Follow
Shamsher Ullah (PhD)
Shamsher Ullah (PhD)
School of Computer Science & Technology
Verified email at mail.ustc.edu.cn
Title
Cited by
Cited by
Year
Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey
SU al.
Computer Science Review 47, 2022
492022
A review of signcryption schemes based on hyper elliptic curve
S Ullah, XY Li, L Zhang
2017 3rd International Conference on Big Data Computing and Communications …, 2017
392017
IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic
F Ullah, S Ullah, G Srivastava, JCW Lin
Digital Communications and Networks 10 (1), 190-204, 2024
252024
Cyber-threat detection system using a hybrid approach of transfer learning and multi-model image representation
F Ullah, S Ullah, MR Naeem, L Mostarda, S Rho, X Cheng
Sensors 22 (15), 5883, 2022
162022
A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization
F Ullah, G Srivastava, S Ullah
Journal of Cloud Computing 11 (1), 75, 2022
132022
Blind signcryption scheme based on hyper elliptic curves cryptosystem
SUN Din
Peer-to-Peer Networking and Applications 14, 917-932, 2021
122021
A novel trusted third party based signcryption scheme
Shamsher Ullah et al.
Multimedia Tools and Applications, 2020
112020
Kernel homomorphic encryption protocol
S Ullah, XY Li, MT Hussain, Z Lan
Journal of Information Security and Applications 48, 102366, 2019
112019
Droid-MCFG: Android malware detection system using manifest and control flow traces with multi-head temporal convolutional network
F Ullah, S Ullah, G Srivastava, JCW Lin
Physical Communication 57, 101975, 2023
92023
Toras: Trustworthy load-balanced opportunistic routing for asynchronous duty-cycled wsns
MUF Qaisar, X Wang, A Hawbani, A Khan, A Ahmed, FT Wedaj, S Ullah
IEEE Systems Journal, 2022
82022
Nric: A noise removal approach for nonlinear isomap method
M Yousaf, MSS Khan, TU Rehman, S Ullah, L Jing
Neural Processing Letters 53, 2277-2304, 2021
72021
A Survey on X.509 Public-Key Infrastructure, Certificate Revocation, and Their Modern Implementation on Blockchain and Ledger Technologies
S Khan, F Luo, Z Zhang, F Ullah, F Amin, SF Qadri, MBB Heyat, R Ruby, ...
IEEE Communications Surveys & Tutorials, 2023
62023
A Scalable Federated Learning Approach for Collaborative Smart Healthcare System with Intermittent Clients using Medical Imaging
U Farhan, S Gautam, X Heng, U Shamsher, CWL Jerry, Z Yue
IEEE Journal of Biomedical and Health Informatics, 1-13, 2023
62023
NMal-Droid: network-based android malware detection system using transfer learning and CNN-BiGRU ensemble
U Farhan, U Shamsher, G Srivastava, L Jerry Chun-Wei, Z Yue
Wireless Networks, 2023
42023
Γ-Access Policy: Attribute-Based Encryption Scheme for Social Network Based Data Trading
S Ullah, L Zhang, MW Sardar, MT Hussain
China Communications 18 (8), 183-198, 2021
42021
BLIND SIGNCRYPTION SCHEME BASED ON HYPER ELLIPTIC CURVE FOR UNTRACEABLE PAYMENT SYSTEM
SU et
Proc. 13th International Conference on Statistical Sciences 28, 337-344, 2015
4*2015
A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments
S Ullah, Z Jiangbin, MT Hussain, N Din, F Ullah, MU Farooq
Journal of Information Security and Applications 70, 103346, 2022
32022
Ee-tar: Energy efficient and thermal aware routing protocol for software defined wireless body area networks
A Ahmed, X Wang, A Hawbani, MU Farooq, T Qureshi, S Ullah
2020 IEEE 8th International Conference on Information, Communication and …, 2020
32020
QuSigS: A quantum Signcryption scheme to recover key escrow problem and key revocation problem in cloud computing
S Ullah, MT Hussain, M Yousaf
Multimedia Tools and Applications, 2022
22022
NIDS-VSB: Network Intrusion Detection System for VANET using Spark-Based Big Data Optimization and Transfer Learning
F Ullah, G Srivastava, S Ullah, K Yoshigoe, Y Zhao
IEEE Transactions on Consumer Electronics, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20