Ejaz Ahmed
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2024
J. Netw. Comput. Appl., 2024
2023
DeepMPR: Enhancing Opportunistic Routing in Wireless Networks through Multi-Agent Deep Reinforcement Learning.
CoRR, 2023
DeepMPR: Enhancing Opportunistic Routing in Wireless Networks via Multi-Agent Deep Reinforcement Learning.
Proceedings of the IEEE Military Communications Conference, 2023
Proceedings of the IEEE Military Communications Conference, 2023
Proceedings of the Third International Symposium on Advanced Security on Software and Systems, 2023
2022
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022
2021
CoRR, 2021
DeepCQ+: Robust and Scalable Routing with Multi-Agent Deep Reinforcement Learning for Highly Dynamic Networks.
Proceedings of the 2021 IEEE Military Communications Conference, 2021
2019
Anti-malarial, cytotoxicity and molecular docking studies of quinolinyl chalcones as potential anti-malarial agent.
J. Comput. Aided Mol. Des., 2019
Robust Inference after Random Projections via Hellinger Distance for Location-Scale Family.
Entropy, 2019
2018
Trans. Emerg. Telecommun. Technol., 2018
2016
Analysis of factors influencing acceptance of personal, academic and professional development e-portfolios.
Comput. Hum. Behav., 2016
Investigating the influence of the most commonly used external variables of TAM on students' Perceived Ease of Use (PEOU) and Perceived Usefulness (PU) of e-portfolios.
Comput. Hum. Behav., 2016
The future of mobile cloud computing: Integrating cloudlets and Mobile Edge Computing.
Proceedings of the 23rd International Conference on Telecommunications, 2016
2014
Proceedings of the Twelfth Australasian Information Security Conference, 2014
2013
Object extraction from T2 weighted brain MR image using histogram based gradient calculation.
Pattern Recognit. Lett., 2013
2012
Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks.
Secur. Commun. Networks, 2012
2011
Parametric Differences between a Real-world Distributed Denial-of-Service Attack and a Flash Event.
Proceedings of the Sixth International Conference on Availability, 2011
2010
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010
2009
Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic.
Proceedings of the Identity and Privacy in the Internet Age, 2009
2008
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008
2005
TCP-DR an Effective Protocol for Infrastructure based Wireless Networks.
Proceedings of the 2005 International Conference on Wireless Networks, 2005