Mohammad Ilyas

Orcid: 0000-0003-2601-0162

According to our database1, Mohammad Ilyas authored at least 51 papers between 1984 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Optimized Intrusion Detection for IoMT Networks with Tree-Based Machine Learning and Filter-Based Feature Selection.
Sensors, September, 2024

Enhancing Cybersecurity in Healthcare: Evaluating Ensemble Learning Models for Intrusion Detection in the Internet of Medical Things.
Sensors, September, 2024

Using Machine Learning Multiclass Classification Technique to Detect IoT Attacks in Real Time.
Sensors, July, 2024

Effective Feature Engineering Framework for Securing MQTT Protocol in IoT Environments.
Sensors, March, 2024

An Ensemble-Based Multi-Classification Machine Learning Classifiers Approach to Detect Multiple Classes of Cyberbullying.
Mach. Learn. Knowl. Extr., March, 2024

Enhance the Detection of DoS and Brute Force Attacks within the MQTT Environment through Feature Engineering and Employing an Ensemble Technique.
CoRR, 2024

A Machine Learning Ensemble Model for the Detection of Cyberbullying.
CoRR, 2024

2023
Deep Learning Technology to Recognize American Sign Language Alphabet.
Sensors, September, 2023

Patient-Specific Preictal Pattern-Aware Epileptic Seizure Prediction with Federated Learning.
Sensors, July, 2023

Ensemble-Learning Framework for Intrusion Detection to Enhance Internet of Things' Devices Security.
Sensors, 2023

Solar PV Wind Hybrid Energy Generation System.
Proceedings of the 6th International Conference on Contemporary Computing and Informatics, 2023

2022
A survey on artificial intelligence in histopathology image analysis.
WIREs Data Mining Knowl. Discov., 2022

Evolving Deep Learning Models for Epilepsy Diagnosis in Data Scarcity Context: A Survey.
Proceedings of the 45th International Conference on Telecommunications and Signal Processing, 2022

2020
Pervasive Communications Technologies For Managing Pandemics.
CoRR, 2020

Marker controlled superpixel nuclei segmentation and automatic counting on immunohistochemistry staining images.
Bioinform., 2020

2019
A cascade-learning approach for automated segmentation of tumour epithelium in colorectal cancer.
Expert Syst. Appl., 2019

Dual Adaptive Pyramid Network for Cross-Stain Histopathology Image Segmentation.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2019, 2019

2017
Her2 Challenge Contest: A Detailed Assessment of Automated Her2 Scoring Algorithms in Whole Slide Images of Breast Cancer Tissues.
CoRR, 2017

2016
A Pattern for Fog Computing.
Proceedings of the 10th Travelling Conference on Pattern Languages of Programs, 2016

2014
A Novel Polar Space Random Field Model for the Detection of Glandular Structures.
IEEE Trans. Medical Imaging, 2014

2013
A Semi-automatic Image Analysis Tool for Biomarker Detection in Immunohistochemistry Analysis.
Proceedings of the Seventh International Conference on Image and Graphics, 2013

The PEV security challenges to the smart grid: Analysis of threats and mitigation strategies.
Proceedings of the International Conference on Connected Vehicles and Expo, 2013

Segmenting overlapping cell nuclei in digital histopathology images.
Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2013

2012
An energy efficient model for monitoring and detecting atrial fibrillation in wearable computing.
Proceedings of the 7th International Conference on Body Area Networks, 2012

GlandVision: A Novel Polar Space Random Field Model for Glandular Biological Structure Detection.
Proceedings of the British Machine Vision Conference, 2012

2010
Secure Routing in Wireless Sensor Networks.
Proceedings of the Handbook of Information and Communication Security, 2010

An Adaptive Content Sharing Protocol for P2P Mobile Social Networks.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
Poster: An adaptive content sharing protocol for P2P Mobile Social Networks.
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2009

2008
Wireless Internet: Fundamentals.
Encyclopedia of Wireless and Mobile Communications, 2008

Wireless Sensor Networks (WSNs): Key Management Schemes.
Encyclopedia of Wireless and Mobile Communications, 2008

Smart Phones: Operating Systems.
Encyclopedia of Wireless and Mobile Communications, 2008

Smart Phones.
Encyclopedia of Wireless and Mobile Communications, 2008

Analysis of Quality of Service (QoS) in WiMAX networks.
Proceedings of the 16th International Conference on Networks, 2008

2007
Secure and efficient key management in mobile ad hoc networks.
J. Netw. Comput. Appl., 2007

2004
Towards Certificate-Based Authentication for Future Mobile Communications.
Wirel. Pers. Commun., 2004

A Note on Certificate Path Verification in Next Generation Mobile Communications.
Proceedings of the Organic and Pervasive Computing, 2004

2003
An Analytic Study of Two Probabilistic Models for Establishing <i>Ad Hoc</i> WLANs.
Inf. Technol. Manag., 2003

2001
Counter Rotating Slotted Ring: A New Architecture for Ring MANs.
J. King Saud Univ. Comput. Inf. Sci., 2001

Threshold-Based Connection Admission Control Scheme in ATM Networks: A Simulation Study.
Proceedings of the Networking, 2001

1998
An efficient multistage switching node architecture for broadband ISDNs.
Telecommun. Syst., 1998

1997
Simulation Study of the Performance of a Cluster-Based Hypercube Multicomputer.
Simul., 1997

1995
Integrated Transmission of Packetized Voice and Data on a Unidirectional Fibre Optics Bus Network.
Comput. Commun., 1995

1994
Evaluation of Multimedia Synchronization techniques.
Proceedings of the International Conference on Multimedia Computing and Systems, 1994

1992
SIMULATION: A powerful tool for prototyping telecommunications networks.
Simul., 1992

1990
Performance analysis of CSMA-CD protocols in local area bus networks.
Comput. Syst. Sci. Eng., 1990

1987
End-to-End Flow Control in Computer Networks with Noisy Channels and Quasi-Cut-Through Switching.
IEEE Trans. Computers, 1987

1986
Towards Performance Improvement of Cut-Through Switching in Computer Networks.
Perform. Evaluation, 1986

Message Delay Distributions in Store-and-Forward Computer Networks.
Proceedings of the IEEE International Conference on Communications: Integrating the World Through Communications, 1986

Performance of Token-Passing Bus Lan: A Simulation Study.
Proceedings of the IEEE International Conference on Communications: Integrating the World Through Communications, 1986

1985
Performance evaluation of computer communications networks.
IEEE Commun. Mag., 1985

1984
A Simulation Study of a New Hybrid Switching Technique for Computer Networks.
Proceedings of the IEEE International Conference on Communications: Links for the Future, 1984


  Loading...