Shamsher Ullah
Orcid: 0000-0002-8726-3123
According to our database1,
Shamsher Ullah
authored at least 26 papers
between 2017 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Homomorphic Encryption Applications for IoT and Light-Weighted Environments: A Review.
IEEE Internet Things J., January, 2025
2024
An Extended-Isomap for high-dimensional data accuracy and efficiency: a comprehensive survey.
Multim. Tools Appl., November, 2024
IOOSC-U2G: An Identity-Based Online/Offline Signcryption Scheme for Unmanned Aerial Vehicle to Ground Station Communication.
IEEE Internet Things J., September, 2024
NMal-Droid: network-based android malware detection system using transfer learning and CNN-BiGRU ensemble.
Wirel. Networks, August, 2024
Enhanced Network Intrusion Detection System for Internet of Things Security Using Multimodal Big Data Representation with Transfer Learning and Game Theory.
Sensors, July, 2024
A Scalable Federated Learning Approach for Collaborative Smart Healthcare Systems With Intermittent Clients Using Medical Imaging.
IEEE J. Biomed. Health Informatics, June, 2024
NIDS-VSB: Network Intrusion Detection System for VANET Using Spark-Based Big Data Optimization and Transfer Learning.
IEEE Trans. Consumer Electron., February, 2024
Privacy-Preserving Federated Learning Approach for Distributed Malware Attacks With Intermittent Clients and Image Representation.
IEEE Trans. Consumer Electron., February, 2024
The revolution and vision of explainable AI for Android malware detection and protection.
Internet Things, 2024
IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic.
Digit. Commun. Networks, 2024
An investigating study of blind and ID-based signcryption schemes for misuse risk protection and high performance computing.
Clust. Comput., 2024
Homomorphic Cryptography Authentication Scheme to Eliminate Machine Tools Gaps in Industry 4.0.
Proceedings of the Advanced Information Networking and Applications, 2024
2023
TORAS: Trustworthy Load-Balanced Opportunistic Routing for Asynchronous Duty-Cycled WSNs.
IEEE Syst. J., June, 2023
Droid-MCFG: Android malware detection system using manifest and control flow traces with multi-head temporal convolutional network.
Phys. Commun., April, 2023
Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey.
Comput. Sci. Rev., February, 2023
Int. J. Inf. Sec., 2023
A Survey on X.509 Public-Key Infrastructure, Certificate Revocation, and Their Modern Implementation on Blockchain and Ledger Technologies.
IEEE Commun. Surv. Tutorials, 2023
2022
Cyber-Threat Detection System Using a Hybrid Approach of Transfer Learning and Multi-Model Image Representation.
Sensors, 2022
QuSigS: A quantum Signcryption scheme to recover key escrow problem and key revocation problem in cloud computing.
Multim. Tools Appl., 2022
A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization.
J. Cloud Comput., 2022
A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments.
J. Inf. Secur. Appl., 2022
2021
Peer-to-Peer Netw. Appl., 2021
Neural Process. Lett., 2021
2020
2019
2017
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017