Yasir Hussain
Cited by
Cited by
HML-IDS: A hybrid-multilevel anomaly prediction approach for intrusion detection in SCADA systems
IA Khan, D Pi, ZU Khan, Y Hussain, A Nawaz
IEEE Access 7, 89507-89521, 2019
iRSpot-SPI: Deep learning-based recombination spots prediction by incorporating secondary sequence information coupled with physio-chemical properties via Chou's 5-step rule …
ZU Khan, F Ali, IA Khan, Y Hussain, D Pi
Chemometrics and Intelligent Laboratory Systems 189, 169-180, 2019
A privacy-conserving framework based intrusion detection method for detecting and recognizing malicious behaviours in cyber-physical power networks
IA Khan, D Pi, N Khan, ZU Khan, Y Hussain, A Nawaz, F Ali
Applied Intelligence, 1-16, 2021
Context-aware trust and reputation model for fog-based IoT
Y Hussain, H Zhiqiu, MA Akbar, A Alsanad, AAA Alsanad, A Nawaz, ...
IEEE Access 8, 31622-31632, 2020
Convolutional LSTM based transportation mode learning from raw GPS trajectories
A Nawaz, H Zhiqiu, W Senzhang, Y Hussain, I Khan, Z Khan
IET Intelligent Transport Systems 14 (6), 570-577, 2020
CodeGRU: Context-aware deep learning with gated recurrent unit for source code modeling
Y Hussain, Z Huang, Y Zhou, S Wang
Information and Software Technology 125, 106309, 2020
Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control Systems
IA Khan, M Keshk, D Pi, N Khan, Y Hussain, H Soliman
Ad Hoc Networks 134, 102930, 2022
Deep transfer learning for source code modeling
Y Hussain, Z Huang, Y Zhou, S Wang
International Journal of Software Engineering and Knowledge Engineering 30 …, 2020
TRFIoT: Trust and Reputation Model for Fog-based IoT
Y Hussain, Z Huang
International Conference on Cloud Computing and Security 11068 (Cloud …, 2018
Efficient behaviour specification and bidirectional gated recurrent units‐based intrusion detection method for industrial control systems
IA Khan, D Pi, P Yue, B Li, ZU Khan, Y Hussain, A Nawaz
Electronics Letters 56 (1), 27-30, 2020
DFF-SC4N: A deep federated defence framework for protecting supply chain 4.0 networks
IA Khan, N Moustafa, D Pi, Y Hussain, NA Khan
IEEE Transactions on Industrial Informatics 19 (3), 3300-3309, 2021
Federated-SRUs: A federated simple recurrent units-based IDS for accurate detection of cyber attacks against IoT-augmented industrial control systems
IA Khan, D Pi, MZ Abbas, U Zia, Y Hussain, H Soliman
IEEE Internet of Things Journal, 2022
Improving source code suggestion with code embedding and enhanced convolutional long short‐term memory
Y Hussain, Z Huang, Y Zhou
IET Software 15 (3), 199-213, 2021
Mode Inference using enhanced Segmentation and Pre-processing on raw Global Positioning System data
A Nawaz, H Zhiqiu, W Senzhang, Y Hussain, A Naseer, M Izhar, Z Khan
Measurement and Control 53 (7-8), 1144-1158, 2020
Fed-inforce-fusion: A federated reinforcement-based fusion model for security and privacy protection of IoMT networks against cyber-attacks
IA Khan, I Razzak, D Pi, N Khan, Y Hussain, B Li, T Kousar
Information Fusion 101, 102002, 2024
SIOT-RIMM: Towards secure IOT-requirement implementation maturity model
M Hamza, H Hu, MA Akbar, F Mehmood, Y Hussain, AM Baddour
Proceedings of the 24th International Conference on Evaluation and …, 2020
DeepVS: an efficient and generic approach for source code modelling usage
Y Hussain, Z Huang, Y Zhou, S Wang
Electronics Letters 56 (12), 604-607, 2020
Boosting source code suggestion with self-supervised Transformer Gated Highway
Y Hussain, Z Huang, Y Zhou, S Wang
Journal of Systems and Software 196, 111553, 2023
Deep learning-based resolution prediction of software enhancement reports
MA Arshad, Z Huang, A Riaz, Y Hussain
2021 IEEE 11th Annual Computing and Communication Workshop and Conference …, 2021
Optimized Tokenization Process for Open-Vocabulary Code Completion: An Empirical Study
Y Hussain, Z Huang, Y Zhou, IA Khan, N Khan, MZ Abbas
Proceedings of the 27th International Conference on Evaluation and …, 2023
The system can't perform the operation now. Try again later.
Articles 1–20