Adnan Ahmad

Orcid: 0000-0003-2488-8043

According to our database1, Adnan Ahmad authored at least 47 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Synews: a synergy-based rumor verification system.
Soc. Netw. Anal. Min., December, 2024

A fuzzy ontology-based context-aware encryption approach in IoT through device and information classification.
J. Supercomput., November, 2024

Fuzzy knowledge based intelligent decision support system for ground based air defence.
J. Ambient Intell. Humaniz. Comput., April, 2024

Investigating Influence of Google-Play Application Titles on Success.
Big Data Res., 2024

2023
Robust federated learning under statistical heterogeneity via Hessian spectral decomposition.
Pattern Recognit., September, 2023

Requirement Change Prediction Model for Small Software Systems.
Comput., July, 2023

Enhancing data quality to mine credible patterns.
J. Inf. Sci., April, 2023

Robust federated learning under statistical heterogeneity via hessian-weighted aggregation.
Mach. Learn., February, 2023

3D-QCNet - A pipeline for automated artifact detection in diffusion MRI images.
Comput. Medical Imaging Graph., 2023

An IoT-Enabled Ontology-Based Intelligent Healthcare Framework for Remote Patient Monitoring.
IEEE Access, 2023

Automatic Domain-Specific Corpora Generation from Wikipedia - A Replication Study.
Proceedings of the 31st IEEE International Requirements Engineering Conference, RE 2023, 2023

Federated Learning Under Statistical Heterogeneity on Riemannian Manifolds.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023

Bio-Inspired Dual-Network Model to Tackle Statistical Heterogeneity in Federated Learning.
Proceedings of the International Joint Conference on Neural Networks, 2023

Deep OC-Sort: Multi-Pedestrian Tracking by Adaptive Re-Identification.
Proceedings of the IEEE International Conference on Image Processing, 2023

A Hessian-Based Federated Learning Approach to Tackle Statistical Heterogeneity.
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023

2022
A framework for the application of socio-technical design methodology.
Ethics Inf. Technol., 2022

Building an Effective Automated Assessment System for C/C++ Introductory Programming Courses in ODL Environment.
CoRR, 2022

2021
A joint sharing approach for online privacy preservation.
World Wide Web, 2021

Does one size fit all? Investigating the effect of group size and gamification on learners' behaviors in higher education.
J. Comput. High. Educ., 2021

Towards Prevention of Sportsmen Burnout: Formal Analysis of Sub-Optimal Tournament Scheduling.
CoRR, 2021

3D-QCNet - A Pipeline for Automated Artifact Detection in Diffusion MRI images.
CoRR, 2021

Identification of trusted IoT devices for secure delegation.
Comput. Electr. Eng., 2021

Detecting the Influence of Hydrocarbon Seepage on Plants: A Spectroscopic Approach.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2021

2020
A context-aware encryption protocol suite for edge computing-based IoT devices.
J. Supercomput., 2020

A Hybrid Semantic Knowledge Integration and Sharing Approach for Distributed Smart Environments.
Sensors, 2020

An intelligent decision support system for effective handling of IT projects.
J. Intell. Fuzzy Syst., 2020

A methodology for sender-oriented anti-spamming.
J. Intell. Fuzzy Syst., 2020

The Impact of Gamification on Learning Outcomes of Computer Science Majors.
ACM Trans. Comput. Educ., 2020

Shared Task: Lexical Semantic Change Detection in German.
CoRR, 2020

A Collaborative Method for Protecting Teens Against Online Predators Over Social Networks: A Behavioral Analysis.
IEEE Access, 2020

An Intelligent Recommender and Decision Support System (IRDSS) for Effective Management of Software Projects.
IEEE Access, 2020

Searching for Truth in the Post-Truth Age.
Proceedings of the 3rd International Conference on Advancements in Computational Sciences, 2020

2019
A relation-aware multiparty access control.
J. Intell. Fuzzy Syst., 2019

A priority-induced demand side management system to mitigate rebound peaks using multiple knapsack.
J. Ambient Intell. Humaniz. Comput., 2019

Predictive and discriminative localization of IDH genotype in high grade gliomas using deep convolutional neural nets.
Proceedings of the 16th IEEE International Symposium on Biomedical Imaging, 2019

2018
Channel Clustering and QoS Level Identification Scheme for Multi-Channel Cognitive Radio Networks.
IEEE Commun. Mag., 2018

Comparative Analysis of Students Perception on the Relevance of Diploma Certificate in Automotive Engineering to the Industry.
IEEE Access, 2018

2017
Ontology-based service discovery framework for dynamic environments.
IET Softw., 2017

Extending social networks with delegation.
Comput. Secur., 2017

2016
Realistic Home Energy Management System Using Exogenous Grid Signals.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

Heuristic Algorithm Based Energy Management System in Smart Grid.
Proceedings of the 10th International Conference on Complex, 2016

2012
More Choices, More Control: Extending Access Control by Meta-rights Reallocation.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Dynamic Rights Reallocation In Social Networks.
Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, 2012

2011
A novel video coding scheme for lossy networks with scalable bit-stream.
Proceedings of the 2011 IEEE Visual Communications and Image Processing, 2011

Computer Security Threats Towards the E-Learning System Assets.
Proceedings of the Software Engineering and Computer Systems, 2011

Access control taxonomy for social networks.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

Distributed access control for social networks.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011


  Loading...