default search action
Saddam Hussain
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j48]Asad Ul Haq Hashmi, Ghias Uddin Mir, Kashif Sattar, Syed Sajid Ullah, Roobaea Alroobaea, Jawaid Iqbal, Saddam Hussain:
Effects of IoT Communication Protocols for Precision Agriculture in Outdoor Environments. IEEE Access 12: 46410-46421 (2024) - [j47]Saddam Hussain, Gourav Arora, Rajesh Kumar:
An efficient semi-analytical technique to solve multi-dimensional Burgers' equation. Comput. Appl. Math. 43(1): 11 (2024) - [j46]Saddam Hussain, Xingpeng Lei, Hongqi Wu, Hao Li, Haiyan Song, Decong Zheng, Wang Jiawei, Anbang Li, Muhammad Usman Farid, Abdul Ghafoor:
Optimizing the design of a multi-stage tangential roller threshing unit using CFD modeling and experimental studies. Comput. Electron. Agric. 226: 109400 (2024) - [j45]Saddam Hussain, Rajesh Kumar:
Elzaki projected differential transform method for multi-dimensional aggregation and combined aggregation-breakage equations. J. Comput. Sci. 75: 102211 (2024) - [i5]Amin Ullah, Guilin Qi, Saddam Hussain, Irfan Ullah, Zafar Ali:
The Role of LLMs in Sustainable Smart Cities: Applications, Challenges, and Future Directions. CoRR abs/2402.14596 (2024) - [i4]Sanjiv Kumar Bariwal, Saddam Hussain, Rajesh Kumar:
Non-linear collision-induced breakage equation: finite volume and semi-analytical methods. CoRR abs/2403.08457 (2024) - [i3]Shweta, Saddam Hussain, Rajesh Kumar:
Semi-Analytical Methods for Population Balance models involving Aggregation and Breakage processes: A comparative study. CoRR abs/2403.11595 (2024) - [i2]Shweta, Saddam Hussain, Rajesh Kumar:
Hybridized Projected Differential Transform Method For collisional-breakage equation. CoRR abs/2410.00019 (2024) - 2023
- [j44]Muhammad Irfan Khalid, Ibtisam Ehsan, Ayman Khallel Ibrahim Al-Ani, Jawaid Iqbal, Saddam Hussain, Syed Sajid Ullah, Nayab:
A Comprehensive Survey on Blockchain-Based Decentralized Storage Networks. IEEE Access 11: 10995-11015 (2023) - [j43]Syed Muhammad Ahmed Hassan Shah, Asad Ullah, Jawaid Iqbal, Sami Bourouis, Syed Sajid Ullah, Saddam Hussain, Muhammad Qasim Khan, Yaser Ali Shah, Ghulam Mustafa:
Classifying and Localizing Abnormalities in Brain MRI Using Channel Attention Based Semi-Bayesian Ensemble Voting Mechanism and Convolutional Auto-Encoder. IEEE Access 11: 75528-75545 (2023) - [j42]Nasir Ayub, Tayyaba, Saddam Hussain, Syed Sajid Ullah, Jawaid Iqbal:
An Efficient Optimized DenseNet Model for Aspect-Based Multi-Label Classification. Algorithms 16(12): 548 (2023) - [j41]Syed Sajid Ullah, Saddam Hussain, Ihsan Ali, Spyridon Mastorakis:
A Secure Ndn-based Architecture For Electronic Voting In 6g. IEEE Commun. Stand. Mag. 7(4): 20-26 (2023) - [j40]Gourav Arora, Saddam Hussain, Rajesh Kumar:
Comparison of variational iteration and Adomian decomposition methods to solve growth, aggregation and aggregation-breakage equations. J. Comput. Sci. 67: 101973 (2023) - [j39]Syed Muhammad Arif, Bakht Amin Bacha, Syed Sajid Ullah, Saddam Hussain, Muhammad Haneef:
Correction to: Tunable control of internet of things information hacking by application of the induced chiral atomic medium. Soft Comput. 27(10): 6891 (2023) - [c3]Syed Muhammad Ahmed Hassan Shah, Syed Faizan Hussain Shah, Saddam Hussain, Kanishka Sauis Turrakheil:
Traffic Forecasting & Route Optimization in Smart Environment Using Graph Representation Learning. ISC2 2023: 1-5 - 2022
- [j38]C. H. Anwar ul Hassan, Muhammad Hammad, Mueen Uddin, Jawaid Iqbal, Jawad Sahi, Saddam Hussain, Syed Sajid Ullah:
Optimizing the Performance of Data Warehouse by Query Cache Mechanism. IEEE Access 10: 13472-13480 (2022) - [j37]Usman Khalil, Mueen Uddin, Owais Ahmed Malik, Saddam Hussain:
A Blockchain Footprint for Authentication of IoT-Enabled Smart Devices in Smart Cities: State-of-the-Art Advancements, Challenges and Future Research Directions. IEEE Access 10: 76805-76823 (2022) - [j36]Insaf Ullah, Abdullah Alomari, Ako Muhammad Abdullah, Neeraj Kumar, Amjad Alsirhani, Fazal Noor, Saddam Hussain, Muhammad Asghar Khan:
Certificate-Based Signcryption Scheme for Securing Wireless Communication in Industrial Internet of Things. IEEE Access 10: 105182-105194 (2022) - [j35]Saddam Hussain, Syed Sajid Ullah, Ihsan Ali:
An efficient content source verification scheme for multi-receiver in NDN-based Internet of Things. Clust. Comput. 25(3): 1749-1764 (2022) - [j34]Saddam Hussain, Syed Sajid Ullah, Ihsan Ali, Jiafeng Xie, Venkata N. Inukollu:
Certificateless signature schemes in Industrial Internet of Things: A comparative survey. Comput. Commun. 181: 116-131 (2022) - [j33]Insaf Ullah, Muhammad Asghar Khan, Fazlullah Khan, Mian Ahmad Jan, Ram Srinivasan, Spyridon Mastorakis, Saddam Hussain, Hizbullah Khattak:
An Efficient and Secure Multimessage and Multireceiver Signcryption Scheme for Edge-Enabled Internet of Vehicles. IEEE Internet Things J. 9(4): 2688-2697 (2022) - [j32]Wajid Ali, Mehboob Ali, Israr Hussain, Syed Sajid Ullah, Roobaea Alroobaea, Saddam Hussain, Ahmed Binmahfoudh, Fazlullah Umar:
A New Correlation Coefficient for T -Spherical Fuzzy Sets and Its Application in Multicriteria Decision-Making and Pattern Recognition. J. Sensors 2022: 1-11 (2022) - [j31]Saddam Hussain, Syed Sajid Ullah, Mueen Uddin, Jawaid Iqbal, Chin-Ling Chen:
A Comprehensive Survey on Signcryption Security Mechanisms in Wireless Body Area Networks. Sensors 22(3): 1072 (2022) - [j30]Syed Sajid Ullah, Saddam Hussain, Mueen Uddin, Roobaea Alroobaea, Jawaid Iqbal, Abdullah M. Baqasah, Maha S. Abdelhaq, Raed A. Alsaqour:
A Computationally Efficient Online/Offline Signature Scheme for Underwater Wireless Sensor Networks. Sensors 22(14): 5150 (2022) - [j29]Sardar Waqar Khan, Qasim Hafeez, Muhammad Irfan Khalid, Roobaea Alroobaea, Saddam Hussain, Jawaid Iqbal, Jasem Almotiri, Syed Sajid Ullah:
Anomaly Detection in Traffic Surveillance Videos Using Deep Learning. Sensors 22(17): 6563 (2022) - [j28]Ch Anwar ul Hassan, Jawaid Iqbal, Rizwana Irfan, Saddam Hussain, Abeer D. Algarni, Syed Sabir Hussain Bukhari, Nazik Alturki, Syed Sajid Ullah:
Effectively Predicting the Presence of Coronary Heart Disease Using Machine Learning Classifiers. Sensors 22(19): 7227 (2022) - [j27]Tehreem Ashfaq, Muhammad Irfan Khalid, Gauhar Ali, Mohammed Ahmed El-Affendi, Jawaid Iqbal, Saddam Hussain, Syed Sajid Ullah, Adamu Sani Yahaya, Rabiya Khalid, Abdul Mateen:
An Efficient and Secure Energy Trading Approach with Machine Learning Technique and Consortium Blockchain. Sensors 22(19): 7263 (2022) - [j26]Naveed Ahmed, Md. Asri Bin Ngadi, Johan Mohamad Sharif, Saddam Hussain, Mueen Uddin, Muhammad Siraj Rathore, Jawaid Iqbal, Maha S. Abdelhaq, Raed A. Alsaqour, Syed Sajid Ullah, Fatima Tul Zuhra:
Network Threat Detection Using Machine/Deep Learning in SDN-Based Platforms: A Comprehensive Analysis of State-of-the-Art Solutions, Discussion, Challenges, and Future Research Direction. Sensors 22(20): 7896 (2022) - [j25]Sharjeel Riaz, Shahzad Latif, Syed Muhammad Usman, Syed Sajid Ullah, Abeer D. Algarni, Amanullah Yasin, Aamir Anwar, Hela Elmannai, Saddam Hussain:
Malware Detection in Internet of Things (IoT) Devices Using Deep Learning. Sensors 22(23): 9305 (2022) - [j24]Amna Waheed Awan, Syed Muhammad Usman, Shehzad Khalid, Aamir Anwar, Roobaea Alroobaea, Saddam Hussain, Jasem Almotiri, Syed Sajid Ullah, Muhammad Usman Akram:
An Ensemble Learning Method for Emotion Charting Using Multimodal Physiological Signals. Sensors 22(23): 9480 (2022) - [j23]Syed Mohsin Ali Shah, Syed Muhammad Usman, Shehzad Khalid, Ikram Ur Rehman, Aamir Anwar, Saddam Hussain, Syed Sajid Ullah, Hela Elmannai, Abeer D. Algarni, Waleed Manzoor:
An Ensemble Model for Consumer Emotion Prediction Using EEG Signals for Neuromarketing Applications. Sensors 22(24): 9744 (2022) - [j22]Syed Muhammad Arif, Bakht Amin Bacha, Syed Sajid Ullah, Saddam Hussain, Muhammad Haneef:
Tunable control of internet of things information hacking by application of the induced chiral atomic medium. Soft Comput. 26(20): 10643-10650 (2022) - [j21]Ch Anwar ul Hassan, Muhammad Hammad, Jawaid Iqbal, Saddam Hussain, Syed Sajid Ullah, Hussain AlSalman, Mogeeb A. A. Mosleh, Syed Muhammad Arif:
A Liquid Democracy Enabled Blockchain-Based Electronic Voting System. Sci. Program. 2022: 1383007:1-1383007:10 (2022) - [j20]Muhammad Bilal Qureshi, Muhammad Shuaib Qureshi, Saqib Tahir, Aamir Anwar, Saddam Hussain, Mueen Uddin, Chin-Ling Chen:
Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud. Symmetry 14(4): 695 (2022) - 2021
- [j19]Saddam Hussain, Syed Sajid Ullah, Abdu Gumaei, Mabrook Al-Rakhami, Ijaz Ahmad, Syed Muhammad Arif:
A Novel Efficient Certificateless Signature Scheme for the Prevention of Content Poisoning Attack in Named Data Networking-Based Internet of Things. IEEE Access 9: 40198-40215 (2021) - [j18]Muhammad Mazhar Bukhari, Bader Fahad Alkhamees, Saddam Hussain, Abdu Gumaei, Adel Saad Assiri, Syed Sajid Ullah:
An Improved Artificial Neural Network Model for Effective Diabetes Prediction. Complex. 2021: 5525271:1-5525271:10 (2021) - [j17]Jaweria Kainat, Syed Sajid Ullah, Fahd S. Alharithi, Roobaea Alroobaea, Saddam Hussain, Shah Nazir:
Blended Features Classification of Leaf-Based Cucumber Disease Using Image Processing Techniques. Complex. 2021: 9736179:1-9736179:12 (2021) - [j16]Mi Zichuan, Saddam Hussain, Zubair Ahmad, Omid Kharazmi, Zahra Almaspoor:
A New Generalized Weibull Model: Classical and Bayesian Estimation. Comput. Syst. Sci. Eng. 38(1): 79-92 (2021) - [j15]Saddam Hussain, Muhammad Ahmad Zia, Waqas Arshad:
Additive deep feature optimization for semantic image retrieval. Expert Syst. Appl. 170: 114545 (2021) - [j14]Saddam Hussain, Insaf Ullah, Hizbullah Khattak, Muhammad Asghar Khan, Chien-Ming Chen, Saru Kumari:
A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT). J. Inf. Secur. Appl. 58: 102625 (2021) - [j13]Saddam Hussain, Mohd Wazir Mustafa, Khalil Hamdi Ateyeh Al-Shqeerat, Faisal Saeed, Bander Ali Saleh Al-rimy:
A Novel Feature-Engineered-NGBoost Machine-Learning Framework for Fraud Detection in Electric Power Consumption Data. Sensors 21(24): 8423 (2021) - [j12]Aroosa, Syed Sajid Ullah, Saddam Hussain, Roobaea Alroobaea, Ihsan Ali:
Securing NDN-Based Internet of Health Things through Cost-Effective Signcryption Scheme. Wirel. Commun. Mob. Comput. 2021: 5569365:1-5569365:13 (2021) - 2020
- [j11]Saddam Hussain, Insaf Ullah, Hizbullah Khattak, Muhammad Adnan, Saru Kumari, Syed Sajid Ullah, Muhammad Asghar Khan, Shah Jahan Khattak:
A Lightweight and Formally Secure Certificate Based Signcryption With Proxy Re-Encryption (CBSRE) for Internet of Things Enabled Smart Grid. IEEE Access 8: 93230-93248 (2020) - [j10]Syed Sajid Ullah, Insaf Ullah, Hizbullah Khattak, Muhammad Asghar Khan, Muhammad Adnan, Saddam Hussain, Noor Ul Amin, Muazzam Ali Khan Khattak:
A Lightweight Identity-Based Signature Scheme for Mitigation of Content Poisoning Attack in Named Data Networking With Internet of Things. IEEE Access 8: 98910-98928 (2020) - [j9]Mi Zichuan, Saddam Hussain, Anum Iftikhar, Muhammad Ilyas, Zubair Ahmad, Dost Muhammad Khan, Sadaf Manzoor:
A New Extended-X Family of Distributions: Properties and Applications. Comput. Math. Methods Medicine 2020: 4650520:1-4650520:13 (2020) - [j8]Zhijie Zhang, Arfan Arshad, Chuanrong Zhang, Saddam Hussain, Weidong Li:
Unprecedented Temporary Reduction in Global Air Pollution Associated with COVID-19 Forced Confinement: A Continental and City Scale Analysis. Remote. Sens. 12(15): 2420 (2020) - [j7]Baohua Yang, Lin Qi, Mengxuan Wang, Saddam Hussain, Huabin Wang, Bing Wang, Jingming Ning:
Cross-Category Tea Polyphenols Evaluation Model Based on Feature Fusion of Electronic Nose and Hyperspectral Imagery. Sensors 20(1): 50 (2020) - [j6]Manazara Rehman, Hizbullah Khattak, Ahmed Saeed Alzahrani, Insaf Ullah, Muhammad Adnan, Syed Sajid Ullah, Noor Ul Amin, Saddam Hussain, Shah Jahan Khattak:
A Lightweight Nature Heterogeneous Generalized Signcryption (HGSC) Scheme for Named Data Networking-Enabled Internet of Things. Wirel. Commun. Mob. Comput. 2020: 8857272:1-8857272:20 (2020)
2010 – 2019
- 2019
- [j5]Shahid Razzaq, Muhammad Shujahat, Saddam Hussain, Faisal Nawaz, Minhong Wang, Murad Ali, Shehnaz Tehseen:
Knowledge management, organizational commitment and knowledge-worker performance. Bus. Process. Manag. J. 25(5): 923-947 (2019) - [j4]Muhammad Ali Butt, Faisal Nawaz, Saddam Hussain, Maria José Sousa, Minhong Wang, Muhammad Saleem Sumbal, Muhammad Shujahat:
Individual knowledge management engagement, knowledge-worker productivity, and innovation performance in knowledge-based organizations: the implications for knowledge processes and knowledge-based systems. Comput. Math. Organ. Theory 25(3): 336-356 (2019) - [j3]Amjad Iqbal, Fawad Latif, Frederic Marimon, Umar Farooq Sahibzada, Saddam Hussain:
From knowledge management to organizational performance. J. Enterp. Inf. Manag. 32(1): 36-59 (2019) - 2018
- [j2]Saddam Hussain, Syed Muhammad Anwar, Muhammad Majid:
Segmentation of glioma tumors in brain using deep convolutional neural network. Neurocomputing 282: 248-261 (2018) - 2017
- [j1]Zill-e-Huma, Saddam Hussain, Thurasamy Ramayah, Muhammad Imran Malik:
Determinants of cyberloafing: a comparative study of a public and private sector organization. Internet Res. 27(1): 97-117 (2017) - [c2]Saddam Hussain, Syed Muhammad Anwar, Muhammad Majid:
Brain tumor segmentation using cascaded deep convolutional neural network. EMBC 2017: 1998-2001 - [i1]Saddam Hussain, Syed Muhammad Anwar, Muhammad Majid:
Segmentation of Glioma Tumors in Brain Using Deep Convolutional Neural Network. CoRR abs/1708.00377 (2017) - 2015
- [c1]Nasir Ahmad, Saddam Hussain, Kashif Ahmad, Nicola Conci:
Computer vision based room interior design. ICMV 2015: 98751G
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-06 21:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint