Yasir Hussain

Orcid: 0000-0001-7318-8137

According to our database1, Yasir Hussain authored at least 24 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Fed-Inforce-Fusion: A federated reinforcement-based fusion model for security and privacy protection of IoMT networks against cyber-attacks.
Inf. Fusion, January, 2024

2023
Federated-SRUs: A Federated-Simple-Recurrent-Units-Based IDS for Accurate Detection of Cyber Attacks Against IoT-Augmented Industrial Control Systems.
IEEE Internet Things J., May, 2023

DFF-SC4N: A Deep Federated Defence Framework for Protecting Supply Chain 4.0 Networks.
IEEE Trans. Ind. Informatics, March, 2023

Boosting source code suggestion with self-supervised Transformer Gated Highway.
J. Syst. Softw., 2023

Enhancing Code Completion with Implicit Feedback.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

Understanding and Enhancing Issue Prioritization in GitHub.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Optimized Tokenization Process for Open-Vocabulary Code Completion: An Empirical Study.
Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, 2023

2022
Exploring the Impact of Balanced and Imbalanced Learning in Source Code Suggestion.
Int. J. Softw. Eng. Knowl. Eng., 2022

Learning to transfer knowledge from RDF Graphs with gated recurrent units.
Intell. Data Anal., 2022

Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control Systems.
Ad Hoc Networks, 2022

Improving Code Completion by Sequence Features and Structural Features.
Proceedings of the 4th World Symposium on Software Engineering, 2022

2021
Global Sensitivity Analysis for Fuzzy RDF Data.
Int. J. Softw. Eng. Knowl. Eng., 2021

Improving source code suggestion with code embedding and enhanced convolutional long short-term memory.
IET Softw., 2021

A privacy-conserving framework based intrusion detection method for detecting and recognizing malicious behaviours in cyber-physical power networks.
Appl. Intell., 2021

Deep Learning-Based Resolution Prediction of Software Enhancement Reports.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

2020
CodeGRU: Context-aware deep learning with gated recurrent unit for source code modeling.
Inf. Softw. Technol., 2020

Deep Transfer Learning for Source Code Modeling.
Int. J. Softw. Eng. Knowl. Eng., 2020

Context-Aware Trust and Reputation Model for Fog-Based IoT.
IEEE Access, 2020

SIOT-RIMM: Towards Secure IOT-Requirement Implementation Maturity Model.
Proceedings of the EASE '20: Evaluation and Assessment in Software Engineering, 2020

Towards continues code recommendation and implementation system: An Initial Framework.
Proceedings of the EASE '20: Evaluation and Assessment in Software Engineering, 2020

2019
DeepVS: An Efficient and Generic Approach for Source Code Modeling Usage.
CoRR, 2019

HML-IDS: A Hybrid-Multilevel Anomaly Prediction Approach for Intrusion Detection in SCADA Systems.
IEEE Access, 2019

2018
TRFIoT: Trust and Reputation Model for Fog-based IoT.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A taxonomy of mobile games based on structural similarity.
Proceedings of the International Conference on Advancements in Computational Sciences, 2018


  Loading...