default search action
Mohammad M. Masud 0001
Person information
- affiliation: United Arab Emirates University, Abu Dhabi, UAE
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c39]Namya Musthafa, Mohammad Mehedy Masud, Qurban Memon:
Advancing Early-Stage Brain Tumor Detection with Segmentation by Modified_Unet. ICMHI 2024: 52-57 - [c38]Moomal Farhad, Mohammad M. Masud:
Automated LVH Grading: Integration of Deep Learning and Explainable AI for Accurate Diagnosis. ICMHI 2024: 212-218 - 2023
- [j28]Jamalia Sultana, Benzir Md Ahmed, Mohammad Mehedy Masud, A. K. Obidul Huq, Mohammed Eunus Ali, Mahmuda Naznin:
A Study on Food Value Estimation From Images: Taxonomies, Datasets, and Techniques. IEEE Access 11: 45910-45935 (2023) - [j27]Moomal Farhad, Mohammad Mehedy Masud, Azam Beg, Amir Ahmad, Luai Awad Ahmed, Sehar Memon:
A data-efficient zero-shot and few-shot Siamese approach for automated diagnosis of left ventricular hypertrophy. Comput. Biol. Medicine 163: 107129 (2023) - [j26]Hadeel T. El Kassabi, Mohamed Adel Serhani, Mohammad M. Masud, Khaled Shuaib, Khaled Khalil:
Deep learning approach to security enforcement in cloud workflow orchestration. J. Cloud Comput. 12(1): 10 (2023) - [j25]Kadhim Hayawi, Susmita Saha, Mohammad Mehedy Masud, Sujith Samuel Mathew, Mohammed Kaosar:
Social media bot detection with deep learning methods: a systematic review. Neural Comput. Appl. 35(12): 8903-8918 (2023) - [c37]Heba Helal, Mohamed A. Sharaf, Mohammad M. Masud, Panos K. Chrysanthis:
TiVEx: Optimized Processing for Time Series Visual Exploration. AICCSA 2023: 1-8 - [c36]Shamma Esmaeel Jamali, Mohammad Mehedy Masud:
Orbit Propagation and Determination using Genetic Algorithms. IIT 2023: 13-19 - [c35]Ashika Sameem Abdul Rasheed, Mohammad Mehedy Masud, Mohammed Abduljabbar:
A Comparative Study of Transformer Based Pretrained AI Models for Content Summarization. IIT 2023: 79-84 - [c34]Mariam Alkaabi, Meera Albloushi, Alyazia Alkaabi, Amna Alhammadi, Fatima Alketbi, Mohammad M. Masud:
An Enhanced Deepfake Video Detection Technique. IIT 2023: 234-239 - [c33]Shama Alalawi, Safa Baalfaqih, Maitha Almeqbaali, Mohammad M. Masud:
Social Media Misinformation Propagation and Detection. IIT 2023: 240-245 - [i3]Subangkar Karmaker Shanto, Shoumik Saha, Atif Hasan Rahman, Mohammad Mehedy Masud, Mohammed Eunus Ali:
Contrastive Self-Supervised Learning Based Approach for Patient Similarity: A Case Study on Atrial Fibrillation Detection from PPG Signal. CoRR abs/2308.02433 (2023) - 2022
- [j24]Wasif Khan, Nazar Zaki, Amir Ahmad, Mohammad Mehedy Masud, Luqman Ali, Nasloon Ali, Luai Awad Ahmed:
Mixed Data Imputation Using Generative Adversarial Networks. IEEE Access 10: 124475-124490 (2022) - [j23]Sarkar Snigdha Sarathi Das, Subangkar Karmaker Shanto, Masum Rahman, Md. Saiful Islam, Atif Hasan Rahman, Mohammad Mehedy Masud, Mohammed Eunus Ali:
BayesBeat: Reliable Atrial Fibrillation Detection from Noisy Photoplethysmography Data. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(1): 8:1-8:21 (2022) - [j22]Nasloon Ali, Wasif Khan, Amir Ahmad, Mohammad Mehedy Masud, Hiba Adam, Luai Awad Ahmed:
Predictive Modeling for the Diagnosis of Gestational Diabetes Mellitus Using Epidemiological Data in the United Arab Emirates. Inf. 13(10): 485 (2022) - [j21]Kadhim Hayawi, Sujith Samuel Mathew, Neethu Venugopal, Mohammad M. Masud, Pin-Han Ho:
DeeProBot: a hybrid deep neural network model for social bot detection based on user profile data. Soc. Netw. Anal. Min. 12(1): 43 (2022) - 2021
- [j20]Imad Jawhar, Sheng Zhang, Jie Wu, Nader Mohamed, Mohammad M. Masud:
Distributed Algorithms for Multiple Path Backbone Discovery in Thick Linear Sensor Networks. J. Sens. Actuator Networks 10(3): 49 (2021) - [j19]Nusrat Jafrin, Mohammad Mehedy Masud, Abu Naser Mohammad Saif, Masnun Mahi, Moriam Khanam:
A panel data estimation of the determinants of life expectancy in selected SAARC countries. Oper. Res. Decis. 31(4) (2021) - [c32]Moomal Farhad, Mohammad M. Masud, Azam Beg:
Deep Learning Based Cardiac Phase Detection Using Echocardiography Imaging. ADMA 2021: 3-17 - [c31]Mohammad M. Masud, Kadhim Hayawi, Sujith Samuel Mathew, Temesgen Michael, Mai El Barachi:
Smart Online Exam Proctoring Assist for Cheating Detection. ADMA 2021: 118-132 - [c30]Imran Makhdoom, Kadhim Hayawi, Mohammed Kaosar, Sujith Samuel Mathew, Mohammad Mehedy Masud:
Blockchain-based Secure CIDS Operation. CSNet 2021: 103-106 - 2020
- [j18]Kadhim Hayawi, Zouheir Trabelsi, Safaa Zeidan, Mohammad M. Masud:
Thwarting ICMP Low-Rate Attacks Against Firewalls While Minimizing Legitimate Traffic Loss. IEEE Access 8: 78029-78043 (2020) - [j17]Noura H. Al Nuaimi, Mohammad M. Masud:
Online streaming feature selection with incremental feature grouping. WIREs Data Mining Knowl. Discov. 10(4) (2020) - [c29]Mohammad M. Masud, Kadhim Hayawi, Sujith Samuel Mathew, Ahmed Dirir, Muhsin Cheratta:
Effective Patient Similarity Computation for Clinical Decision Support Using Time Series and Static Data. ACSW 2020: 33:1-33:8 - [i2]Sarkar Snigdha Sarathi Das, Subangkar Karmaker Shanto, Masum Rahman, Md. Saiful Islam, Atif Rahman, Mohammad Mehedy Masud, Mohammed Eunus Ali:
BayesBeat: A Bayesian Deep Learning Approach for Atrial Fibrillation Detection from Noisy Photoplethysmography Data. CoRR abs/2011.00753 (2020)
2010 – 2019
- 2018
- [c28]Mohammad Mehedy Masud, Muhsin Cheratta:
A Framework for Utilizing Lab Test Results for Clinical Prediction of ICU Patients. AAAI Workshops 2018: 479-486 - 2017
- [j16]Zouheir Trabelsi, Mohammed Al Matrooshi, Saeed Al Bairaq, Walid Ibrahim, Mohammad M. Masud:
Android based mobile apps for information security hands-on education. Educ. Inf. Technol. 22(1): 125-144 (2017) - [j15]Zouheir Trabelsi, Safaa Zeidan, Mohammad M. Masud:
Hybrid mechanism towards network packet early acceptance and rejection for unified threat management. IET Inf. Secur. 11(2): 104-113 (2017) - [j14]Mohammad M. Masud, Mohamed Adel Serhani, Alramzana Nujum Navaz:
Resource-Aware Mobile-Based Health Monitoring. IEEE J. Biomed. Health Informatics 21(2): 349-360 (2017) - [c27]Bo Dong, Yifan Li, Yang Gao, Ahsanul Haque, Latifur Khan, Mohammad M. Masud:
Multistream regression with asynchronous concept drift detection. IEEE BigData 2017: 596-605 - [c26]Noura H. Al Nuaimi, Mohammad M. Masud:
Toward Optimal Streaming Feature Selection. DSAA 2017: 775-782 - [c25]Mohammad Mehedy Masud, Muhsin Cheratta, Abdel Rahman Al Harahsheh:
Survival prediction of ICU patients using knowledge intensive data grouping and selection. ICTA 2017: 1-6 - [c24]Imad Jawhar, Sheng Zhang, Jie Wu, Nader Mohamed, Mohammad M. Masud:
Efficient topology discovery and routing in thick wireless Linear Sensor Networks. INFOCOM Workshops 2017: 91-96 - 2016
- [j13]Zouheir Trabelsi, Mohammad M. Masud:
An extended identity-based cryptography protocol based on biometric. Int. J. Inf. Priv. Secur. Integr. 2(3): 232-256 (2016) - [j12]Tahseen Al-Khateeb, Mohammad M. Masud, Khaled Al-Naami, Sadi Evren Seker, Ahmad M. Mustafa, Latifur Khan, Zouheir Trabelsi, Charu C. Aggarwal, Jiawei Han:
Recurring and Novel Class Detection Using Class-Based Ensemble for Evolving Data Stream. IEEE Trans. Knowl. Data Eng. 28(10): 2752-2764 (2016) - [c23]Zouheir Trabelsi, Safaa Zeidan, Mohammad M. Masud:
Network Packet Filtering and Deep Packet Inspection Hybrid Mechanism for IDS Early Packet Matching. AINA 2016: 808-815 - [c22]Mohammad Mehedy Masud, Abdel Rahman Al Harahsheh:
Mortality prediction of ICU patients using lab test data by feature vector compaction & classification. IEEE BigData 2016: 3404-3411 - 2015
- [j11]Zouheir Trabelsi, Safaa Zeidan, Mohammad M. Masud, Kilani Ghoudi:
Statistical dynamic splay tree filters towards multilevel firewall packet filtering enhancement. Comput. Secur. 53: 109-131 (2015) - [j10]Zouheir Trabelsi, Mohamed Al-Hemairy, Mohammad M. Masud:
On Investigating the Effectiveness of Biometric Readers in Thwarting Network Attacks: A Secure Architecture Design Proposal. J. Intell. Syst. 24(2): 199-213 (2015) - [j9]Eman Abu Khousa, Yacine Atif, Mohammad M. Masud:
A social learning analytics approach to cognitive apprenticeship. Smart Learn. Environ. 2(1): 14 (2015) - [c21]Hind Obaid Al Falasi, Mohammad M. Masud, Nader Mohamed:
Trusting the same: Using similarity to establish trust among vehicles. CTS 2015: 64-69 - [c20]Mohammad M. Masud, Ameera Al-Shehhi, Eiman Al-Shamsi, Shamma Al-Hassani, Asmaa Al-Hamoudi, Latifur Khan:
Online Prediction of Chess Match Result. PAKDD (1) 2015: 525-537 - [i1]Noura H. Al Nuaimi, Mohammad M. Masud, Farhan Mohammed:
ICU Patient Deterioration prediction: a Data-Mining Approach. CoRR abs/1511.06910 (2015) - 2014
- [c19]Leila Ismail, Mohammad M. Masud, Latifur Khan:
FSBD: A Framework for Scheduling of Big Data Mining in Cloud Computing. BigData Congress 2014: 514-521 - [c18]Mohammad M. Masud, Umniya Mustafa, Zouheir Trabelsi:
A data driven firewall for faster packet filtering. COMNET 2014: 1-5 - 2013
- [j8]Mohammad M. Masud, Qing Chen, Latifur Khan, Charu C. Aggarwal, Jing Gao, Jiawei Han, Ashok Srivastava, Nikunj C. Oza:
Classification and Adaptive Novel Class Detection of Feature-Evolving Data Streams. IEEE Trans. Knowl. Data Eng. 25(7): 1484-1497 (2013) - [c17]Umniya Mustafa, Mohammad M. Masud, Zouheir Trabelsi, Timothy Wood, Zainab Al Harthi:
Firewall performance optimization using data mining techniques. IWCMC 2013: 934-940 - 2012
- [c16]Tahseen Al-Khateeb, Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham:
Cloud Guided Stream Classification Using Class-Based Ensemble. IEEE CLOUD 2012: 694-701 - [c15]Tahseen Al-Khateeb, Mohammad M. Masud, Latifur Khan, Charu C. Aggarwal, Jiawei Han, Bhavani Thuraisingham:
Stream Classification with Recurring and Novel Class Detection Using Class-Based Ensemble. ICDM 2012: 31-40 - 2011
- [j7]Mohammad M. Masud, Clay Woolam, Jing Gao, Latifur Khan, Jiawei Han, Kevin W. Hamlen, Nikunj C. Oza:
Facing the reality of data stream classification: coping with scarcity of labeled data. Knowl. Inf. Syst. 33(1): 213-244 (2011) - [j6]Mohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han, Bhavani M. Thuraisingham:
Classification and Novel Class Detection in Concept-Drifting Data Streams under Time Constraints. IEEE Trans. Knowl. Data Eng. 23(6): 859-874 (2011) - [j5]Mohammad Farhan Husain, James P. McGlothlin, Mohammad M. Masud, Latifur R. Khan, Bhavani M. Thuraisingham:
Heuristics-Based Query Processing for Large RDF Graphs Using Cloud Computing. IEEE Trans. Knowl. Data Eng. 23(9): 1312-1327 (2011) - [j4]Mohammad M. Masud, Tahseen Al-Khateeb, Kevin W. Hamlen, Jing Gao, Latifur Khan, Jiawei Han, Bhavani Thuraisingham:
Cloud-based malware detection for evolving data streams. ACM Trans. Manag. Inf. Syst. 2(3): 16:1-16:27 (2011) - [c14]Mohammad M. Masud, Tahseen Al-Khateeb, Latifur Khan, Charu C. Aggarwal, Jing Gao, Jiawei Han, Bhavani Thuraisingham:
Detecting Recurring and Novel Classes in Concept-Drifting Data Streams. ICDM 2011: 1176-1181 - 2010
- [c13]Mohammad M. Masud, Qing Chen, Latifur Khan, Charu C. Aggarwal, Jing Gao, Jiawei Han, Bhavani Thuraisingham:
Addressing Concept-Evolution in Concept-Drifting Data Streams. ICDM 2010: 929-934 - [c12]Mohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han, Bhavani Thuraisingham:
Classification and Novel Class Detection in Data Streams with Active Mining. PAKDD (2) 2010: 311-324 - [c11]Mohammad M. Masud, Qing Chen, Jing Gao, Latifur Khan, Jiawei Han, Bhavani Thuraisingham:
Classification and Novel Class Detection of Data Streams in a Dynamic Feature Space. ECML/PKDD (2) 2010: 337-352
2000 – 2009
- 2009
- [j3]Kevin W. Hamlen, Vishwath Mohan, Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham:
Exploiting an antivirus interface. Comput. Stand. Interfaces 31(6): 1182-1189 (2009) - [c10]Clay Woolam, Mohammad M. Masud, Latifur Khan:
Lacking Labels in the Stream: Classifying Evolving Stream Data with Few Labels. ISMIS 2009: 552-562 - [c9]Mohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han, Bhavani Thuraisingham:
A Multi-partition Multi-chunk Ensemble Technique to Classify Concept-Drifting Data Streams. PAKDD 2009: 363-375 - [c8]Mohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han, Bhavani Thuraisingham:
Integrating Novel Class Detection with Classification for Concept-Drifting Data Streams. ECML/PKDD (2) 2009: 79-94 - 2008
- [j2]Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham:
A scalable multi-level feature extraction technique to detect malicious executables. Inf. Syst. Frontiers 10(1): 33-45 (2008) - [c7]Mohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han, Bhavani Thuraisingham:
Peer to peer botnet detection for cyber-security: a data mining approach. CSIIRW 2008: 39:1-39:2 - [c6]Bhavani Thuraisingham, Latifur Khan, Mohammad M. Masud, Kevin W. Hamlen:
Data Mining for Security Applications. EUC (2) 2008: 585-589 - [c5]Mohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han, Bhavani Thuraisingham:
A Practical Approach to Classify Evolving Data Streams: Training with Limited Amount of Labeled Data. ICDM 2008: 929-934 - [c4]Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham, Xinran Wang, Peng Liu, Sencun Zhu:
Detecting Remote Exploits Using Data Mining. IFIP Int. Conf. Digital Forensics 2008: 177-189 - 2007
- [j1]Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham:
E-Mail Worm Detection Using Data Mining. Int. J. Inf. Secur. Priv. 1(4): 47-61 (2007) - [c3]Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham:
A Hybrid Model to Detect Malicious Executables. ICC 2007: 1443-1448 - [c2]Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham:
Feature Based Techniques for Auto-Detection of Novel Email Worms. PAKDD 2007: 205-216 - 2006
- [c1]Mohammad M. Masud, Latifur Khan, Ehab Al-Shaer:
Email Worm Detection Using Naïve Bayes and Support Vector Machine. ISI 2006: 733-734
Coauthor Index
aka: Latifur R. Khan
aka: Bhavani M. Thuraisingham
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint