default search action
Md. Arshad Ali
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Le Hoang Anh, Yuta Kawada, Samsul Huda, Md. Arshad Ali, Yuta Kodera, Yasuyuki Nogami:
ELiPS-based Ciphertext-Policy Attribute-Based Encryption. Int. J. Netw. Comput. 14(2): 186-205 (2024) - [j7]Md. Biplob Hossain, Maya Rahayu, Md. Arshad Ali, Samsul Huda, Yuta Kodera, Yasuyuki Nogami:
A Blockchain-based Approach with zk-SNARKs for Secure Email Applications. Int. J. Netw. Comput. 14(2): 225-247 (2024) - [j6]Muhammad Bisri Musthafa, Samsul Huda, Yuta Kodera, Md. Arshad Ali, Shunsuke Araki, Jedidah Mwaura, Yasuyuki Nogami:
Optimizing IoT Intrusion Detection Using Balanced Class Distribution, Feature Selection, and Ensemble Machine Learning Techniques. Sensors 24(13): 4293 (2024) - [c16]Muhammad Bisri Musthafa, Samsul Huda, Ali Md. Arshad, Yuta Kodera, Yasuyuki Nogami:
Evaluation of IDS model by improving accuracy and reducing overfitting using stacking LSTM. ICCE 2024: 1-5 - 2023
- [c15]Md. Biplob Hossain, Maya Rahayu, Ali Md. Arshad, Samsul Huda, Yuta Kodera, Yasuyuki Nogami:
A Smart Contract Based Blockchain Approach Integrated with Elliptic Curve Cryptography for Secure Email Application. CANDARW 2023: 195-201 - [c14]Le Hoang Anh, Yuta Kawada, Samsul Huda, Ali Md. Arshad, Yuta Kodera, Yasuyuki Nogami:
An implementation of ELiPS-based Ciphertext-Policy Attribute-Based Encryption. CANDARW 2023: 220-226 - [c13]Tetsuro Ishida, Kazuma Ikesaka, Ali Md. Arshad, Yasuyuki Nogami, Yuta Kodera:
A Proposal of Solving NTRU Equation Using Matrix Representation Instead of Recursive Operation. CANDARW 2023: 227-231 - [c12]Maya Rahayu, Md. Biplob Hossain, Ali Md. Arshad, Samsul Huda, Yuta Kodera, Yasuyuki Nogami:
An integrated secured vehicular ad-hoc network leveraging Kerberos authentication and Blockchain technology. CANDARW 2023: 260-266 - [c11]Muhammad Bisri Musthafa, Ali Md. Arshad, Samsul Huda, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Evaluation of machine learning based optimized feature selection approaches and classification methods for Intrusion Detection System. ICCE-Taiwan 2023: 285-286 - [c10]Yuki Takeuchi, Itsuki Maebayashi, Ali Md. Arshad, Takuya Kusaka, Yasuyuki Nogami, Yuta Kodera:
A Consideration of Parameters for a Nonlinear Filter Generator and its Linear Complexity Profile. ICCE-Taiwan 2023: 345-346 - [c9]Itsuki Maebayashi, Yuki Takeuchi, Ali Md. Arshad, Takuya Kusaka, Yasuyuki Nogami, Yuta Kodera:
A modified M-sequence with dynamic mapping and its autocorrelation. ICCE-Taiwan 2023: 347-348 - [c8]Akane Miyoshi, Kazuma Ikesaka, Ali Md. Arshad, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
A Consideration of Averaging the Calculation Cost of CVMA for A Secure Session based Data Transmission. ICCE-Taiwan 2023: 493-494 - [c7]Masakazu Awakiahra, Jun Miura, Ali Md. Arshad, Takuya Kusaka, Yasuyuki Nogami, Yuta Kodera:
A Proposal for Efficient Multiplication and Inverse Calculation in Streamlined NTRU Prime. ICCE-Taiwan 2023: 541-542 - [c6]Itsuki Maebayashi, Yuki Takeuchi, Md. Arshad Ali, Yasuyuki Nogami, Yuta Kodera:
Existence of Equivalent Keys in a Random Number Generator with Field Trace and a Dynamic Mapping. MobiSec 2023: 109-120 - 2022
- [j5]Yuta Kodera, Ryoichi Sato, Ali Md. Arshad, Takuya Kusaka, Yasuyuki Nogami:
Transition Probability Test for an RO-Based Generator and the Relevance between the Randomness and the Number of ROs. Entropy 24(6): 780 (2022) - 2021
- [j4]Ryoichi Sato, Yuta Kodera, Ali Md. Arshad, Takuya Kusaka, Yasuyuki Nogami, Robert H. Morelos-Zaragoza:
Consideration for Affects of an XOR in a Random Number Generator Using Ring Oscillators. Entropy 23(9): 1168 (2021)
2010 – 2019
- 2019
- [j3]Yuta Kodera, Ali Md. Arshad, Takeru Miyazaki, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara, Robert H. Morelos-Zaragoza:
Algebraic Group Structure of the Random Number Generator: Theoretical Analysis of NTU Sequence(s). IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(12): 1659-1667 (2019) - 2018
- [j2]Shunsuke Ueda, Ken Ikuta, Takuya Kusaka, Md. Al-Amin Khandaker, Ali Md. Arshad, Yasuyuki Nogami:
An Extended Generalized Minimum Distance Decoding for Binary Linear Codes on a 4-Level Quantization over an AWGN Channel. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(8): 1235-1244 (2018) - [j1]Yuta Kodera, Takeru Miyazaki, Md. Al-Amin Khandaker, Ali Md. Arshad, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara:
Distribution of Digit Patterns in Multi-Value Sequence over the Odd Characteristic Field. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(9): 1525-1536 (2018) - [c5]Ali Md. Arshad, Yuta Kodera, Shoji Heguri, Takuya Kusaka, Satoshi Uehara, Robert H. Morelos-Zaragoza:
Bit Distribution of Binary Sequence Generated by Trace Function and Legendre Symbol Over Sub Extension Field. ICIT 2018: 92-96 - [i1]Mohd Zeeshan Ansari, Tanvir Ahmad, Ali Md. Arshad:
Cross Script Hindi English NER Corpus from Wikipedia. CoRR abs/1810.03430 (2018) - 2017
- [c4]Ali Md. Arshad, Takeru Miyazaki, Shoji Heguri, Yasuyuki Nogami, Satoshi Uehara, Robert Morelos-Zaragoza:
Linear complexity of pseudo random binary sequence generated by trace function and Legendre symbol over proper sub extension field. IWSDA 2017: 84-88 - 2016
- [c3]Ali Md. Arshad, Yasuyuki Nogami, Hiroto Ino, Satoshi Uehara:
Auto and Cross Correlation of Well Balanced Sequence over Odd Characteristic Field. CANDAR 2016: 604-609 - [c2]Ali Md. Arshad, Yasuyuki Nogami:
A pseudo-random binary sequence generated by using primitive polynomial of degree 2 over odd characteristic field Fp. ICCE-TW 2016: 1-2 - [c1]Ali Md. Arshad, Yasuyuki Nogami, Chiaki Ogawa, Hiroto Ino, Satoshi Uehara, Robert Morelos-Zaragoza, Kazuyoshi Tsuchiya:
A new approach for generating well balanced Pseudo-random signed binary sequence over odd characteristic field. ISITA 2016: 777-780
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint