Allah Ditta

Orcid: 0000-0003-1519-5982

According to our database1, Allah Ditta authored at least 19 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Detecting Electrocardiogram Arrhythmia Empowered With Weighted Federated Learning.
IEEE Access, 2024

2023
Indexing in WoT to Locate Indoor Things.
IEEE Access, 2023

2022
An intelligent fault detection approach based on reinforcement learning system in wireless sensor network.
J. Supercomput., 2022

Towards Parallel Selective Attention Using Psychophysiological States as the Basis for Functional Cognition.
Sensors, 2022

A secure and size efficient algorithm to enhance data hiding capacity and security of cover text by using unicode.
J. King Saud Univ. Comput. Inf. Sci., 2022

2020
Secure Framework Enhancing AES Algorithm in Cloud Computing.
Secur. Commun. Networks, 2020

Cloud-based efficient scheme for handwritten digit recognition.
Multim. Tools Appl., 2020

A novel approach to secret data concealment with high cover text capacity and security.
Int. J. Electron. Secur. Digit. Forensics, 2020

2019
Multimodal Speaker Diarization Using a Pre-Trained Audio-Visual Synchronization Model.
Sensors, 2019

Design of Momentum Fractional Stochastic Gradient Descent for Recommender Systems.
IEEE Access, 2019

2018
Secure Self-healing Group Key Distribution Scheme with Constant Storage for SCADA Systems in Smart Grid.
Wirel. Pers. Commun., 2018

Wireless ad hoc network: detection of malicious node by using neighbour-based authentication approach.
Int. J. Wirel. Mob. Comput., 2018

Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation.
Int. J. Wirel. Mob. Comput., 2018

Information hiding: a novel algorithm for enhancement of cover text capacity by using unicode characters.
Int. J. Inf. Comput. Secur., 2018

Information hiding: Arabic text steganography by using Unicode characters to hide secret data.
Int. J. Electron. Secur. Digit. Forensics, 2018

2017
Detection of Malicious Node in Wireless Ad Hoc Network by Using Acknowledgement Based Approach.
Proceedings of the 7th International Conference on Communication and Network Security, 2017

2016
A new seismic data visualization method.
Proceedings of the 22nd International Conference on Automation and Computing, 2016

2015
Circumventing sinkhole attack in ad hoc networks.
Int. J. Wirel. Mob. Comput., 2015

Using different techniques of steganography deducting null cipher in plain text.
Int. J. Wirel. Mob. Comput., 2015


  Loading...