Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 60 matches
- 2024
- Abdul Mateen Ahmed, Aaqib Patel, Mohammed Zafar Ali Khan:
Parity Check Coded Super-MAC for Reliability Enhancements in Next-Generation Networks. COMSNETS 2024: 1116-1121 - 2023
- Ahsan Zafar, Yanbo Che, Muneer Ahmed, Muhammad Sarfraz, Ashfaq Ahmad, Mohammad Alibakhshikenari:
Enhancing Power Generation Forecasting in Smart Grids Using Hybrid Autoencoder Long Short-Term Memory Machine Learning Model. IEEE Access 11: 118521-118537 (2023) - Haider Abbas, Naina Emmanuel, Muhammad Faisal Amjad, Tahreem Yaqoob, Mohammed Atiquzzaman, Zafar Iqbal, Narmeen Shafqat, Waleed Bin Shahid, Ali Tanveer, Umer Ashfaq:
Security Assessment and Evaluation of VPNs: A Comprehensive Survey. ACM Comput. Surv. 55(13s): 273:1-273:47 (2023) - Ahsan Ali, Muaz Ashfaq, Aleen Qureshi, Umar Muzammil, Hamna Shaukat, Shaukat Ali, Wael A. Altabey, Mohammad N. Noori, Sallam A. Kouritem:
Smart Detecting and Versatile Wearable Electrical Sensing Mediums for Healthcare. Sensors 23(14): 6586 (2023) - Ajit Kumar Singh, Santosh Kumar Mahto, Rashmi Sinha, Mohammad Alibakhshikenari, Ahmed Jamal Abdullah Al-Gburi, Ashfaq Ahmad, Lida Kouhalvandi, Bal S. Virdee, Mariana Dalarsson:
Low-Loss Paper-Substrate Triple-Band-Frequency Reconfigurable Microstrip Antenna for Sub-7 GHz Applications. Sensors 23(21): 8996 (2023) - Saad Ashfaq, Alexander Hoffman, Saptarshi Mitra, Sudhakar Sah, MohammadHossein AskariHemmat, Ehsan Saboori:
DeepliteRT: Computer Vision at the Edge. BMVC 2023: 889-892 - Mst. Shapna Akter, Hossain Shahriar, Sheikh Iqbal Ahamed, Kishor Datta Gupta, Muhammad Rahman, Atef Mohamed, Mohammad Ashiqur Rahman, Akond Rahman, Fan Wu:
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection. COMPSAC 2023: 1057-1063 - Darshan C. Ganji, Saad Ashfaq, Ehsan Saboori, Sudhakar Sah, Saptarshi Mitra, MohammadHossein AskariHemmat, Alexander Hoffman, Ahmed Hassanien, Mathieu Léonardon:
DeepGEMM: Accelerated Ultra Low-Precision Inference on CPU Architectures using Lookup Tables. CVPR Workshops 2023: 4656-4664 - Md Maruf Kamran Sohag, Mohammad Ashfaq Ur Rahman, Muhtasim Ibteda Shochcho, Md. Ridwan Mahmud, Daiyan Mohammad Shams, Mysha Samiha, Mohammad Rejwan Uddin, Mahady Hasan:
Fruit Quality Detection and Monitoring System. ICCSCE 2023: 111-114 - Darshan C. Ganji, Saad Ashfaq, Ehsan Saboori, Sudhakar Sah, Saptarshi Mitra, MohammadHossein AskariHemmat, Alexander Hoffman, Ahmed Hassanien, Mathieu Léonardon:
DeepGEMM: Accelerated Ultra Low-Precision Inference on CPU Architectures using Lookup Tables. CoRR abs/2304.09049 (2023) - Mst. Shapna Akter, Hossain Shahriar, Sheikh Iqbal Ahamed, Kishor Datta Gupta, Muhammad Asadur Rahman, Atef Mohamed, Mohammad Ashiqur Rahman, Akond Rahman, Fan Wu:
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection. CoRR abs/2306.00284 (2023) - Mst. Shapna Akter, Md. Jobair Hossain Faruk, Nafisa Anjum, Mohammad Masum, Hossain Shahriar, Akond Rahman, Fan Wu, Alfredo Cuzzocrea:
Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms. CoRR abs/2306.08060 (2023) - Saad Ashfaq, Alexander Hoffman, Saptarshi Mitra, Sudhakar Sah, MohammadHossein AskariHemmat, Ehsan Saboori:
DeepliteRT: Computer Vision at the Edge. CoRR abs/2309.10878 (2023) - 2022
- Mst. Shapna Akter, Md. Jobair Hossain Faruk, Nafisa Anjum, Mohammad Masum, Hossain Shahriar, Nazmus Sakib, Akond Rahman, Fan Wu, Alfredo Cuzzocrea:
Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms. IEEE Big Data 2022: 5639-5645 - Mohammad Masum, Nafisa Anjum, Md. Jobair Hossain Faruk, Hossain Shahriar, Nazmus Sakib, Maria Valero, Mohammed Karim, Akond Rahman, Fan Wu, Alfredo Cuzzocrea:
A Novel Machine Learning Based Framework for Bridge Condition Analysis. IEEE Big Data 2022: 5530-5535 - Mohammad Masum, Mohammad Nazim, Md. Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Md Abdullah Hafiz Khan, Gias Uddin, Shabir Barzanjeh, Erhan Saglamyurek, Akond Rahman, Sheikh Iqbal Ahamed:
Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go? COMPSAC 2022: 530-538 - Akond Rahman, Farzana Ahamed Bhuiyan, Mohammad Mehedi Hassan, Hossain Shahriar, Fan Wu:
Towards Automation for MLOps: An Exploratory Study of Bot Usage in Deep Learning Libraries. COMPSAC 2022: 1093-1097 - Paramita Basak Upama, Md. Jobair Hossain Faruk, Mohammad Nazim, Mohammad Masum, Hossain Shahriar, Gias Uddin, Shabir Barzanjeh, Sheikh Iqbal Ahamed, Akond Rahman:
Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing Tools. COMPSAC 2022: 520-529 - Sayyed Shafivulla, Aaqib Patel, Mohammed Zafar Ali Khan:
Parallel Implementation of a Massive MIMO Linear Detector. CSNDSP 2022: 744-749 - Mohammad Mehedi Hassan, Akond Rahman:
As Code Testing: Characterizing Test Quality in Open Source Ansible Development. ICST 2022: 208-219 - Paramita Basak Upama, Md. Jobair Hossain Faruk, Mohammad Nazim, Mohammad Masum, Hossain Shahriar, Gias Uddin, Shabir Barzanjeh, Sheikh Iqbal Ahamed, Akond Rahman:
Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing Tools. CoRR abs/2204.01856 (2022) - Mohammad Masum, Mohammad Nazim, Md. Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Md Abdullah Hafiz Khan, Gias Uddin, Shabir Barzanjeh, Erhan Saglamyurek, Akond Rahman, Sheikh Iqbal Ahamed:
Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go? CoRR abs/2204.02784 (2022) - Saad Ashfaq, MohammadHossein AskariHemmat, Sudhakar Sah, Ehsan Saboori, Olivier Mastropietro, Alexander Hoffman:
Accelerating Deep Learning Model Inference on Arm CPUs with Ultra-Low Bit Quantization and Runtime. CoRR abs/2207.08820 (2022) - Refaat Mohammad Alamgir, Ali Abir Shuvro, Mueeze Al Mushabbir, Mohammed Ashfaq Raiyan, Nusrat Jahan Rani, Md. Mushfiqur Rahman, Md. Hasanul Kabir, Sabbir Ahmed:
Performance Analysis of YOLO-based Architectures for Vehicle Detection from Traffic Images in Bangladesh. CoRR abs/2212.09144 (2022) - 2021
- Abdul Mateen Ahmed, Aaqib Patel, Mohammed Zafar Ali Khan:
Super-MAC: Data Duplication and Combining for Reliability Enhancements in Next-Generation Networks. IEEE Access 9: 54671-54689 (2021) - Suravi Akhter, Sadia Sharmin, Sumon Ahmed, Abu Ashfaqur Sajib, Mohammad Shoyaib:
mRelief: A Reward Penalty Based Feature Subset Selection Considering Data Overlapping Problem. ICCS (1) 2021: 278-292 - Md. Hasan Tarek, Md. Eusha Kadir, Sadia Sharmin, Abu Ashfaqur Sajib, Amin Ahsan Ali, Mohammad Shoyaib:
Feature Subset Selection based on Redundancy Maximized Clusters. ICMLA 2021: 521-526 - Aaqib Patel, Md. Zafar Ali Khan:
Optimal Chi-squared Detector of Replay Attacks on Cyber-Physical Systems. ICSC 2021: 338-343 - Abdul Mateen Ahmed, Aaqib Patel, Mohammed Zafar Ali Khan:
Reliability Enhancement by PDCP Duplication and Combining for Next Generation Networks. VTC Spring 2021: 1-5 - Aaqib Patel, Mohammed Zafar Ali Khan:
An eigen decomposition based closed-form solution for the Discrete Lyapunov and Stein Equations. CoRR abs/2103.04315 (2021)
skipping 30 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-03 19:17 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint