comput. Appl. 167: 102753 (2020) - [j24]Mohammad Mehedi Hassan
, Abdu Gumaei
, Md. Shamsul Huda
, Ahmad Almogren
:
Increasing the Trustworthiness in the Industrial IoT Networks Through a Reliable Cyberattack Detection Model. IEEE Trans. Ind. Informatics 16(9): 6154-6162 (2020)
2010 – 2019
- 2019
- [j23]Md. Shamsul Huda, Jemal H. Abawajy, Baker Al-Rubaie, Lei Pan
, Mohammad Mehedi Hassan:
Automatic extraction and integration of behavioural indicators of malware for protection of cyber-physical networks. Future Gener. Comput. Syst. 101: 1247-1258 (2019) - [j22]Mohammad Mehedi Hassan
, Md. Golam Rabiul Alam
, Md. Zia Uddin
, Md. Shamsul Huda, Ahmad Almogren
, Giancarlo Fortino
:
Human emotion recognition using deep belief network architecture. Inf. Fusion 51: 10-18 (2019) - 2018
- [j21]Md. Shamsul Huda
, Sultan Alyahya
, Md. Mohsin Ali
, Shafiq Ahmad
, Jemal H. Abawajy, Hmood Al-Dossari, John Yearwood:
A Framework for Software Defect Prediction and Metric Selection. IEEE Access 6: 2844-2858 (2018) - [j20]Shaila Sharmeen, Md. Shamsul Huda
, Jemal H. Abawajy, Walaa N. Ismail
, Mohammad Mehedi Hassan
:
Malware Threats and Detection for Industrial Mobile-IoT Networks. IEEE Access 6: 15941-15957 (2018) - [j19]Md. Shamsul Huda
, Kevin Liu, Mohamed Abdelrazek, Amani S. Ibrahim, Sultan Alyahya
, Hmood Al-Dossari, Shafiq Ahmad
:
An Ensemble Oversampling Model for Class Imbalance Problem in Software Defect Prediction. IEEE Access 6: 24184-24195 (2018) - [j18]Md. Shamsul Huda, John Yearwood, Mohammad Mehedi Hassan, Ahmad Almogren
:
Securing the operations in SCADA-IoT platform based industrial control system using ensemble of deep belief networks. Appl. Soft Comput. 71: 66-77 (2018) - [j17]Md. Shamsul Huda, Md. Rafiqul Islam
, Jemal H. Abawajy, John Yearwood, Mohammad Mehedi Hassan
, Giancarlo Fortino
:
A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection. Future Gener. Comput. Syst. 83: 193-207 (2018) - [j16]Jemal H. Abawajy, Md. Shamsul Huda, Shaila Sharmeen, Mohammad Mehedi Hassan
, Ahmad Almogren
:
Identifying cyber threats to mobile-IoT applications in edge computing paradigm. Future Gener. Comput. Syst. 89: 525-538 (2018) - [j15]Mohammad Mehedi Hassan, Md. Shamsul Huda, John Yearwood, Herbert F. Jelinek
, Ahmad Almogren
:
Multistage fusion approaches based on a generative model and multivariate exponentially weighted moving average for diagnosis of cardiovascular autonomic nerve dysfunction. Inf. Fusion 41: 105-118 (2018) - [j14]Mohammad Mehedi Hassan
, Md. Shamsul Huda, Md. Zia Uddin
, Ahmad Almogren
, Majed A. AlRubaian:
Human Activity Recognition from Body Sensor Data using Deep Learning. J. Medical Syst. 42(6): 99:1-99:8 (2018) - [j13]Md. Shamsul Huda, Md. Suruz Miah
, John Yearwood, Sultan Alyahya
, Hmood Al-Dossari, Robin Doss
:
A malicious threat detection model for cloud assisted internet of things (CoT) based industrial control system (ICS) networks using deep belief network. J. Parallel Distributed Comput. 120: 23-31 (2018) - 2017
- [j12]Md. Mohsin Ali
, Md. Shamsul Huda, Jemal H. Abawajy, Sultan Alyahya
, Hmood Al-Dossari, John Yearwood:
A parallel framework for software defect detection and metric selection on cloud computing. Clust. Comput. 20(3): 2267-2281 (2017) - [j11]Md. Shamsul Huda
, Jemal H. Abawajy, Mali Abdollahian
, Md. Rafiqul Islam
, John Yearwood:
A fast malware feature selection approach using a hybrid of multi-linear and stepwise binary logistic regression. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j10]Nadeera Gnan Tilshan Gunaratne, Malihe Akhavan Abdollahian
, Shamsul Huda, John Yearwood:
Exponentially weighted control charts to monitor multivariate process variability for high dimensions. Int. J. Prod. Res. 55(17): 4948-4962 (2017) - [j9]Md. Shamsul Huda, Md. Suruz Miah
, Mohammad Mehedi Hassan, Md. Rafiqul Islam
, John Yearwood, Majed A. AlRubaian, Ahmad Almogren
:
Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data. Inf. Sci. 379: 211-228 (2017) - 2016
- [j8]Md. Shamsul Huda
, John Yearwood, Herbert F. Jelinek
, Mohammad Mehedi Hassan
, Giancarlo Fortino
, Michael Buckland:
A Hybrid Feature Selection With Ensemble Classification for Imbalanced Healthcare Data: A Case Study for Brain Tumor Diagnosis. IEEE Access 4: 9145-9154 (2016) - [j7]Md. Shamsul Huda, Jemal H. Abawajy, Mamoun Alazab
, Mali Abdollahian
, Md. Rafiqul Islam
, John Yearwood:
Hybrids of support vector machine wrapper and filter based framework for malware detection. Future Gener. Comput. Syst. 55: 376-390 (2016) - 2014
- [j6]Md. Shamsul Huda, Mali Abdollahian
, Musa A. Mammadov
, John Yearwood, Shafiq Ahmad, Ibrahim A. Sultan
:
A hybrid wrapper-filter approach to detect the source(s) of out-of-control signals in multivariate manufacturing process. Eur. J. Oper. Res. 237(3): 857-870 (2014) - [j5]Mamoun Alazab
, Md. Shamsul Huda, Jemal H. Abawajy, Md. Rafiqul Islam, John Yearwood, Sitalakshmi Venkatraman, Roderic Broadhurst:
A Hybrid Wrapper-Filter Approach for Malware Detection. J. Networks 9(11): 2878-2891 (2014) - [j4]Md. Shamsul Huda, John Yearwood, Roberto Togneri
:
Hybrid Metaheuristic Approaches to the Expectation Maximization for Estimation of the Hidden Markov Model for Signal Modeling. IEEE Trans. Cybern. 44(10): 1962-1977 (2014) - 2013
- [j3]Andrew Stranieri
, Jemal H. Abawajy, Andrei V. Kelarev, Md. Shamsul Huda, Morshed U. Chowdhury
, Herbert F. Jelinek
:
An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy. Artif. Intell. Medicine 58(3): 185-193 (2013) - 2011
- [c11]Md. Shamsul Huda, John Yearwood, Andrew Stranieri:
Hybrid Wrapper-filter Aapproaches for Input Feature Selection using Maximum relevance-Minimum redundancy and Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA). ACSC 2011: 43-52 - [c10]Mali Abdollahian
, Shafiq Ahmad
, Shamsul Huda:
Multivariate control charts for surgical procedures. ISABEL 2011: 18:1-18:5 - [c9]Subhasis Mukherjee, John Yearwood, Peter Vamplew
, Md. Shamsul Huda:
Reinforcement Learning Approach to AIBO Robot's Decision Making Process in Robosoccer's Goal Keeper Problem. SNPD 2011: 24-30 - [c8]Biplob R. Ray
, Md. Shamsul Huda, Morshed U. Chowdhury
:
Smart RFID Reader Protocol for Malware Detection. SNPD 2011: 64-69 - [c7]Subhasis Mukherjee, Md. Shamsul Huda, John Yearwood:
A Reinforcement Learning Approach with Spline-Fit Object Tracking for AIBO Robot's High Level Decision Making. SNPD (Selected Papers) 2011: 169-183 - 2010
- [c6]Md. Shamsul Huda, John Yearwood, Ron Borland:
Cluster Based Rule Discovery Model for Enhancement of Government's Tobacco Control Strategy. NSS 2010: 383-390 - [c5]Md. Shamsul Huda, John Yearwood, Andrew Stranieri
:
Hybrid Wrapper-Filter Approaches for Input Feature Selection Using Maximum Relevance and Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA). NSS 2010: 442-449 - [c4]Md. Shamsul Huda, John Yearwood, Ron Borland:
Smokers' Characteristics and Cluster Based Quitting Rule Discovery Model for Enhancement of Government's Tobacco Control Systems. PACIS 2010: 26
2000 – 2009
- 2009
- [j2]Md. Shamsul Huda, John Yearwood, Roberto Togneri
:
A stochastic version of Expectation Maximization algorithm for better estimation of Hidden Markov Model. Pattern Recognit. Lett. 30(14): 1301-1309 (2009) - [j1]Md. Shamsul Huda, John Yearwood, Roberto Togneri
:
A Constraint-Based Evolutionary Learning Approach to the Expectation Maximization for Optimal Estimation of the Hidden Markov Model for Speech Signal Modeling. IEEE Trans. Syst. Man Cybern. Part B 39(1): 182-197 (2009) - [c3]Shafiq Ahmad, Md. Shamsul Huda, Sujak Bakir, Mali Abdollahian, Panlop Zeephongsekul:
Process Performance Evaluation Using Evolutionary Algorithm. IKE 2009: 731-737 - 2007
- [c2]Md. Shamsul Huda, John Yearwood, Ranadhir Ghosh:
A Hybrid Algorithm for Estimation of the Parameters of Hidden Markov Model based Acoustic Modeling of Speech Signals using Constraint-Based Genetic Algorithm and Expectation Maximization. ACIS-ICIS 2007: 438-443 - 2006
- [c1]Md. Shamsul Huda, Ranadhir Ghosh, John Yearwood:
A Variable Initialization Approach to the EM Algorithm for Better Estimation of the Parameters of Hidden Markov Model Based Acoustic Modeling of Speech Signals. ICDM 2006: 416-430
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint