Shayla Islam

Orcid: 0000-0002-0490-7799

According to our database1, Shayla Islam authored at least 53 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Encrypted images in a V-BLAST assisted SC-FDMA wireless communication system.
Trans. Emerg. Telecommun. Technol., April, 2024

A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications.
Comput. Hum. Behav., April, 2024

Security Enabled New Term Weight Measure Technique with Data Driven for Next Generation Mobile Computing Networks.
Scalable Comput. Pract. Exp., February, 2024

Enhanced Elliptic Curve- Diffie Hellman Technique with Bigdata Analytics for Satellite Image Security Enhancement in Internet of Things Systems.
Earth Sci. Informatics, February, 2024

Multimodal Hate Speech Detection in Memes Using Contrastive Language-Image Pre-Training.
IEEE Access, 2024

2023
Novel residual hybrid machine learning for solar activity prediction in smart cities.
Earth Sci. Informatics, December, 2023

Data security in smart devices: Advancement, constraints and future recommendations.
IET Networks, November, 2023

Novel EBBDSA based Resource Allocation Technique for Interference Mitigation in 5G Heterogeneous Network.
Comput. Commun., September, 2023

Performance analysis of video data transmission for telemedicine applications with 5G enabled Internet of Things.
Comput. Electr. Eng., May, 2023

False data injection attack in smart grid cyber physical system: Issues, challenges, and future direction.
Comput. Electr. Eng., April, 2023

COVID-19 health data analysis and personal data preserving: A homomorphic privacy enforcement approach.
Comput. Commun., February, 2023

Optimized Visual Internet of Things for Video Streaming Enhancement in 5G Sensor Network Devices.
Sensors, 2023

Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations.
J. Netw. Comput. Appl., 2023

Content-Based remote sensing image retrieval method using adaptive tetrolet transform based GLCM features.
J. Intell. Fuzzy Syst., 2023

An Explainable Ensemble Deep Learning Approach for Intrusion Detection in Industrial Internet of Things.
IEEE Access, 2023

Predicting the Future Popularity of Academic Publications Using Deep Learning by Considering It as Temporal Citation Networks.
IEEE Access, 2023

Co-Evolving Popularity Prediction in Temporal Bipartite Networks: A Heuristics Based Model.
IEEE Access, 2023

Detection of Crucial Power Side Channel Data Leakage in Neural Networks.
Proceedings of the 33rd International Telecommunication Networks and Applications Conference, 2023

Optimization Technique for Deep Learning Methodology on Power Side Channel Attacks.
Proceedings of the 33rd International Telecommunication Networks and Applications Conference, 2023

Design of Lightweight Cryptography based Deep Learning Model for Side Channel Attacks.
Proceedings of the 33rd International Telecommunication Networks and Applications Conference, 2023

Android Based Mobile Information and Management Application for University.
Proceedings of the 13th IEEE International Conference on Control System, 2023

Perception of Co-supervisors in Doctoral Education Towards Mobile Information Systems for Higher Education in Malaysia.
Proceedings of the Design, Operation and Evaluation of Mobile Communications, 2023

2022
A Novel Resource Oriented DMA Framework for Internet of Medical Things Devices in 5G Network.
IEEE Trans. Ind. Informatics, 2022

Evolution of Industry and Blockchain Era: Monitoring Price Hike and Corruption Using BIoT for Smart Government and Industry 4.0.
IEEE Trans. Ind. Informatics, 2022

Securing Internet of Things devices against code tampering attacks using Return Oriented Programming.
Comput. Commun., 2022

Cloud to cloud data migration using self sovereign identity for 5G and beyond.
Clust. Comput., 2022

Energy efficient data detection with low complexity for an uplink multi-user massive MIMO system.
Comput. Electr. Eng., 2022

DVAEGMM: Dual Variational Autoencoder With Gaussian Mixture Model for Anomaly Detection on Attributed Networks.
IEEE Access, 2022

Collaborative Learning Assessment via Information and Communication Technology.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2022

Detect Phishing Website by Fuzzy Multi-Criteria Decision Making.
Proceedings of the 1st International Conference on AI in Cybersecurity, 2022

NFC-based Mobile Application for Student Attendance in Institution of Higher Learning.
Proceedings of the 1st International Conference on AI in Cybersecurity, 2022

Cybers Security Analysis and Measurement Tools Using Machine Learning Approach.
Proceedings of the 1st International Conference on AI in Cybersecurity, 2022

Securing Smart Cities Using Blockchain Technology.
Proceedings of the 1st International Conference on AI in Cybersecurity, 2022

Developing A Mobile Application for Fleet Vehicle Tracking.
Proceedings of the 1st International Conference on AI in Cybersecurity, 2022

Cyber Security Threats on Digital Banking.
Proceedings of the 1st International Conference on AI in Cybersecurity, 2022

Cloud Internet of Things in Medical and Smart Healthcare Applications.
Proceedings of the IoT and WSN based Smart Cities: A Machine Learning Perspective, 2022

Performance Analysis of Modulation Techniques over a Smart City Optical Communication Channel Under Weak Atmospheric Turbulence.
Proceedings of the IoT and WSN based Smart Cities: A Machine Learning Perspective, 2022

Window Functions for Phasor Signal Processing of Wide-Area Measurement in Smart Grid Internet of Things Communications.
Proceedings of the IoT and WSN based Smart Cities: A Machine Learning Perspective, 2022

2021
Communication Delay Modeling for Wide Area Measurement System in Smart Grid Internet of Things Networks.
Wirel. Commun. Mob. Comput., 2021

Machine Learning Technologies for Secure Vehicular Communication in Internet of Vehicles: Recent Advances and Applications.
Secur. Commun. Networks, 2021

Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications.
Complex., 2021

Constriction Factor Particle Swarm Optimization based load balancing and cell association for 5G heterogeneous networks.
Comput. Commun., 2021

Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications.
IEEE Access, 2021

An Improved Dynamic Thermal Current Rating Model for PMU-Based Wide Area Measurement Framework for Reliability Analysis Utilizing Sensor Cloud System.
IEEE Access, 2021

2020
Design and Evaluation of a Multihoming-Based Mobility Management Scheme to Support Inter Technology Handoff in PNEMO.
Wirel. Pers. Commun., 2020

A Novel Artificial Intelligence Based Timing Synchronization Scheme for Smart Grid Applications.
Wirel. Pers. Commun., 2020

2019
A Novel HGBBDSA-CTI Approach for Subcarrier Allocation in Heterogeneous Network.
Telecommun. Syst., 2019

2017
Design and Implementation of a Multihoming-Based Scheme to Support Mobility Management in NEMO.
Wirel. Pers. Commun., 2017

Dynamic Spectrum Allocation Scheme for Heterogeneous Network.
Wirel. Pers. Commun., 2017

2015
Design and Development of Hybrid Time Synchronization Scheme to Mitigate the Phase and Frequency error for Asynchronous Link in Heterogeneous Network.
J. Networks, 2015

Cluster-based time synchronisation scheme for femtocell network.
Int. J. Mob. Commun., 2015

2014
A multihoming-based mobility management scheme to reduce registration delay on proxy MIPv6 domain in NEMO.
Proceedings of the IEEE 2nd International Symposium on Telecommunication Technologies, 2014

Self-organizing joint sensing and power allocation scheme (SJSPA) to coordinate cross-tier interference for LTE-A heterogeneous networks.
Proceedings of the IEEE 2nd International Symposium on Telecommunication Technologies, 2014


  Loading...