default search action
Mohammad Ilyas
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Abdulkarim Faraj Alqahtani, Mohammad Ilyas:
An Ensemble-Based Multi-Classification Machine Learning Classifiers Approach to Detect Multiple Classes of Cyberbullying. Mach. Learn. Knowl. Extr. 6(1): 156-170 (2024) - [j23]Abdulelah Al Hanif, Mohammad Ilyas:
Effective Feature Engineering Framework for Securing MQTT Protocol in IoT Environments. Sensors 24(6): 1782 (2024) - [j22]Ahmed Alrefaei, Mohammad Ilyas:
Using Machine Learning Multiclass Classification Technique to Detect IoT Attacks in Real Time. Sensors 24(14): 4516 (2024) - [j21]Ghaida Balhareth, Mohammad Ilyas:
Optimized Intrusion Detection for IoMT Networks with Tree-Based Machine Learning and Filter-Based Feature Selection. Sensors 24(17): 5712 (2024) - [j20]Theyab Alsolami, Bader Alsharif, Mohammad Ilyas:
Enhancing Cybersecurity in Healthcare: Evaluating Ensemble Learning Models for Intrusion Detection in the Internet of Medical Things. Sensors 24(18): 5937 (2024) - [i5]Abdulkarim Faraj Alqahtani, Mohammad Ilyas:
A Machine Learning Ensemble Model for the Detection of Cyberbullying. CoRR abs/2402.12538 (2024) - [i4]Abdulelah Al Hanif, Mohammad Ilyas:
Enhance the Detection of DoS and Brute Force Attacks within the MQTT Environment through Feature Engineering and Employing an Ensemble Technique. CoRR abs/2408.00480 (2024) - 2023
- [j19]Yazeed Alotaibi, Mohammad Ilyas:
Ensemble-Learning Framework for Intrusion Detection to Enhance Internet of Things' Devices Security. Sensors 23(12): 5568 (2023) - [j18]Raghdah Saem Aldahr, Mohammad Ilyas:
Patient-Specific Preictal Pattern-Aware Epileptic Seizure Prediction with Federated Learning. Sensors 23(14): 6578 (2023) - [j17]Bader Alsharif, Ali Salem Altaher, Ahmed Altaher, Mohammad Ilyas, Easa Alalwany:
Deep Learning Technology to Recognize American Sign Language Alphabet. Sensors 23(18): 7970 (2023) - [c18]Aizad Khursheed, Mohammad Ilyas, Khwaja M. Rafi, Mohd. Parvez:
Solar PV Wind Hybrid Energy Generation System. IC3I 2023: 2472-2476 - 2022
- [j16]Mohammed M. Abdelsamea, Usama Zidan, Zakaria Senousy, Mohamed Medhat Gaber, Emad Rakha, Mohammad Ilyas:
A survey on artificial intelligence in histopathology image analysis. WIREs Data Mining Knowl. Discov. 12(6) (2022) - [c17]Raghdah Saem Aldahr, Munid Alanazi, Mohammad Ilyas:
Evolving Deep Learning Models for Epilepsy Diagnosis in Data Scarcity Context: A Survey. TSP 2022: 66-73 - 2020
- [j15]Jie Shu, Jingxin Liu, Yongmei Zhang, Hao Fu, Mohammad Ilyas, Giuseppe Faraci, Vincenzo Della Mea, Bozhi Liu, Guoping Qiu:
Marker controlled superpixel nuclei segmentation and automatic counting on immunohistochemistry staining images. Bioinform. 36(10): 3225-3233 (2020) - [i3]Mohammad Ilyas, Basit Qureshi:
Pervasive Communications Technologies For Managing Pandemics. CoRR abs/2006.10805 (2020)
2010 – 2019
- 2019
- [j14]Mohammed M. Abdelsamea, Alain Pitiot, Ruta Barbora Grineviciute, Justinas Besusparis, Arvydas Laurinavicius, Mohammad Ilyas:
A cascade-learning approach for automated segmentation of tumour epithelium in colorectal cancer. Expert Syst. Appl. 118: 539-552 (2019) - [c16]Xianxu Hou, Jingxin Liu, Bolei Xu, Bozhi Liu, Xin Chen, Mohammad Ilyas, Ian O. Ellis, Jon Garibaldi, Guoping Qiu:
Dual Adaptive Pyramid Network for Cross-Stain Histopathology Image Segmentation. MICCAI (2) 2019: 101-109 - [i2]Xianxu Hou, Jingxin Liu, Bolei Xu, Bozhi Liu, Xin Chen, Mohammad Ilyas, Ian O. Ellis, Jon Garibaldi, Guoping Qiu:
Dual Adaptive Pyramid Network for Cross-Stain Histopathology Image Segmentation. CoRR abs/1909.11524 (2019) - 2017
- [i1]Talha Qaiser, Abhik Mukherjee, Chaitanya Reddy Pb, Sai Dileep Munugoti, Vamsi Tallam, Tomi Pitkäaho, Taina Lehtimäki, Thomas J. Naughton, Matt Berseth, Aníbal Pedraza, Ramakrishnan Mukundan, Matthew Smith, Abhir Bhalerao, Erik Rodner, Marcel Simon, Joachim Denzler, Chao-Hui Huang, Gloria Bueno, David R. J. Snead, Ian O. Ellis, Mohammad Ilyas, Nasir M. Rajpoot:
Her2 Challenge Contest: A Detailed Assessment of Automated Her2 Scoring Algorithms in Whole Slide Images of Breast Cancer Tissues. CoRR abs/1705.08369 (2017) - 2016
- [c15]Madiha H. Syed, Eduardo B. Fernández, Mohammad Ilyas:
A Pattern for Fog Computing. VikingPLoP 2016: 13:1-13:10 - 2014
- [j13]Hao Fu, Guoping Qiu, Jie Shu, Mohammad Ilyas:
A Novel Polar Space Random Field Model for the Detection of Glandular Structures. IEEE Trans. Medical Imaging 33(3): 764-776 (2014) - 2013
- [c14]Jie Shu, Hao Fu, Guoping Qiu, Philip Kaye, Mohammad Ilyas:
Segmenting overlapping cell nuclei in digital histopathology images. EMBC 2013: 5445-5448 - [c13]Clyde Carryl, Mohammad Ilyas, Imad Mahgoub, Monika Rathod:
The PEV security challenges to the smart grid: Analysis of threats and mitigation strategies. ICCVE 2013: 300-305 - [c12]Jie Shu, Guoping Qiu, Mohammad Ilyas:
A Semi-automatic Image Analysis Tool for Biomarker Detection in Immunohistochemistry Analysis. ICIG 2013: 937-942 - 2012
- [c11]Hao Fu, Guoping Qiu, Mohammad Ilyas, Jie Shu:
GlandVision: A Novel Polar Space Random Field Model for Glandular Biological Structure Detection. BMVC 2012: 1-12 - [c10]Redjem Bouhenguel, Imad Mahgoub, Mohammad Ilyas:
An energy efficient model for monitoring and detecting atrial fibrillation in wearable computing. BODYNETS 2012: 59-65 - 2010
- [c9]Basit Qureshi, Geyong Min, Demetres D. Kouvatsos, Mohammad Ilyas:
An Adaptive Content Sharing Protocol for P2P Mobile Social Networks. AINA Workshops 2010: 413-418 - [p1]Jamil Ibriq, Imad Mahgoub, Mohammad Ilyas:
Secure Routing in Wireless Sensor Networks. Handbook of Information and Communication Security 2010: 553-578
2000 – 2009
- 2009
- [c8]Basit Qureshi, Mohammad Ilyas, Geyong Min, Demetres D. Kouvatsos:
Poster: An adaptive content sharing protocol for P2P Mobile Social Networks. MobiQuitous 2009: 1-2 - 2008
- [c7]Rohit A. Talwalkar, Mohammad Ilyas:
Analysis of Quality of Service (QoS) in WiMAX networks. ICON 2008: 1-8 - [r4]Syed Ahson, Mohammad Ilyas:
Smart Phones. Encyclopedia of Wireless and Mobile Communications 2008 - [r3]Syed Ahson, Mohammad Ilyas:
Smart Phones: Operating Systems. Encyclopedia of Wireless and Mobile Communications 2008 - [r2]Mihaela Cardei, Jamil Ibriq, Mohammad Ilyas, Imad Mahgoub:
Wireless Sensor Networks (WSNs): Key Management Schemes. Encyclopedia of Wireless and Mobile Communications 2008 - [r1]Borko Furht, Mohammad Ilyas:
Wireless Internet: Fundamentals. Encyclopedia of Wireless and Mobile Communications 2008 - 2007
- [j12]Bing Wu, Jie Wu, Eduardo B. Fernández, Mohammad Ilyas, Spyros S. Magliveras:
Secure and efficient key management in mobile ad hoc networks. J. Netw. Comput. Appl. 30(3): 937-954 (2007) - 2004
- [j11]Kpatcha M. Bayarou, Matthias Enzmann, Elli Giessler, Michael Haisch, Brian Hunter, Mohammad Ilyas, Sebastian Rohr, Markus Schneider:
Towards Certificate-Based Authentication for Future Mobile Communications. Wirel. Pers. Commun. 29(3-4): 283-301 (2004) - [c6]Matthias Enzmann, Elli Giessler, Michael Haisch, Brian Hunter, Mohammad Ilyas, Markus Schneider:
A Note on Certificate Path Verification in Next Generation Mobile Communications. ARCS 2004: 273-287 - [e2]Mohammad Ilyas, Imad Mahgoub:
Handbook of Sensor Networks. CRC Press 2004, ISBN 978-0-8493-1968-6 [contents] - [e1]Mohammad Ilyas, Imad Mahgoub:
Mobile Computing Handbook. CRC Press 2004, ISBN 978-0-8493-1971-6 [contents] - 2003
- [j10]Sam Hsu, Lianfen Qian, Mohammad Ilyas:
An Analytic Study of Two Probabilistic Models for Establishing Ad Hoc WLANs. Inf. Technol. Manag. 4(1): 55-67 (2003) - 2001
- [j9]Mohammad Ilyas, Sam Hsu, Kwok Choi:
Counter Rotating Slotted Ring: A New Architecture for Ring MANs. J. King Saud Univ. Comput. Inf. Sci. 13: 1-19 (2001) - [c5]Xiaohong Yuan, Mohammad Ilyas:
Threshold-Based Connection Admission Control Scheme in ATM Networks: A Simulation Study. ICN (2) 2001: 677-686
1990 – 1999
- 1998
- [j8]Mohammad Ilyas, Majid A. Syed:
An efficient multistage switching node architecture for broadband ISDNs. Telecommun. Syst. 10(3-4): 229-241 (1998) - 1997
- [j7]Morrison S. Obeng, Imad Mahgoub, Mohammad Ilyas:
Simulation Study of the Performance of a Cluster-Based Hypercube Multicomputer. Simul. 68(4): 231-240 (1997) - 1995
- [j6]Sami S. Alwakeel, Mohammad Ilyas:
Integrated Transmission of Packetized Voice and Data on a Unidirectional Fibre Optics Bus Network. Comput. Commun. 18(4): 252-261 (1995) - 1994
- [c4]Lynnau Ehley, Borko Furht, Mohammad Ilyas:
Evaluation of Multimedia Synchronization techniques. ICMCS 1994: 514-519 - 1992
- [j5]Tutorial Overview, Paul F. Roth, Mohammad Ilyas, Hussein T. Mouftah:
SIMULATION: A powerful tool for prototyping telecommunications networks. Simul. 58(2): 78-82 (1992) - 1990
- [j4]Y. M. Lam, Hussein T. Mouftah, Mohammad Ilyas:
Performance analysis of CSMA-CD protocols in local area bus networks. Comput. Syst. Sci. Eng. 5(2): 105-110 (1990)
1980 – 1989
- 1987
- [j3]Mohammad Ilyas, Hussein T. Mouftah:
End-to-End Flow Control in Computer Networks with Noisy Channels and Quasi-Cut-Through Switching. IEEE Trans. Computers 36(11): 1382-1386 (1987) - 1986
- [j2]Mohammad Ilyas, Hussein T. Mouftah:
Towards Performance Improvement of Cut-Through Switching in Computer Networks. Perform. Evaluation 6(2): 125-133 (1986) - [c3]Mohammad Ilyas:
Performance of Token-Passing Bus Lan: A Simulation Study. ICC 1986: 201-205 - [c2]Mohammad Ilyas, Hussein T. Mouftah:
Message Delay Distributions in Store-and-Forward Computer Networks. ICC 1986: 212-216 - 1985
- [j1]Mohammad Ilyas, Hussein T. Mouftah:
Performance evaluation of computer communications networks. IEEE Commun. Mag. 23(4): 18-29 (1985) - 1984
- [c1]Mohammad Ilyas, Hussein T. Mouftah:
A Simulation Study of a New Hybrid Switching Technique for Computer Networks. ICC (3) 1984: 1298-1302
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint