default search action
Shamsher Ullah
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Shamsher Ullah, Jiangbin Zheng, Muhammad Tanveer Hussain, Muhammad Wasif Sardar, Muhammad Umar Farooq, Salabat Khan:
An investigating study of blind and ID-based signcryption schemes for misuse risk protection and high performance computing. Clust. Comput. 27(1): 721-735 (2024) - [j22]Farhan Ullah, Shamsher Ullah, Gautam Srivastava, Jerry Chun-Wei Lin:
IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic. Digit. Commun. Networks 10(1): 190-204 (2024) - [j21]Shamsher Ullah, Jian-Qiang Li, Farhan Ullah, Jie Chen, Ikram Ali, Salabat Khan, Abdul Ahad, Victor C. M. Leung:
The revolution and vision of explainable AI for Android malware detection and protection. Internet Things 27: 101320 (2024) - [j20]Ikram Ali, Jianqiang Li, Jie Chen, Yong Chen, Shamsher Ullah, Salabat Khan:
IOOSC-U2G: An Identity-Based Online/Offline Signcryption Scheme for Unmanned Aerial Vehicle to Ground Station Communication. IEEE Internet Things J. 11(18): 29941-29955 (2024) - [j19]Mahwish Yousaf, Muhammad Saadat Shakoor Khan, Shamsher Ullah:
An Extended-Isomap for high-dimensional data accuracy and efficiency: a comprehensive survey. Multim. Tools Appl. 83(38): 85523-85574 (2024) - [j18]Farhan Ullah, Ali Turab, Shamsher Ullah, Diletta Cacciagrano, Yue Zhao:
Enhanced Network Intrusion Detection System for Internet of Things Security Using Multimodal Big Data Representation with Transfer Learning and Game Theory. Sensors 24(13): 4152 (2024) - [j17]Farhan Ullah, Gautam Srivastava, Shamsher Ullah, Kenji Yoshigoe, Yue Zhao:
NIDS-VSB: Network Intrusion Detection System for VANET Using Spark-Based Big Data Optimization and Transfer Learning. IEEE Trans. Consumer Electron. 70(1): 1798-1809 (2024) - [j16]Farhan Ullah, Gautam Srivastava, Shamsher Ullah, Leonardo Mostarda:
Privacy-Preserving Federated Learning Approach for Distributed Malware Attacks With Intermittent Clients and Image Representation. IEEE Trans. Consumer Electron. 70(1): 4585-4596 (2024) - [j15]Farhan Ullah, Gautam Srivastava, Heng Xiao, Shamsher Ullah, Jerry Chun-Wei Lin, Yue Zhao:
A Scalable Federated Learning Approach for Collaborative Smart Healthcare Systems With Intermittent Clients Using Medical Imaging. IEEE J. Biomed. Health Informatics 28(6): 3293-3304 (2024) - [j14]Farhan Ullah, Shamsher Ullah, Gautam Srivastava, Jerry Chun-Wei Lin, Yue Zhao:
NMal-Droid: network-based android malware detection system using transfer learning and CNN-BiGRU ensemble. Wirel. Networks 30(6): 6177-6198 (2024) - [c2]Shamsher Ullah, Jianqiang Li, Farhan Ullah, Diletta Cacciagrano, Muhammad Tanveer Hussain, Victor C. M. Leung:
Homomorphic Cryptography Authentication Scheme to Eliminate Machine Tools Gaps in Industry 4.0. AINA (6) 2024: 76-85 - 2023
- [j13]Salabat Khan, Fei Luo, Zijian Zhang, Farhan Ullah, Farhan Amin, Syed Furqan Qadri, Md Belal Bin Heyat, Rukhsana Ruby, Lu Wang, Shamsher Ullah, Meng Li, Victor C. M. Leung, Kaishun Wu:
A Survey on X.509 Public-Key Infrastructure, Certificate Revocation, and Their Modern Implementation on Blockchain and Ledger Technologies. IEEE Commun. Surv. Tutorials 25(4): 2529-2568 (2023) - [j12]Shamsher Ullah, Jiangbin Zheng, Nizamud Din, Muhammad Tanveer Hussain, Farhan Ullah, Mahwish Yousaf:
Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey. Comput. Sci. Rev. 47: 100530 (2023) - [j11]Nizamud Din, Abdul Waheed, Shamsher Ullah, Noor Ul Amin, Gautam Srivastava, Farhan Ullah, Jerry Chun-Wei Lin:
A typology of secure multicast communication over 5 G/6 G networks. Int. J. Inf. Sec. 22(4): 1055-1073 (2023) - [j10]Farhan Ullah, Shamsher Ullah, Gautam Srivastava, Jerry Chun-Wei Lin:
Droid-MCFG: Android malware detection system using manifest and control flow traces with multi-head temporal convolutional network. Phys. Commun. 57: 101975 (2023) - [j9]Muhammad Umar Farooq, Xingfu Wang, Ammar Hawbani, Asad Khan, Adeel Ahmed, Fisseha Teju Wedaj, Shamsher Ullah:
TORAS: Trustworthy Load-Balanced Opportunistic Routing for Asynchronous Duty-Cycled WSNs. IEEE Syst. J. 17(2): 2259-2270 (2023) - 2022
- [j8]Shamsher Ullah, Jiangbin Zheng, Muhammad Tanveer Hussain, Nizamud Din, Farhan Ullah, Muhammad Umar Farooq:
A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments. J. Inf. Secur. Appl. 70: 103346 (2022) - [j7]Farhan Ullah, Gautam Srivastava, Shamsher Ullah:
A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization. J. Cloud Comput. 11: 75 (2022) - [j6]Shamsher Ullah, Muhammad Tanveer Hussain, Mahwish Yousaf:
QuSigS: A quantum Signcryption scheme to recover key escrow problem and key revocation problem in cloud computing. Multim. Tools Appl. 81(25): 36781-36803 (2022) - [j5]Farhan Ullah, Shamsher Ullah, Muhammad Rashid Naeem, Leonardo Mostarda, Seungmin Rho, Xiaochun Cheng:
Cyber-Threat Detection System Using a Hybrid Approach of Transfer Learning and Multi-Model Image Representation. Sensors 22(15): 5883 (2022) - 2021
- [j4]Mahwish Yousaf, Muhammad Saadat Shakoor Khan, Tanzeel U. Rehman, Shamsher Ullah, Jing Li:
NRIC: A Noise Removal Approach for Nonlinear Isomap Method. Neural Process. Lett. 53(3): 2277-2304 (2021) - [j3]Shamsher Ullah, Nizamud Din:
Blind signcryption scheme based on hyper elliptic curves cryptosystem. Peer-to-Peer Netw. Appl. 14(2): 917-932 (2021) - 2020
- [j2]Shamsher Ullah, Xiang-Yang Li, Lan Zhang:
A novel trusted third party based signcryption scheme. Multim. Tools Appl. 79(31-32): 22749-22769 (2020)
2010 – 2019
- 2019
- [j1]Shamsher Ullah, Xiang-Yang Li, Muhammad Tanveer Hussain, Lan Zhang:
Kernel homomorphic encryption protocol. J. Inf. Secur. Appl. 48 (2019) - 2017
- [c1]Shamsher Ullah, Xiang-Yang Li, Lan Zhang:
A Review of Signcryption Schemes Based on Hyper Elliptic Curve. BigCom 2017: 51-58
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint