Shamsher Ullah

Orcid: 0000-0002-8726-3123

According to our database1, Shamsher Ullah authored at least 17 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
NIDS-VSB: Network Intrusion Detection System for VANET Using Spark-Based Big Data Optimization and Transfer Learning.
IEEE Trans. Consumer Electron., February, 2024

Privacy-Preserving Federated Learning Approach for Distributed Malware Attacks With Intermittent Clients and Image Representation.
IEEE Trans. Consumer Electron., February, 2024

Homomorphic Cryptography Authentication Scheme to Eliminate Machine Tools Gaps in Industry 4.0.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
TORAS: Trustworthy Load-Balanced Opportunistic Routing for Asynchronous Duty-Cycled WSNs.
IEEE Syst. J., June, 2023

Droid-MCFG: Android malware detection system using manifest and control flow traces with multi-head temporal convolutional network.
Phys. Commun., April, 2023

Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey.
Comput. Sci. Rev., February, 2023

A typology of secure multicast communication over 5 G/6 G networks.
Int. J. Inf. Sec., 2023

A Survey on X.509 Public-Key Infrastructure, Certificate Revocation, and Their Modern Implementation on Blockchain and Ledger Technologies.
IEEE Commun. Surv. Tutorials, 2023

2022
Cyber-Threat Detection System Using a Hybrid Approach of Transfer Learning and Multi-Model Image Representation.
Sensors, 2022

QuSigS: A quantum Signcryption scheme to recover key escrow problem and key revocation problem in cloud computing.
Multim. Tools Appl., 2022

A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization.
J. Cloud Comput., 2022

A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments.
J. Inf. Secur. Appl., 2022

2021
Blind signcryption scheme based on hyper elliptic curves cryptosystem.
Peer-to-Peer Netw. Appl., 2021

NRIC: A Noise Removal Approach for Nonlinear Isomap Method.
Neural Process. Lett., 2021

2020
A novel trusted third party based signcryption scheme.
Multim. Tools Appl., 2020

2019
Kernel homomorphic encryption protocol.
J. Inf. Secur. Appl., 2019

2017
A Review of Signcryption Schemes Based on Hyper Elliptic Curve.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017


  Loading...