Yasir Ali

Orcid: 0000-0002-5770-0062

According to our database1, Yasir Ali authored at least 32 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Chaos-Encryption-Based Secure Polar Coding for Network-Oriented Cloud Control System.
IEEE Trans. Ind. Informatics, March, 2024

Reliability weight-based extended puncturing mechanism for polar codes using translation shift.
Trans. Emerg. Telecommun. Technol., January, 2024

Efficient Hardware Realization of SC Polar Decoders Using Compound Pipelined Processing Units and Auxiliary Registers.
IEEE Access, 2024

2023
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review.
J. Big Data, December, 2023

Assessing a Connected Environment's Safety Impact During Mandatory Lane-Changing: A Block Maxima Approach.
IEEE Trans. Intell. Transp. Syst., June, 2023

A Survey on harnessing the Applications of Mobile Computing in Healthcare during the COVID-19 Pandemic: Challenges and Solutions.
Comput. Networks, April, 2023

Features Vectors of IDriveGenes: Cancer Driver Genes Dataset.
Dataset, March, 2023

GPU-Accelerated Deep Learning-Based Correlation Attack on Tor Networks.
IEEE Access, 2023

IDriveGenes: Cancer Driver Genes Prediction Using Machine Learning.
IEEE Access, 2023

AI-Based Hand Gesture Recognition Through Camera on Robot.
Proceedings of the International Conference on Frontiers of Information Technology, 2023

2022
Highly Accurate and Reliable Wireless Network Slicing in 5th Generation Networks: A Hybrid Deep Learning Approach.
J. Netw. Syst. Manag., 2022

Designing evaluation framework for the empirical assessment of COVID-19 mobile apps in Pakistan.
Comput. Electr. Eng., 2022

GTM approach towards engineering a features-oriented evaluation framework for secure authentication in IIoT environment.
Comput. Ind. Eng., 2022

Hybrid Deep Learning Framework for Reduction of Mixed Noise via Low Rank Noise Estimation.
IEEE Access, 2022

2021
MCDM Approach for Assigning Task to the Workers by Selected Features Based on Multiple Criteria in Crowdsourcing.
Sci. Program., 2021

Chromatic spectrum of some classes of 2-regular bipartite colored graphs.
J. Intell. Fuzzy Syst., 2021

A context-aware framework for modelling and verification of smart parking systems in urban cities.
Concurr. Comput. Pract. Exp., 2021

Characterization of Extremal Unicyclic Graphs Using F-Coindex.
Complex., 2021

Corporate Bankruptcy Prediction: An Approach Towards Better Corporate World.
Comput. J., 2021

2020
ISA Evaluation Framework for Security of Internet of Health Things System Using AHP-TOPSIS Methods.
IEEE Access, 2020

A Hybrid MCDM Approach of Selecting Lightweight Cryptographic Cipher Based on ISO and NIST Lightweight Cryptography Security Requirements for Internet of Health Things.
IEEE Access, 2020

Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review.
IEEE Access, 2020

Robust Head Detection in Complex Videos Using Two-Stage Deep Convolution Framework.
IEEE Access, 2020

2019
Internet of Things for Healthcare Using Effects of Mobile Computing: A Systematic Literature Review.
Wirel. Commun. Mob. Comput., 2019

Detection of Schistosomiasis Factors Using Association Rule Mining.
IEEE Access, 2019

Flow of a Nanofluid and Heat Transfer in Channel With Contracting/Expanding Walls.
IEEE Access, 2019

2017
Pairwise Stability in Two Sided Market with Strictly Increasing Valuation Functions.
Discret. Math. Theor. Comput. Sci., 2017

Human Factors in Modelling Mixed Traffic of Traditional, Connected, and Automated Vehicles.
Proceedings of the Advances in Human Factors in Simulation and Modeling, 2017

2015
A framework for detecting energy bugs in smartphones.
Proceedings of the 6th International Conference on the Network of the Future, 2015

2014
Categorizing configuration parameters of smartphones for energy performance testing.
Proceedings of the 9th International Workshop on Automation of Software Test, 2014

2012
Security and privacy threats in IoT architectures.
Proceedings of the 7th International Conference on Body Area Networks, 2012

2004
Flexible and Scalable Public Key Security for SSH.
Proceedings of the Public Key Infrastructure, 2004


  Loading...