Muhammad Zubair Shafiq
Applied Filters
- Muhammad Zubair Shafiq
- AuthorRemove filter
People
Colleagues
- Alex X Liu (19)
- Muddassar Farooq (14)
- Lusheng Ji (11)
- Jia Wang (10)
- Jeffrey Anson Pang (9)
- Zhihong Tian (7)
- Shah Nazir (6)
- Muhammad Azeem Akbar (5)
- S Momina Tabish (5)
- Zhaoquan Gu (5)
- Amir Reza Khakpour (4)
- Habibullah Khan (4)
- Syed Ali Khayam (4)
- Xiangzhan Yu (4)
- Ahmed Alsanad (3)
- Mohammad Kamrul Hasan (3)
- Sajjad Mahmood (3)
- Shayla Islam (3)
- Shobha Venkataraman (3)
Roles
Publication
Journal/Magazine Names
- ACM SIGMETRICS Performance Evaluation Review (5)
- Security and Communication Networks (5)
- Scientific Programming (4)
- Wireless Communications & Mobile Computing (4)
- Complexity (3)
- Computers and Electrical Engineering (3)
- IEEE Transactions on Consumer Electronics (3)
- IEEE/ACM Transactions on Networking (3)
- Computational Intelligence and Neuroscience (2)
- Soft Computing - A Fusion of Foundations, Methodologies and Applications (2)
- The Journal of Supercomputing (2)
- CAAI Transactions on Intelligence Technology (1)
- Computer Communications (1)
- Future Generation Computer Systems (1)
- Fuzzy Sets and Systems (1)
- IEEE Network: The Magazine of Global Internetworking (1)
- IEEE Transactions on Mobile Computing (1)
Proceedings/Book Names
- EASE '20: Proceedings of the 24th International Conference on Evaluation and Assessment in Software Engineering (3)
- RAID '09: Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection (3)
- GECCO '09: Proceedings of the 11th Annual conference on Genetic and evolutionary computation (2)
- SIGMETRICS '14: The 2014 ACM international conference on Measurement and modeling of computer systems (2)
- AIAP'07: Proceedings of the 25th conference on Proceedings of the 25th IASTED International Multi-Conference: artificial intelligence and applications (1)
- AISec '09: Proceedings of the 2nd ACM workshop on Security and artificial intelligence (1)
- Artificial Intelligence and Security (1)
- CISP '08: Proceedings of the 2008 Congress on Image and Signal Processing, Vol. 1 - Volume 01 (1)
- CoNEXT Student Workhop '13: Proceedings of the 2013 workshop on Student workhop (1)
- CSCW '13: Proceedings of the 2013 conference on Computer supported cooperative work (1)
- CSI-KDD '09: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics (1)
- DIMVA '08: Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment (1)
- GECCO '07: Proceedings of the 9th annual conference on Genetic and evolutionary computation (1)
- GECCO '08: Proceedings of the 10th annual conference on Genetic and evolutionary computation (1)
- GECCO '09: Proceedings of the 11th Annual Conference Companion on Genetic and Evolutionary Computation Conference: Late Breaking Papers (1)
- HotNets-XII: Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks (1)
- IMC '14: Proceedings of the 2014 Conference on Internet Measurement Conference (1)
- SIGMETRICS '11: Proceedings of the ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems (1)
- SIGMETRICS '12: Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE joint international conference on Measurement and Modeling of Computer Systems (1)
- SIGMETRICS '13: Proceedings of the ACM SIGMETRICS/international conference on Measurement and modeling of computer systems (1)
Publisher
- Association for Computing Machinery (25)
- Springer-Verlag (12)
- IEEE Press (10)
- John Wiley & Sons, Inc. (10)
- Hindawi Limited (6)
- John Wiley and Sons Ltd. (4)
- Elsevier Science Publishers B. V. (3)
- Pergamon Press, Inc. (3)
- IEEE Computer Society (2)
- IOS Press (2)
- Kluwer Academic Publishers (2)
- ACTA Press (1)
- Elsevier North-Holland, Inc. (1)
- Elsevier Science Inc. (1)
- IEEE Computer Society Press (1)
- IEEE Educational Activities Department (1)
- Plenum Press (1)
Publication Date
Export Citations
Publications
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- retraction
Retraction Note: Identification and prioritization of DevOps success factors using fuzzy-AHP approach
- Muhammad Azeem Akbar
https://ror.org/01scyh794College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, People’s Republic of China
, - Sajjad Mahmood
https://ror.org/03yez3163Information and Computer Science Department, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia
, - Muhammad Shafiq
https://ror.org/03dgaqz26School of Computer Science and Technology, Chongqing University of Posts and Telecommunications, 400065, Chongqing, China
, - Ahmed Alsanad
https://ror.org/02f81g417Research Chair of Artificial Intelligence (RCAI), Department of Information Systems, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia
, - Abeer Abdul-Aziz Alsanad
https://ror.org/05gxjyb39Information Systems Department, College of Computer and Information Sciences, Imam Muhammad Ibn-Saud Islamic University, Riyadh, Saudi Arabia
, - Abdu Gumaei
https://ror.org/02f81g417Research Chair of Artificial Intelligence (RCAI), Department of Information Systems, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia
Soft Computing - A Fusion of Foundations, Methodologies and Applications, Volume 28, Issue Suppl 1•Nov 2024, pp 405-405 • https://doi.org/10.1007/s00500-024-10166-7- 0Citation
MetricsTotal Citations0
- Muhammad Azeem Akbar
- research-article
ESC&RAO: Enabling Seamless Connectivity Resource Allocation in Tactile IoT for Consumer Electronics
- Muhammad Shafiq
Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China
, - Zhihong Tian
Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China
, - Yuan Liu
Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China
, - Ahamed Aljuhani
Department of Computer Engineering, Faculty of Computers and Information Technology, University of Tabuk, Tabuk, Saudi Arabia
, - Yang Li
College of Mechanical and Electrical Engineering, Shihezi University, Shihezi, China
IEEE Transactions on Consumer Electronics, Volume 70, Issue 3•Aug. 2024, pp 5506-5515 • https://doi.org/10.1109/TCE.2023.3327136In the emerging era of the tactile Internet of Things (IoT) for consumer electronics, achieving seamless connectivity and efficient resource allocation poses critical challenges. To address these challenges and enhance resource allocation in tactile IoT ...
- 0Citation
MetricsTotal Citations0
- Muhammad Shafiq
- research-article
DNN Inference Acceleration for Smart Devices in Industry 5.0 by Decentralized Deep Reinforcement Learning
- Chongwu Dong
Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China
, - Muhammad Shafiq
Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China
, - Maryam M. Al Dabel
Department of Computer Science and Engineering, College of Computer Science and Engineering, University of Hafr Al Batin, Hafr Al Batin, Saudi Arabia
, - Yanbin Sun
Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China
, - Zhihong Tian
Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China
IEEE Transactions on Consumer Electronics, Volume 70, Issue 1•Feb. 2024, pp 1519-1530 • https://doi.org/10.1109/TCE.2023.3339468With the emergence of Industry 5.0, there has been a significant surge in the need for intelligent services within the realm of smart devices. Currently, deep neural networks (DNNs) have become the predominant technology in driving advancements in ...
- 0Citation
MetricsTotal Citations0
- Chongwu Dong
- research-article
CoopGBFS: A Federated Learning and Game-Theoretic-Based Approach for Personalized Security, Recommendation in 5G Beyond IoT Environments for Consumer Electronics
- Muhammad Shafiq
Department of Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China
, - Rahul Yadav
College of Computer Science and Technology, Harbin Engineering University, Harbin, China
, - Abdul Rehman Javed
Department of Electrical and Computer Engineering, Lebanese American University, Byblos, Lebanon
, - Syed Agha Hussnain Mohsan
Optical Communications Laboratory, Ocean College, Zhejiang University, Zhoushan, China
IEEE Transactions on Consumer Electronics, Volume 70, Issue 1•Feb. 2024, pp 2648-2656 • https://doi.org/10.1109/TCE.2023.3305508In 5G IoT for consumer electronics security recommendation systems, Machine Learning (ML) based Federated Learning (FL) methods plays an important for the detection of cyberattacks. For this objective, several different models for effective feature ...
- 3Citation
MetricsTotal Citations3
- Muhammad Shafiq
- research-article
Diverse classifiers with label dependencies for long-tail relation extraction in big data
- Jing Qiu
Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China
, - Yang Lin
Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China
, - Hao Chen
Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China
, - Du Cheng
Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China
, - Muhammad Shafiq
Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China
, - Lejun Zhang
Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China
, - Zhihong Tian
Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China
Computers and Electrical Engineering, Volume 110, Issue C•Sep 2023 • https://doi.org/10.1016/j.compeleceng.2023.108812AbstractRelation extraction is a critical step in knowledge recommendation for big data, but long-tailed distribution in real-world relations presents a significant challenge. Most relations fail to gather enough training instances, which forms a long ...
- 0Citation
MetricsTotal Citations0
- Jing Qiu
- research-article
FLPK-BiSeNet: Federated Learning Based on Priori Knowledge and Bilateral Segmentation Network for Image Edge Extraction
- Lin Teng
College of Information and Communications Engineering, Harbin Engineering University, Harbin, China
, - Yulong Qiao
College of Information and Communications Engineering, Harbin Engineering University, Harbin, China
, - Muhammad Shafiq
Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China
, - Gautam Srivastava
Department of Mathematics and Computer Science, Brandon University, Brandon, MB, Canada
, - Abdul Rehman Javed
Department of Cyber Security, Air University, Islamabad, Pakistan
, - Thippa Reddy Gadekallu
Department of Electrical and Computer Engineering, Lebanese American University, Byblos, Lebanon
, - Shoulin Yin
College of Information and Communications Engineering, Harbin Engineering University, Harbin, China
IEEE Transactions on Network and Service Management, Volume 20, Issue 2•June 2023, pp 1529-1542 • https://doi.org/10.1109/TNSM.2023.3273991Federated learning can effectively ensure data security and improve the problem of data islanding. However, the performance of federated learning-based schemes could be better due to the imbalance of image data. Therefore, this paper proposes a federated ...
- 3Citation
MetricsTotal Citations3
- Lin Teng
- research-article
Efficient distributed broadcasting algorithms for cognitive radio networks-enabled smart agriculture
- Zhaoquan Gu
School of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, China
Department of New Networks, Peng Cheng Laboratory, Shenzhen, China
, - Huan Zhang
Department of New Networks, Peng Cheng Laboratory, Shenzhen, China
Cyberspace Institute of Advanced Technology, Guangzhou University, GuangZhou, China
, - Le Wang
Department of New Networks, Peng Cheng Laboratory, Shenzhen, China
Cyberspace Institute of Advanced Technology, Guangzhou University, GuangZhou, China
, - Muhammad Shafiq
Cyberspace Institute of Advanced Technology, Guangzhou University, GuangZhou, China
, - Kai Jin
School of Intelligent Systems Engineering, Sun Yat-Sen University, Shenzhen, China
Computers and Electrical Engineering, Volume 108, Issue C•May 2023 • https://doi.org/10.1016/j.compeleceng.2023.108690AbstractSmart agriculture has a broad prospect with the fast development of information technologies, such as Internet of Things, big data, edge computing and artificial intelligence. As more intelligent devices are deployed for agricultural scenarios, ...
- 0Citation
MetricsTotal Citations0
- Zhaoquan Gu
- research-article
Cybersecurity knowledge graph enabled attack chain detection for cyber-physical systems
- Yulu Qi
Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China
School of Computer, National University of Defense Technology, Changsha, China
, - Zhaoquan Gu
Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China
, - Aiping Li
School of Computer, National University of Defense Technology, Changsha, China
, - Xiaojuan Zhang
China Electric Power Research Institute, Information & Communication Department, Beijing, China
, - Muhammad Shafiq
Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China
, - Yangyang Mei
Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China
, - Kaihan Lin
Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China
Computers and Electrical Engineering, Volume 108, Issue C•May 2023 • https://doi.org/10.1016/j.compeleceng.2023.108660AbstractThe Cyber-Physical System covers a wide range of applications, many of which are involved in critical infrastructure, and the cybersecurity attacks on them become more and more threatening. Currently, most of the comprehensive analysis of ...
- 6Citation
MetricsTotal Citations6
- Yulu Qi
- research-articleOpen Access
Privacy‐preserving remote sensing images recognition based on limited visual cryptography
- Denghui Zhang
Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou China
Department of New Networks Peng Cheng Laboratory Shenzhen China
, - Muhammad Shafiq
Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou China
, - Liguo Wang
College of Information and Communications Engineering Dalian Minzu University Dalian China
, - Gautam Srivastava
Department of Mathematics and Computer Science Brandon University Brandon Manitoba Canada
Research Centre for Interneural Computing China Medical University Taichung Taiwan China
Department of Computer Science and Math Lebanese American University Beirut Lebanon
, - Shoulin Yin
College of Information and Communications Engineering Harbin Engineering University Harbin China
CAAI Transactions on Intelligence Technology, Volume 8, Issue 4•December 2023, pp 1166-1177 • https://doi.org/10.1049/cit2.12164AbstractWith the arrival of new data acquisition platforms derived from the Internet of Things (IoT), this paper goes beyond the understanding of traditional remote sensing technologies. Deep fusion of remote sensing and computer vision has hit the ...
- 0Citation
MetricsTotal Citations0
- Denghui Zhang
- research-article
A Privacy Protection Framework for Medical Image Security without Key Dependency Based on Visual Cryptography and Trusted Computing
- Inam Ullah,
- Denghui Zhang
Cyberspace Institute of Advanced TechnologyGuangzhou UniversityGuangzhou 510000Chinagzhu.edu.cn
Department of New NetworksPeng Cheng LaboratoryShenzhen 518055Chinapcl.ac.cn
, - Lijing Ren
Department of New NetworksPeng Cheng LaboratoryShenzhen 518055Chinapcl.ac.cn
, - Muhammad Shafiq
Cyberspace Institute of Advanced TechnologyGuangzhou UniversityGuangzhou 510000Chinagzhu.edu.cn
, - Zhaoquan Gu
Department of New NetworksPeng Cheng LaboratoryShenzhen 518055Chinapcl.ac.cn
School of Computer Science and TechnologyHarbin Institute of Technology (Shenzhen)Shenzhen 518055Chinahitsz.edu.cn
Computational Intelligence and Neuroscience, Volume 2023•2023 • https://doi.org/10.1155/2023/6758406The development of mobile Internet and the popularization of intelligent sensor devices greatly facilitate the generation and transmission of massive multimedia data including medical images and pathological models on the open network. The popularity of ...
- 0Citation
MetricsTotal Citations0
- research-article
Medical Specialty Classification Based on Semiadversarial Data Augmentation
- Carmen De Maio,
- Huan Zhang
Cyberspace Institute of Advanced TechnologyGuangzhou UniversityGuangzhouChinagzhu.edu.cn
Department of New NetworksPeng Cheng LaboratoryShenzhenChinapcl.ac.cn
, - Dong Zhu
Cyberspace Institute of Advanced TechnologyGuangzhou UniversityGuangzhouChinagzhu.edu.cn
, - Hao Tan
Cyberspace Institute of Advanced TechnologyGuangzhou UniversityGuangzhouChinagzhu.edu.cn
Department of New NetworksPeng Cheng LaboratoryShenzhenChinapcl.ac.cn
, - Muhammad Shafiq
Cyberspace Institute of Advanced TechnologyGuangzhou UniversityGuangzhouChinagzhu.edu.cn
, - Zhaoquan Gu
Department of New NetworksPeng Cheng LaboratoryShenzhenChinapcl.ac.cn
School of Computer Science and TechnologyHarbin Institute of Technology (Shenzhen)ShenzhenChinahitsz.edu.cn
Computational Intelligence and Neuroscience, Volume 2023•2023 • https://doi.org/10.1155/2023/4919371Rapidly increasing adoption of electronic health record (EHR) systems has caused automated medical specialty classification to become an important research field. Medical specialty classification not only improves EHR system retrieval efficiency and helps ...
- 0Citation
MetricsTotal Citations0
- Article
New Generation Power System Security Protection Technology Based on Dynamic Defense
- Xiaowei Chen
Shenzhen Power Supply Bureau Co. Ltd., 518001, Shenzhen, China
, - Hefang Jiang
Shenzhen Power Supply Bureau Co. Ltd., 518001, Shenzhen, China
, - Shaocheng Wu
Shenzhen Power Supply Bureau Co. Ltd., 518001, Shenzhen, China
, - Tao Liu
Shenzhen Power Supply Bureau Co. Ltd., 518001, Shenzhen, China
, - Tong An
School of Cyberspace Security, Beijing University of Posts and Telecommunications, 100876, Beijing, China
, - Zhongwei Xu
School of Cyberspace Security, Beijing University of Posts and Telecommunications, 100876, Beijing, China
, - Man Zhang
Peng Cheng Laboratory, 518055, Shenzhen, China
, - Muhammad Shafiq
Cyberspace Institute of Advanced Technology, Guangzhou University, 510006, Guangzhou, China
Artificial Intelligence and Security•July 2022, pp 710-721• https://doi.org/10.1007/978-3-031-06791-4_56AbstractWith the development of power information systems and the evolution of attack means, the traditional security protection scheme is difficult to deal with the increasing network attacks. In order to deal with the increasingly severe security risks, ...
- 0Citation
MetricsTotal Citations0
- Xiaowei Chen
- research-article
Large-Capacity Local Multi-Dimensional Information Hiding Method for 6G Networks
- Mianjie Li
Guangdong Polytechnic Normal University,China
, - Wei Shi
Carleton University,Canada
, - Fusheng Zhu
Guangdong New Generation Communication and Network Innovative Institute (GDCNi),China
, - Zhihong Tian
Guangzhou University,China
, - Muhammad Shafiq
Guangzhou University,China
, - Zhiyong Luo
SUN YAT-SEN University,China
, - Chun Shan
Guangdong Polytechnic Normal University,China
IEEE Network: The Magazine of Global Internetworking, Volume 36, Issue 4•July/August 2022, pp 160-165 • https://doi.org/10.1109/MNET.001.2100412A 6G network is not only faster, but also offers a wider range of services than 5G networks, which will lead to an increased number of participants. However, combined with the Internet of Everything, 6G networks face security issues such as man-in-the-...
- 0Citation
MetricsTotal Citations0
- Mianjie Li
- editorial
Identification of Attack Traffic Using Machine Learning in Smart IoT Networks
- Shah Nazir
University of SwabiSwabiPakistanuoswabi.edu.pk
, - Xiangzhan Yu
Harbin Institute of TechnologyHarbinChinahit.edu.cn
, - Muhammad Shafiq
Guangzhou UniversityGuangzhouChinagzhu.edu.cn
- 0Citation
MetricsTotal Citations0
- Shah Nazir
- research-article
Artificial Intelligence Enabled Effective Fault Prediction Techniques in Cloud Computing Environment for Improving Resource Optimization
- Punit Gupta,
- Junaid Hussain Abro
School of Computer Science and Artificial Intelligence Wuhan University of Technology Wuhan 430063 China whut.edu.cn
, - Chunlin Li
School of Computer Science and Artificial Intelligence Wuhan University of Technology Wuhan 430063 China whut.edu.cn
, - Muhammad Shafiq
School of Computer Science and Artificial Intelligence Wuhan University of Technology Wuhan 430063 China whut.edu.cn
, - A. Vishnukumar
School of Information Engineering Qujing Normal University Yunnan China qjnu.edu.cn
, - Shivlal Mewada
Dept. of Computer Science Government College Makdone (Vikram University) Ujjain India vikram.mponline.gov.in
, - Kamlesh Malpani
Shri Vaishnav Institute of Management Indore India
, - Jonathan Osei-Owusu
Department of Biological Physical and Mathematical Sciences University of Environment and Sustainable Development Somanya Ghana
The bulk of the fault tolerance techniques that are in use today laid their primary emphasis, in the event that a virtual machine fails, on the production of clones to replace it, rather than on the early prediction of the failure itself in advance. ...
- 0Citation
MetricsTotal Citations0
- research-article
Analyzing IoT Attack Feature Association with Threat Actors
- Barbara Guidi,
- Muhammad Shafiq
Cyberspace Institute of Advanced TechnologyGuangzhou UniversityGuangzhouChina510006gzhu.edu.cn
, - Zhaoquan Gu
Cyberspace Institute of Advanced TechnologyGuangzhou UniversityGuangzhouChina510006gzhu.edu.cn
, - Shah Nazir
Department of Computer Science University of SwabiPakistan
, - Rahul Yadav
Peng Cheng LaboratoryShenzhenChinapcl.ac.cn
Internet of Things (IoT) refers to the interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data. These devices can be controlled remotely, which makes them susceptible to exploitation or ...
- 0Citation
MetricsTotal Citations0
- research-article
A New V-Net Convolutional Neural Network Based on Four-Dimensional Hyperchaotic System for Medical Image Encryption
- Celestine Iwendi,
- Xiaowei Wang
Software CollegeShenyang Normal UniversityShenyangChinasynu.edu.cn
, - Shoulin Yin
Software CollegeShenyang Normal UniversityShenyangChinasynu.edu.cn
, - Muhammad Shafiq
Cyberspace Institute of Advanced TechnologyGuangzhou UniversityGuangzhouChinagzhu.edu.cn
, - Asif Ali Laghari
Department of Computer ScienceSindh Madressatul Islam UniversityKarachiPakistan
, - Shahid Karim
Faculty of Science and TechnologyILMA UniversityKarachiPakistan
, - Omar Cheikhrouhou
CES LaboratoryNational School of Engineers of SfaxUniversity of SfaxSfax 3038Tunisiafss.rnu.tn
Higher Institute of Computer Science of MahdiaUniversity of MonastirMahdia 5111Tunisiaum.rnu.tn
, - Wajdi Alhakami
Department of Information TechnologyCollege of Computers and Information TechnologyTaif UniversityTaifSaudi Arabiatu.edu.sa
, - Habib Hamam
Faculty of EngineeringMoncton UniversityMonctonNB E1A3E9Canada
Spectrum of Knowledge Production & Skills DevelopmentSfax 3027Tunisia
School of Electrical EngineeringDepartment of Electrical and Electronic Engineering ScienceUniversity of JohannesburgJohannesburg 2006South Africauj.ac.za
In the transmission of medical images, if the image is not processed, it is very likely to leak data and personal privacy, resulting in unpredictable consequences. Traditional encryption algorithms have limited ability to deal with complex data. The ...
- 3Citation
MetricsTotal Citations3
- rapid-communication
An improved watermarking algorithm for robustness and imperceptibility of data protection in the perception layer of internet of things
- Mohammad Kamrul Hasan
Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia (UKM), 43600 Bangi, Malaysia
, - Samar Kamil
Department Computer Science and Information systems -Al-Mansour University College-Al Andalus SQ, 10067 Baghdad Iraq
, - Muhammad Shafiq
Cyberspace Institute of Advanced Technology, Guangzhou University, China
, - Yuvaraj S
Department of Electronics and Communication Engineering, SRM Institute of Sceince and Technology, Kattankulathur, India
, - E. Saravana Kumar
Department of Computer Science and Engineering, The Oxford College of Engineering, Bengaluru, Karnataka, India
, - Rajiv Vincent
School of computer science and engineering, Vellore Institute of Technology -Chennai, Tamilnadu, India
, - Nazmus Shaker Nafi
School of IT and Telecommunication Engineering, Melbourne Institute of Technology, Melbourne, Australia
Pattern Recognition Letters, Volume 152, Issue C•Dec 2021, pp 283-294 • https://doi.org/10.1016/j.patrec.2021.10.032AbstractEmergence of Internet of Things (IoT) and modern digital applications such as digital financial services and deliveries make it easy to reproduce and re-distribute digital contents thus give room to so many copyright violations of illegal use of ...
- 1Citation
MetricsTotal Citations1
- Mohammad Kamrul Hasan
- research-article
Constriction Factor Particle Swarm Optimization based load balancing and cell association for 5G heterogeneous networks
- Mohammad Kamrul Hasan
Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia (UKM), 43600 Bangi, Selangor, Malaysia
, - Teong Chee Chuah
Faculty of Engineering, Multimedia University, 63100 Cyberjaya, Selangor, Malaysia
, - Ayman A. El-Saleh
Department of Electronics and Communication Engineering, A’Sharqiyah University, 400 Ibra, Sultanate of Oman
, - Muhammad Shafiq
Cyberspace Institute of Advanced Technology, Guanghzou University, China
, - Shoaib Ahmed Shaikh
Electrical Engineering Department, Sukkur IBA University, Sindh, Pakistan
, - Shayla Islam
Institute of Computer Science and Digital Innovation, UCSI University Malaysia, 56000 Kuala Lumpur, Malaysia
, - Moez Krichen
Faculty of CSIT, Al-Baha University, Saudi Arabia
ReDCAD Laboratory, University of Sfax, Tunisia
Computer Communications, Volume 180, Issue C•Dec 2021, pp 328-337 • https://doi.org/10.1016/j.comcom.2021.10.021AbstractWith the rapidly growing traffic demand, the cellular industry is moving toward heterogeneity to fulfill the heavy traffic requirement. The existing heterogeneous networks are comprised of the Long-Term Evolution (LTE), LTE-Advanced (...
Graphical abstractDisplay Omitted
Highlights- Cell association and load balancing issues deteriorate throughput and outage.
- ...
- 2Citation
MetricsTotal Citations2
- Mohammad Kamrul Hasan
- research-article
Communication Delay Modeling for Wide Area Measurement System in Smart Grid Internet of Things Networks
- Rahim Khan,
- Mohammad Kamrul Hasan
Center for Cyber SecurityFaculty of Information Science and TechnologyUniversiti Kebangsaan Malaysia (UKM)43600 BangiSelangorMalaysiaukm.my
, - Shayla Islam
Institute of Computer Science and Digital InnovationUCSI University Malaysia56000 Kuala LumpurMalaysia
, - Muhammad Shafiq
Cyberspace Institute of Advanced TechnologyGuangzhou UniversityChinagzhu.edu.cn
, - Fatima Rayan Awad Ahmed
Computer Science DepartmentCollege of Computer Engineering & Science1Prince Sattam Bin Abdulaziz UniversityAlkharj 11942Saudi Arabiapsau.edu.sa
, - Somya Khidir Mohmmed Ataelmanan
Computer Science DepartmentCollege of Computer Engineering & Science1Prince Sattam Bin Abdulaziz UniversityAlkharj 11942Saudi Arabiapsau.edu.sa
, - Nissrein Babiker Mohammed Babiker
Information System DepartmentCollege of Science and ArtsBisha UniversityP.O Box 551Bisha 61922Saudi Arabiakku.edu.sa
, - Khairul Azmi Abu Bakar
Center for Cyber SecurityFaculty of Information Science and TechnologyUniversiti Kebangsaan Malaysia (UKM)43600 BangiSelangorMalaysiaukm.my
We present communication frameworks, models, and protocols of smart grid Internet of Things (IoT) networks based on the IEEE and IEC standards. The measurement, control, and monitoring of grid being achieved through phasor measurement unit (PMU) based ...
- 2Citation
MetricsTotal Citations2
Author Profile Pages
- Description: The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM bibliographic database, the Guide. Coverage of ACM publications is comprehensive from the 1950's. Coverage of other publishers generally starts in the mid 1980's. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community.
Please see the following 2007 Turing Award winners' profiles as examples: - History: Disambiguation of author names is of course required for precise identification of all the works, and only those works, by a unique individual. Of equal importance to ACM, author name normalization is also one critical prerequisite to building accurate citation and download statistics. For the past several years, ACM has worked to normalize author names, expand reference capture, and gather detailed usage statistics, all intended to provide the community with a robust set of publication metrics. The Author Profile Pages reveal the first result of these efforts.
- Normalization: ACM uses normalization algorithms to weigh several types of evidence for merging and splitting names.
These include:- co-authors: if we have two names and cannot disambiguate them based on name alone, then we see if they have a co-author in common. If so, this weighs towards the two names being the same person.
- affiliations: names in common with same affiliation weighs toward the two names being the same person.
- publication title: names in common whose works are published in same journal weighs toward the two names being the same person.
- keywords: names in common whose works address the same subject matter as determined from title and keywords, weigh toward being the same person.
The more conservative the merging algorithms, the more bits of evidence are required before a merge is made, resulting in greater precision but lower recall of works for a given Author Profile. Many bibliographic records have only author initials. Many names lack affiliations. With very common family names, typical in Asia, more liberal algorithms result in mistaken merges.
Automatic normalization of author names is not exact. Hence it is clear that manual intervention based on human knowledge is required to perfect algorithmic results. ACM is meeting this challenge, continuing to work to improve the automated merges by tweaking the weighting of the evidence in light of experience.
- Bibliometrics: In 1926, Alfred Lotka formulated his power law (known as Lotka's Law) describing the frequency of publication by authors in a given field. According to this bibliometric law of scientific productivity, only a very small percentage (~6%) of authors in a field will produce more than 10 articles while the majority (perhaps 60%) will have but a single article published. With ACM's first cut at author name normalization in place, the distribution of our authors with 1, 2, 3..n publications does not match Lotka's Law precisely, but neither is the distribution curve far off. For a definition of ACM's first set of publication statistics, see Bibliometrics
- Future Direction:
The initial release of the Author Edit Screen is open to anyone in the community with an ACM account, but it is limited to personal information. An author's photograph, a Home Page URL, and an email may be added, deleted or edited. Changes are reviewed before they are made available on the live site.
ACM will expand this edit facility to accommodate more types of data and facilitate ease of community participation with appropriate safeguards. In particular, authors or members of the community will be able to indicate works in their profile that do not belong there and merge others that do belong but are currently missing.
A direct search interface for Author Profiles will be built.
An institutional view of works emerging from their faculty and researchers will be provided along with a relevant set of metrics.
It is possible, too, that the Author Profile page may evolve to allow interested authors to upload unpublished professional materials to an area available for search and free educational use, but distinct from the ACM Digital Library proper. It is hard to predict what shape such an area for user-generated content may take, but it carries interesting potential for input from the community.
Bibliometrics
The ACM DL is a comprehensive repository of publications from the entire field of computing.
It is ACM's intention to make the derivation of any publication statistics it generates clear to the user.
- Average citations per article = The total Citation Count divided by the total Publication Count.
- Citation Count = cumulative total number of times all authored works by this author were cited by other works within ACM's bibliographic database. Almost all reference lists in articles published by ACM have been captured. References lists from other publishers are less well-represented in the database. Unresolved references are not included in the Citation Count. The Citation Count is citations TO any type of work, but the references counted are only FROM journal and proceedings articles. Reference lists from books, dissertations, and technical reports have not generally been captured in the database. (Citation Counts for individual works are displayed with the individual record listed on the Author Page.)
- Publication Count = all works of any genre within the universe of ACM's bibliographic database of computing literature of which this person was an author. Works where the person has role as editor, advisor, chair, etc. are listed on the page but are not part of the Publication Count.
- Publication Years = the span from the earliest year of publication on a work by this author to the most recent year of publication of a work by this author captured within the ACM bibliographic database of computing literature (The ACM Guide to Computing Literature, also known as "the Guide".
- Available for download = the total number of works by this author whose full texts may be downloaded from an ACM full-text article server. Downloads from external full-text sources linked to from within the ACM bibliographic space are not counted as 'available for download'.
- Average downloads per article = The total number of cumulative downloads divided by the number of articles (including multimedia objects) available for download from ACM's servers.
- Downloads (cumulative) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server since the downloads were first counted in May 2003. The counts displayed are updated monthly and are therefore 0-31 days behind the current date. Robotic activity is scrubbed from the download statistics.
- Downloads (12 months) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 12-month period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (12-month download counts for individual works are displayed with the individual record.)
- Downloads (6 weeks) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 6-week period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (6-week download counts for individual works are displayed with the individual record.)
ACM Author-Izer Service
Summary Description
ACM Author-Izer is a unique service that enables ACM authors to generate and post links on both their homepage and institutional repository for visitors to download the definitive version of their articles from the ACM Digital Library at no charge.
Downloads from these sites are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to definitive version of ACM articles should reduce user confusion over article versioning.
ACM Author-Izer also extends ACM’s reputation as an innovative “Green Path” publisher, making ACM one of the first publishers of scholarly works to offer this model to its authors.
To access ACM Author-Izer, authors need to establish a free ACM web account. Should authors change institutions or sites, they can utilize the new ACM service to disable old links and re-authorize new links for free downloads from a different site.
How ACM Author-Izer Works
Authors may post ACM Author-Izer links in their own bibliographies maintained on their website and their own institution’s repository. The links take visitors to your page directly to the definitive version of individual articles inside the ACM Digital Library to download these articles for free.
The Service can be applied to all the articles you have ever published with ACM.
Depending on your previous activities within the ACM DL, you may need to take up to three steps to use ACM Author-Izer.
For authors who do not have a free ACM Web Account:
- Go to the ACM DL http://dl.acm.org/ and click SIGN UP. Once your account is established, proceed to next step.
For authors who have an ACM web account, but have not edited their ACM Author Profile page:
- Sign in to your ACM web account and go to your Author Profile page. Click "Add personal information" and add photograph, homepage address, etc. Click ADD AUTHOR INFORMATION to submit change. Once you receive email notification that your changes were accepted, you may utilize ACM Author-izer.
For authors who have an account and have already edited their Profile Page:
- Sign in to your ACM web account, go to your Author Profile page in the Digital Library, look for the ACM Author-izer link below each ACM published article, and begin the authorization process. If you have published many ACM articles, you may find a batch Authorization process useful. It is labeled: "Export as: ACM Author-Izer Service"
ACM Author-Izer also provides code snippets for authors to display download and citation statistics for each “authorized” article on their personal pages. Downloads from these pages are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to the definitive version of ACM articles should reduce user confusion over article versioning.
Note: You still retain the right to post your author-prepared preprint versions on your home pages and in your institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library. But any download of your preprint versions will not be counted in ACM usage statistics. If you use these AUTHOR-IZER links instead, usage by visitors to your page will be recorded in the ACM Digital Library and displayed on your page.
FAQ
- Q. What is ACM Author-Izer?
A. ACM Author-Izer is a unique, link-based, self-archiving service that enables ACM authors to generate and post links on either their home page or institutional repository for visitors to download the definitive version of their articles for free.
- Q. What articles are eligible for ACM Author-Izer?
- A. ACM Author-Izer can be applied to all the articles authors have ever published with ACM. It is also available to authors who will have articles published in ACM publications in the future.
- Q. Are there any restrictions on authors to use this service?
- A. No. An author does not need to subscribe to the ACM Digital Library nor even be a member of ACM.
- Q. What are the requirements to use this service?
- A. To access ACM Author-Izer, authors need to have a free ACM web account, must have an ACM Author Profile page in the Digital Library, and must take ownership of their Author Profile page.
- Q. What is an ACM Author Profile Page?
- A. The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM Digital Library. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community. Please visit the ACM Author Profile documentation page for more background information on these pages.
- Q. How do I find my Author Profile page and take ownership?
- A. You will need to take the following steps:
- Create a free ACM Web Account
- Sign-In to the ACM Digital Library
- Find your Author Profile Page by searching the ACM Digital Library for your name
- Find the result you authored (where your author name is a clickable link)
- Click on your name to go to the Author Profile Page
- Click the "Add Personal Information" link on the Author Profile Page
- Wait for ACM review and approval; generally less than 24 hours
- Q. Why does my photo not appear?
- A. Make sure that the image you submit is in .jpg or .gif format and that the file name does not contain special characters
- Q. What if I cannot find the Add Personal Information function on my author page?
- A. The ACM account linked to your profile page is different than the one you are logged into. Please logout and login to the account associated with your Author Profile Page.
- Q. What happens if an author changes the location of his bibliography or moves to a new institution?
- A. Should authors change institutions or sites, they can utilize ACM Author-Izer to disable old links and re-authorize new links for free downloads from a new location.
- Q. What happens if an author provides a URL that redirects to the author’s personal bibliography page?
- A. The service will not provide a free download from the ACM Digital Library. Instead the person who uses that link will simply go to the Citation Page for that article in the ACM Digital Library where the article may be accessed under the usual subscription rules.
However, if the author provides the target page URL, any link that redirects to that target page will enable a free download from the Service.
- Q. What happens if the author’s bibliography lives on a page with several aliases?
- A. Only one alias will work, whichever one is registered as the page containing the author’s bibliography. ACM has no technical solution to this problem at this time.
- Q. Why should authors use ACM Author-Izer?
- A. ACM Author-Izer lets visitors to authors’ personal home pages download articles for no charge from the ACM Digital Library. It allows authors to dynamically display real-time download and citation statistics for each “authorized” article on their personal site.
- Q. Does ACM Author-Izer provide benefits for authors?
- A. Downloads of definitive articles via Author-Izer links on the authors’ personal web page are captured in official ACM statistics to more accurately reflect usage and impact measurements.
Authors who do not use ACM Author-Izer links will not have downloads from their local, personal bibliographies counted. They do, however, retain the existing right to post author-prepared preprint versions on their home pages or institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library.
- Q. How does ACM Author-Izer benefit the computing community?
- A. ACM Author-Izer expands the visibility and dissemination of the definitive version of ACM articles. It is based on ACM’s strong belief that the computing community should have the widest possible access to the definitive versions of scholarly literature. By linking authors’ personal bibliography with the ACM Digital Library, user confusion over article versioning should be reduced over time.
In making ACM Author-Izer a free service to both authors and visitors to their websites, ACM is emphasizing its continuing commitment to the interests of its authors and to the computing community in ways that are consistent with its existing subscription-based access model.
- Q. Why can’t I find my most recent publication in my ACM Author Profile Page?
- A. There is a time delay between publication and the process which associates that publication with an Author Profile Page. Right now, that process usually takes 4-8 weeks.
- Q. How does ACM Author-Izer expand ACM’s “Green Path” Access Policies?
- A. ACM Author-Izer extends the rights and permissions that authors retain even after copyright transfer to ACM, which has been among the “greenest” publishers. ACM enables its author community to retain a wide range of rights related to copyright and reuse of materials. They include:
- Posting rights that ensure free access to their work outside the ACM Digital Library and print publications
- Rights to reuse any portion of their work in new works that they may create
- Copyright to artistic images in ACM’s graphics-oriented publications that authors may want to exploit in commercial contexts
- All patent rights, which remain with the original owner