Shamsul Huda, PhD, CISSP, Member of (ISC)2
Shamsul Huda, PhD, CISSP, Member of (ISC)2
Senior Lecturer, School of IT, Deakin University, Melbourne, Australia
Verified email at deakin.edu.au - Homepage
Title
Cited by
Cited by
Year
A hybrid feature selection with ensemble classification for imbalanced healthcare data: A case study for brain tumor diagnosis
S Huda, J Yearwood, HF Jelinek, MM Hassan, G Fortino, M Buckland
IEEE access 4, 9145-9154, 2016
892016
Human emotion recognition using deep belief network architecture
MM Hassan, MGR Alam, MZ Uddin, S Huda, A Almogren, G Fortino
Information Fusion 51, 10-18, 2019
852019
Hybrids of support vector machine wrapper and filter based framework for malware detection
S Huda, J Abawajy, M Alazab, M Abdollalihian, R Islam, J Yearwood
Future Generation Computer Systems 55, 376-390, 2016
802016
An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy
A Stranieri, J Abawajy, A Kelarev, S Huda, M Chowdhury, HF Jelinek
Artificial intelligence in medicine 58 (3), 185-193, 2013
642013
Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data
S Huda, S Miah, MM Hassan, R Islam, J Yearwood, M Alrubaian, ...
Information Sciences 379, 211-228, 2017
502017
An ensemble oversampling model for class imbalance problem in software defect prediction
S Huda, K Liu, M Abdelrazek, A Ibrahim, S Alyahya, H Al-Dossari, ...
IEEE access 6, 24184-24195, 2018
472018
Human activity recognition from body sensor data using deep learning
MM Hassan, S Huda, MZ Uddin, A Almogren, M Alrubaian
Journal of medical systems 42 (6), 1-8, 2018
382018
A hybrid wrapper-filter approach for malware detection
M Alazab, S Huda, J Abawajy, R Islam, J Yearwood, S Venkatraman, ...
Journal of networks 9 (11), 2878-2891, 2014
352014
Malware threats and detection for industrial mobile-IoT networks
S Sharmeen, S Huda, JH Abawajy, WN Ismail, MM Hassan
IEEE access 6, 15941-15957, 2018
342018
A framework for software defect prediction and metric selection
S Huda, S Alyahya, MM Ali, S Ahmad, J Abawajy, H Al-Dossari, ...
IEEE access 6, 2844-2858, 2017
332017
Securing the operations in SCADA-IoT platform based industrial control system using ensemble of deep belief networks
S Huda, J Yearwood, MM Hassan, A Almogren
Applied soft computing 71, 66-77, 2018
312018
A hybrid wrapper–filter approach to detect the source (s) of out-of-control signals in multivariate manufacturing process
S Huda, M Abdollahian, M Mammadov, J Yearwood, S Ahmed, I Sultan
European Journal of Operational Research 237 (3), 857-870, 2014
272014
Identifying cyber threats to mobile-IoT applications in edge computing paradigm
J Abawajy, S Huda, S Sharmeen, MM Hassan, A Almogren
Future Generation Computer Systems 89, 525-538, 2018
232018
Exploring novel features and decision rules to identify cardiovascular autonomic neuropathy using a hybrid of wrapper-filter based feature selection
S Huda, H Jelinek, B Ray, A Stranieri, J Yearwood
2010 Sixth International Conference on Intelligent Sensors, Sensor Networks …, 2010
232010
A stochastic version of expectation maximization algorithm for better estimation of hidden Markov model
S Huda, J Yearwood, R Togneri
Pattern Recognition Letters 30 (14), 1301-1309, 2009
232009
A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection
S Huda, R Islam, J Abawajy, J Yearwood, MM Hassan, G Fortino
Future Generation Computer Systems 83, 193-207, 2018
212018
A constraint-based evolutionary learning approach to the expectation maximization for optimal estimation of the hidden Markov model for speech signal modeling
S Huda, J Yearwood, R Togneri
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 39 …, 2008
212008
Increasing the trustworthiness in the industrial iot networks through a reliable cyberattack detection model
MM Hassan, A Gumaei, S Huda, A Almogren
IEEE Transactions on Industrial Informatics 16 (9), 6154-6162, 2020
192020
A malicious threat detection model for cloud assisted internet of things (CoT) based industrial control system (ICS) networks using deep belief network
S Huda, S Miah, J Yearwood, S Alyahya, H Al-Dossari, R Doss
Journal of Parallel and Distributed Computing 120, 23-31, 2018
162018
Multistage fusion approaches based on a generative model and multivariate exponentially weighted moving average for diagnosis of cardiovascular autonomic nerve dysfunction
MM Hassan, S Huda, J Yearwood, HF Jelinek, A Almogren
Information Fusion 41, 105-118, 2018
162018
The system can't perform the operation now. Try again later.
Articles 1–20