Mohd Yamani Idna Bin Idris

Orcid: 0000-0003-4894-0838

According to our database1, Mohd Yamani Idna Bin Idris authored at least 76 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A review of security attacks and intrusion detection in the vehicular networks.
J. King Saud Univ. Comput. Inf. Sci., February, 2024

2023
Enhanced lightweight and secure certificateless authentication scheme (ELWSCAS) for Internet of Things environment.
Internet Things, December, 2023

Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection.
IEEE Access, 2023

The Study of Malay's Prosodic Features Impact on Classical Arabic Accents Recognition.
IEEE Access, 2023

Optimized Routing of UAVs Using Bio-Inspired Algorithm in FANET: A Systematic Review.
IEEE Access, 2023

Preliminary Study for Identifying Personnel for Innovative Software Engineering Project.
Proceedings of the IEEE Global Engineering Education Conference, 2023

2022
A two-step clustering to minimize redundant transmission in wireless sensor network using sleep-awake mechanism.
Wirel. Networks, 2022

A Fog-Centric Secure Cloud Storage Scheme.
IEEE Trans. Sustain. Comput., 2022

Towards an Effective Intrusion Detection Model Using Focal Loss Variational Autoencoder for Internet of Things (IoT).
Sensors, 2022

A comprehensive evaluation procedure for copy-move forgery detection methods: results from a systematic review.
Multim. Tools Appl., 2022

Hybrid multi-objective node deployment for energy-coverage problem in mobile underwater wireless sensor networks.
Int. J. Distributed Sens. Networks, 2022

A Hybrid Sperm Swarm Optimization and Genetic Algorithm for Unimodal and Multimodal Optimization Problems.
IEEE Access, 2022

Hybrid Metaheuristics for QoS-Aware Service Composition: A Systematic Mapping Study.
IEEE Access, 2022

Hybrid Metaheuristics Using Rough Sets for QoS-Aware Service Composition.
IEEE Access, 2022

Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces.
IEEE Access, 2022

Authenticated Encryption Schemes: A Systematic Review.
IEEE Access, 2022

Optimized Support Vector Regression-Based Model for Solar Power Generation Forecasting on the Basis of Online Weather Reports.
IEEE Access, 2022

2021
A hybridization strategy using equal and unequal clustering schemes to mitigate idle listening for lifetime maximization of wireless sensor network.
Wirel. Networks, 2021

Combined State of Charge and State of Energy Estimation of Lithium-Ion Battery Using Dual Forgetting Factor-Based Adaptive Extended Kalman Filter for Electric Vehicle Applications.
IEEE Trans. Veh. Technol., 2021

CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics.
IEEE Trans. Sustain. Comput., 2021

Energy-Efficient Wireless Sensor Network with an Unequal Clustering Protocol Based on a Balanced Energy Method (EEUCB).
Sensors, 2021

An enhanced lightweight and secured authentication protocol for vehicular ad-hoc network.
Comput. Commun., 2021

An Edge Assisted Secure Lightweight Authentication Technique for Safe Communication on the Internet of Drones Network.
IEEE Access, 2021

Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges.
IEEE Access, 2021

Dental Impression Tray Selection From Maxillary Arch Images Using Multi-Feature Fusion and Ensemble Classifier.
IEEE Access, 2021

RFID Authentication Scheme Based on Hyperelliptic Curve Signcryption.
IEEE Access, 2021

2020
Optimal Placement of Near Ground VHF/UHF Radio Communication Network as a Multi Objective Problem.
Wirel. Pers. Commun., 2020

Performance Evaluation and Validation of QCM (Query Control Mechanism) for QoS-Enabled Layered-Based Clustering for Reactive Flooding in the Internet of Things.
Sensors, 2020

A Survey on Underwater Wireless Sensor Networks: Requirements, Taxonomy, Recent Advances, and Open Research Challenges.
Sensors, 2020

Saliency-based bit plane detection for network applications.
Multim. Tools Appl., 2020

Correction to: Countering Statistical Attacks in Cloud-Based Searchable Encryption.
Int. J. Parallel Program., 2020

Countering Statistical Attacks in Cloud-Based Searchable Encryption.
Int. J. Parallel Program., 2020

Local descriptor for retinal fundus image registration.
IET Comput. Vis., 2020

Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities.
IEEE Access, 2020

Heterogeneous Energy and Traffic Aware Sleep-Awake Cluster-Based Routing Protocol for Wireless Sensor Network.
IEEE Access, 2020

Informed RRT*-Connect: An Asymptotically Optimal Single-Query Path Planning Method.
IEEE Access, 2020

Hybrid RRT: A Semi-Dual-Tree RRT-Based Motion Planner.
IEEE Access, 2020

A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things.
IEEE Access, 2020

An Enhanced Two-factor Authentication Protocol for V2V Communication in VANETs.
Proceedings of the ICISS 2020: The 3rd International Conference on Information Science and System, 2020

Route Optimization by using Dijkstra's Algorithm for the Waste Management System.
Proceedings of the ICISS 2020: The 3rd International Conference on Information Science and System, 2020

2019
LocPass: A Graphical Password Method to Prevent Shoulder-Surfing.
Symmetry, 2019

Investigation of Fusion Features for Apple Classification in Smart Manufacturing.
Symmetry, 2019

A scene image classification technique for a ubiquitous visual surveillance system.
Multim. Tools Appl., 2019

A new image size reduction model for an efficient visual sensor network.
J. Vis. Commun. Image Represent., 2019

Approaches for preserving content integrity of sensitive online Arabic content: A survey and research challenges.
Inf. Process. Manag., 2019

An automatic zone detection system for safe landing of UAVs.
Expert Syst. Appl., 2019

Review on Security of Internet of Things Authentication Mechanism.
IEEE Access, 2019

Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model.
IEEE Access, 2019

2018
Searching on Encrypted E-Data Using Random Searchable Encryption (RanSCrypt) Scheme.
Symmetry, 2018

Image steganography in spatial domain: A survey.
Signal Process. Image Commun., 2018

Vision-Based Apple Classification for Smart Manufacturing.
Sensors, 2018

Intersection and Complement Set (IACS) Method to Reduce Redundant Node in Mobile WSN Localization.
Sensors, 2018

Comparative study of different binarization methods through their effects in characters localization in scene images.
Data Knowl. Eng., 2018

Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol.
IEEE Access, 2018

Empirical Study of Sperm Swarm Optimization Algorithm.
Proceedings of the Intelligent Systems and Applications, 2018

Sperm Swarm Optimization Algorithm for Optimizing Wireless Sensor Network Challenges.
Proceedings of the 6th International Conference on Communications and Broadband Networking, 2018

An Efficient Text Representation for Searching and Retrieving Classical Diacritical Arabic Text.
Proceedings of the Fourth International Conference On Arabic Computational Linguistics, 2018

2017
Low communication cost (LCC) scheme for localizing mobile wireless sensor networks.
Wirel. Networks, 2017

Energy harvesting and battery power based routing in wireless sensor networks.
Wirel. Networks, 2017

An Estimation of QoS for Classified Based Approach and Nonclassified Based Approach of Wireless Agriculture Monitoring Network Using a Network Model.
Wirel. Commun. Mob. Comput., 2017

Multi-Objective Optimization Algorithm Based on Sperm Fertilization Procedure (MOSFP).
Symmetry, 2017

SIFT-Symmetry: A robust detection method for copy-move forgery with reflection attack.
J. Vis. Commun. Image Represent., 2017

Sequential Monte Carlo Localization Methods in Mobile Wireless Sensor Networks: A Review.
J. Sensors, 2017

Preserving Content Integrity of Digital Holy Quran: Survey and Open Challenges.
IEEE Access, 2017

2016
A comparison study on node clustering techniques used in target tracking WSNs for efficient data aggregation.
Wirel. Commun. Mob. Comput., 2016

WDARS: A Weighted Data Aggregation Routing Strategy with Minimum Link Cost in Event-Driven WSNs.
J. Sensors, 2016

Copy-move forgery detection: Survey, challenges and future directions.
J. Netw. Comput. Appl., 2016

Chroma key background detection for digital video using statistical correlation of blurring artifact.
Digit. Investig., 2016

2015
Using finite state machine and a hybrid of EEG signal and EOG artifacts for an asynchronous wheelchair navigation.
Expert Syst. Appl., 2015

2014
Blind source mobile device identification based on recorded call.
Eng. Appl. Artif. Intell., 2014

Passive video forgery detection techniques: A survey.
Proceedings of the 10th International Conference on Information Assurance and Security, 2014

2013
Emergency vehicle preemption system based on global positioning system (GPS), A-star (A*) algorithm and FPGA.
Comput. Syst. Sci. Eng., 2013

2009
High-Speed Shortest Path Co-processor Design.
Proceedings of the Third Asia International Conference on Modelling & Simulation, 2009

2008
Reverse Engineering: EDOWA Worm Analysis and Classification.
Proceedings of the Advances in Electrical Engineering and Computational Science, 2008

Needleman Wunsch Implementation for SPAM/UCE Inline Filter.
Proceedings of the Seventh International Network Conference (INC 2008), 2008

2005
The Use of Virtual Reality in Science Subjects among Form Four to Form Six Students in Malaysia.
Proceedings of the iiWAS'2005, 2005


  Loading...