Search Results - "Hussain, Yasir"

Refine Results
  1. 1

    A privacy-conserving framework based intrusion detection method for detecting and recognizing malicious behaviours in cyber-physical power networks by Khan, Izhar Ahmed, Pi, Dechang, Khan, Nasrullah, Khan, Zaheer Ullah, Hussain, Yasir, Nawaz, Asif, Ali, Farman

    “…Contemporary Smart Power Systems (SPNs) depend on Cyber-Physical Systems (CPSs) to connect physical devices and control tools. Developing a robust…”
    Get full text
    Journal Article
  2. 2

    Improving source code suggestion with code embedding and enhanced convolutional long short‐term memory by Hussain, Yasir, Huang, Zhiqiu, Zhou, Yu

    Published in IET software (01-06-2021)
    “…Source code suggestion is the utmost helpful feature in the integrated development environments that helps to quicken software development by suggesting the…”
    Get full text
    Journal Article
  3. 3

    Regression-Based Empirical Modeling of Thermal Conductivity of CuO-Water Nanofluid using Data-Driven Techniques by Tariq, Rasikh, Hussain, Yasir, Sheikh, Nadeem Ahmed, Afaq, Kamran, Ali, Hafiz Muhammad

    “…In this work, an empirical correlation to predict the thermal conductivity of CuO-water nanofluid is developed. The prime novelty of this work is to include…”
    Get full text
    Journal Article
  4. 4

    HML-IDS: A Hybrid-Multilevel Anomaly Prediction Approach for Intrusion Detection in SCADA Systems by Khan, Izhar Ahmed, Pi, Dechang, Khan, Zaheer Ullah, Hussain, Yasir, Nawaz, Asif

    Published in IEEE access (2019)
    “…Critical infrastructures, e.g., electricity generation and dispersal networks, chemical processing plants, and gas distribution, are governed and monitored by…”
    Get full text
    Journal Article
  5. 5

    Context-Aware Trust and Reputation Model for Fog-Based IoT by Hussain, Yasir, Zhiqiu, Huang, Akbar, Muhammad Azeem, Alsanad, Ahmed, Alsanad, Abeer Abdul-Aziz, Nawaz, Asif, Khan, Izhar Ahmed, Khan, Zaheer Ullah

    Published in IEEE access (2020)
    “…Trust and reputation are important terms whether the communication is Humans-to-Human (H2H), Human-Machine-Interaction (HMI) or Machine-to-Machine (M2M). As…”
    Get full text
    Journal Article
  6. 6

    Mode Inference using enhanced Segmentation and Pre-processing on raw Global Positioning System data by Nawaz, Asif, Zhiqiu, Huang, Senzhang, Wang, Hussain, Yasir, Naseer, Amara, Izhar, Muhammad, Khan, Zaheer

    Published in Measurement and control (London) (01-08-2020)
    “…Many applications use the Global Positioning System data that provide rich context information for multiple purposes. Easier availability and access of Global…”
    Get full text
    Journal Article
  7. 7

    Design Patterns for Mobile Games Based on Structural Similarity by Rasool, Ghulam, Hussain, Yasir, Umer, Tariq, Rasheed, Jawad, Yeo, Sook Fern, Sahin, Fatih

    Published in Applied sciences (01-01-2023)
    “…Software design patterns have a proven impact on the quality of software applications and the development process of an application. The success of design…”
    Get full text
    Journal Article
  8. 8

    The Spectrum of Echocardiographic Findings Across Stages I-V of Chronic Kidney Disease by Hussain, Yasir, Shahzad, Anjum, Bhatti, Samee Javed, Zafar, Adnan Ahmad, Shah, Badar U Din, Jamil, Muhammad Irfan, Ahmed, Adeel, Aamir, Ayesha Naeem

    Published in Curēus (Palo Alto, CA) (25-07-2024)
    “…Chronic kidney disease (CKD) is associated with increased cardiovascular morbidity and mortality. This study aimed to assess the frequency of cardiac…”
    Get full text
    Journal Article
  9. 9
  10. 10

    Effects of the green supply chain management practices on firm performance and sustainable development by Amjad, Ahmad, Abbass, Kashif, Hussain, Yasir, Khan, Farina, Sadiq, Shahzad

    “…The idea of sustainable development and green supply chain management is considered at the underlying stage in the research and academic fields, particularly…”
    Get full text
    Journal Article
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    CodeGRU: Context-aware deep learning with gated recurrent unit for source code modeling by Hussain, Yasir, Huang, Zhiqiu, Zhou, Yu, Wang, Senzhang

    Published in Information and software technology (01-09-2020)
    “…Context: Recently deep learning based Natural Language Processing (NLP) models have shown great potential in the modeling of source code. However, a major…”
    Get full text
    Journal Article
  17. 17
  18. 18

    Boosting source code suggestion with self-supervised Transformer Gated Highway by Hussain, Yasir, Huang, Zhiqiu, Zhou, Yu, Wang, Senzhang

    Published in The Journal of systems and software (01-02-2023)
    “…Attention-based transformer language models have shown significant performance gains in various natural language tasks. In this work, we explore the impact of…”
    Get full text
    Journal Article
  19. 19

    Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control Systems by Khan, Izhar Ahmed, Keshk, Marwa, Pi, Dechang, Khan, Nasrullah, Hussain, Yasir, Soliman, Hatem

    Published in Ad hoc networks (01-09-2022)
    “…Industrial Internet of Things (IIoT) networks involves heterogeneous technological and manufacturing services and devices. The communication and data exchange…”
    Get full text
    Journal Article
  20. 20

    Assessing the role of green supply chain management in enhancing Pakistan manufacturers’ performances by Tariq, Muhammad Ibrahim, Abbass, Kashif, Chebbi, Kaouther, Hussain, Yasir

    “…The purpose of this study is to explore the impact of success factors of Green Supply Chain Management (GSCM) dimensions (i.e., green purchasing, internal…”
    Get full text
    Journal Article