ARTICLE IN ACADEMIC JOURNALS
NO | DETAILS OF ARTICLE IN ACADEMIC JOURNALS |
---|---|
1. |
Factors Influencing Social Media Adoption in Government Organizations: A TOE Framework and PLS-SEM Model Analysis
2024
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
IEEE ACCESS
DOI :
10.1109/ACCESS.2024.3478337
|
2. |
Adaptable and Dynamic Access Control Decision-Enforcement Approach Based on Multilayer Hybrid Deep Learning Techniques in BYOD Environment
2024
Author(s) : Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab Source :
CMC-COMPUTERS MATERIALS & CONTINUA
DOI :
10.32604/cmc.2024.055287
|
3. |
Explainable deep learning approach for advanced persistent threats (APTs) detection in cybersecurity: a review
2024
Author(s) : Ainuddin Wahid Bin Abdul Wahab, Aznul Qalid Bin Md Sabri Source :
ARTIFICIAL INTELLIGENCE REVIEW
DOI :
10.1007/s10462-024-10890-4
|
4. |
Exploring Social Media and Organisational Sustainability Performance Goals: Themes, Functional Areas, and Practices Learning from the Preceding Decade
2023
Author(s) : Ainuddin Wahid Bin Abdul Wahab, Nor Liyana Bt Mohd Shuib Source :
SUSTAINABILITY
DOI :
10.3390/su15032115
|
5. |
Systematic Literature Review on Security Access Control Policies and Techniques Based on Privacy Requirements in a BYOD Environment: State of the Art and Future Directions
2023
Author(s) : Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab Source :
APPLIED SCIENCES-BASEL
DOI :
10.3390/app13148048
|
6. |
Enhanced Adaptable and Distributed Access Control Decision Making Model Based on Machine Learning for Policy Conflict Resolution in BYOD Environment
2023
Author(s) : Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab Source :
APPLIED SCIENCES-BASEL
DOI :
10.3390/app13127102
|
7. |
Permissions-Based Detection of Android Malware Using Machine Learning
2022
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
Symmetry
DOI :
10.3390/sym14040718
|
8. |
A comprehensive evaluation procedure for copy-move forgery detection methods: results from a systematic review
2022
Source :
MULTIMEDIA TOOLS AND APPLICATIONS
DOI :
10.1007/s11042-022-12010-2
|
9. |
Authors' Reply
2022
Author(s) : Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab Source :
IEEE SENSORS JOURNAL
DOI :
10.1109/JSEN.2022.3175591
|
10. |
Skin lesion classification using multi-resolution empirical mode decomposition and local binary pattern
2022
Author(s) : Hamzah Bin Arof, Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab, Sulaiman Wadi Harun Source :
PloS one
DOI :
10.1371/journal.pone.0274896
|
11. |
Authors' Reply
2022
Source :
IEEE Sensors Journal
DOI :
10.1109/JSEN.2022.3175591
|
12. |
Permissions-Based Detection of Android Malware Using Machine Learning
2022
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
SYMMETRY-BASEL
DOI :
10.3390/sym14040718
|
13. |
A comprehensive evaluation procedure for copy-move forgery detection methods: results from a systematic review
2022
Source :
Multimedia Tools and Applications
DOI :
10.1007/s11042-022-12010-2
|
14. |
A tree-based multiclassification of breast tumor histopathology images through deep learning
2021
Author(s) : Ainuddin Wahid Bin Abdul Wahab, Nor Liyana Bt Mohd Shuib Source :
COMPUTERIZED MEDICAL IMAGING AND GRAPHICS
DOI :
10.1016/j.compmedimag.2021.101870
|
15. |
An Edge Assisted Secure Lightweight Authentication Technique for Safe Communication on the Internet of Drones Network
2021
Author(s) : Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab, Ismail Bin Ahmedy, Roziana Binti Ramli Source :
IEEE ACCESS
DOI :
10.1109/ACCESS.2021.3060420
|
16. |
Steel surface defect classification using multi-resolution empirical mode decomposition and LBP
2021
Author(s) : Hamzah Bin Arof, Ainuddin Wahid Bin Abdul Wahab Source :
Measurement Science and Technology
DOI :
10.1088/1361-6501/abab21
|
17. |
CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics
2021
Author(s) : Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab Source :
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING
DOI :
10.1109/TSUSC.2018.2833502
|
18. |
A tree-based multiclassification of breast tumor histopathology images through deep learning
2021
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
Computerized Medical Imaging and Graphics
DOI :
10.1016/j.compmedimag.2021.101870
|
19. |
A Secure, Privacy-Preserving, and Lightweight Authentication Scheme for VANETs
2021
Source :
IEEE SENSORS JOURNAL
DOI :
10.1109/JSEN.2021.3097172
|
20. |
Classifier Performance Evaluation for Lightweight IDS Using Fog Computing in IoT Security
2021
Author(s) : Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab Source :
ELECTRONICS
DOI :
10.3390/electronics10141633
|
21. |
Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges
2021
Author(s) : Noorzaily Bin Mohamed Noor, Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab, Ismail Bin Ahmedy Source :
IEEE ACCESS
DOI :
10.1109/ACCESS.2021.3072030
|
22. |
Steel surface defect classification using multi-resolution empirical mode decomposition and LBP
2021
Author(s) : Hamzah Bin Arof, Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab, Sulaiman Wadi Harun Source :
MEASUREMENT SCIENCE AND TECHNOLOGY
DOI :
10.1088/1361-6501/abab21
|
23. |
An edge assisted secure lightweight authentication technique for safe communication on the internet of drones network
2021
Source :
IEEE Access
DOI :
10.1109/ACCESS.2021.3060420
|
24. |
An Edge Assisted Secure Lightweight Authentication Technique for Safe Communication on the Internet of Drones Network
2021
Author(s) : Ismail Bin Ahmedy, Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab, Roziana Binti Ramli Source :
IEEE Access
|
25. |
REAL-TIME AUTOMATED CONTOUR BASED MOTION TRACKING USING A SINGLE-CAMERA FOR UPPER LIMB ANGULAR MOTION MEASUREMENT
2020
Author(s) : Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab, Norhamizan Binti Hamzah, Mazlina Binti Mazlan, Zaidi Bin Razak Source :
Malaysian Journal of Computer Science
|
26. |
Ensembled deep convolution neural network-based breast cancer classification with misclassification reduction algorithms
2020
Author(s) : Ainuddin Wahid Bin Abdul Wahab, Nor Liyana Bt Mohd Shuib Source :
MULTIMEDIA TOOLS AND APPLICATIONS
DOI :
10.1007/s11042-020-08692-1
|
27. |
Local descriptor for retinal fundus image registration
2020
Author(s) : Hamzah Bin Arof, Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab, Ismail Bin Ahmedy, Khairunnisa Binti Hasikin, Roziana Binti Ramli Source :
IET COMPUTER VISION
|
28. |
Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities
2020
Source :
IEEE ACCESS
DOI :
10.1109/ACCESS.2020.2989456
|
29. |
Deep learning-based breast cancer classification through medical imaging modalities: state of the art and research challenges
2020
Author(s) : Ainuddin Wahid Bin Abdul Wahab, Nor Liyana Bt Mohd Shuib Source :
ARTIFICIAL INTELLIGENCE REVIEW
|
30. |
Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunitie
2020
Author(s) : Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab, Siti Nurmaya Binti Musa, Azni Zarina Binti Taha Source :
IEEE Access
|
31. |
Systematic review on security and privacy requirements in edge computing: state of the art and future research opportunities
2020
Source :
IEEE Access
DOI :
10.1109/ACCESS.2020.2989456, IEEE Access
|
32. |
REAL-TIME AUTOMATED CONTOUR BASED MOTION TRACKING USING A SINGLE-CAMERA FOR UPPER LIMB ANGULAR MOTION MEASUREMENT
2020
Author(s) : Zaidi Bin Razak, Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab, Norhamizan Binti Hamzah Source :
MALAYSIAN JOURNAL OF COMPUTER SCIENCE
|
33. |
Local descriptor for retinal fundus image registration
2020
Author(s) : Roziana Binti Ramli, Hamzah Bin Arof, Ismail Bin Ahmedy, Khairunnisa Binti Hasikin, Ainuddin Wahid Bin Abdul Wahab, Mohd Yamani Idna Bin Idris Source :
IET Computer Vision
|
34. |
Ensembled deep convolution neural network-based breast cancer classification with misclassification reduction algorithms
2020
Author(s) : Ainuddin Wahid Bin Abdul Wahab, Nor Liyana Bt Mohd Shuib Source :
Multimedia Tools and Applications
DOI :
https://doi.org/10.1007/s11042-020-08692-1
|
35. |
Deep learning-based breast cancer classification through medical imaging modalities: state of the art and research challenges
2020
Source :
Artificial Intelligence Review
DOI :
10.1007/s10462-019-09716-5
|
36. |
Fractional means based method for multi-oriented keyword spotting in video/scene/license plate images
2019
Author(s) : Ainuddin Wahid Bin Abdul Wahab, Hamid Abdullah Jalab Altulea, Rabha Waell Ibrahim, Shivakumara Palaiahnakote Source :
EXPERT SYSTEMS WITH APPLICATIONS
|
37. |
CMF-iteMS: An automatic threshold selection for detection of copy-move forgery
2019
Author(s) : Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab Source :
Forensic Science International
|
38. |
A Lightweight Perceptron-Based Intrusion Detection System for Fog Computing
2019
Author(s) : Ainuddin Wahid Bin Abdul Wahab, Mohd Yamani Idna Bin Idris Source :
Applied Sciences
|
39. |
Fractional Means based Context Features for Multi-Oriented Keyword Spotting in Video/Scene/License Plate Images
2019
Source :
Expert Systems with Applications.
DOI :
10.1016/j.eswa.2018.08.0151
|
40. |
Accelerating FPGA-SURF Feature Detection Module By Memory Access Reduction
2019
Author(s) : Hamzah Bin Arof, Zaidi Bin Razak, Ainuddin Wahid Bin Abdul Wahab, Noorzaily Bin Mohamed Noor, Mohd Yamani Idna Bin Idris Source :
Malaysian Journal of Computer Science
|
41. |
A Lightweight Perceptron-Based Intrusion Detection System for Fog Computing
2019
Author(s) : Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab Source :
APPLIED SCIENCES-BASEL
|
42. |
CMF-iteMS: An automatic threshold selection for detection of copy-move forgery
2019
Author(s) : Rosli Bin Salleh, Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab, Ahsiah Binti Ismail Source :
FORENSIC SCIENCE INTERNATIONAL
|
43. |
ACCELERATING FPGA-SURF FEATURE DETECTION MODULE BY MEMORY ACCESS REDUCTION
2019
Author(s) : Noorzaily Bin Mohamed Noor, Hamzah Bin Arof, Zaidi Bin Razak, Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab Source :
MALAYSIAN JOURNAL OF COMPUTER SCIENCE
|
44. |
Image steganography in spatial domain: A survey
2018
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
Signal Processing: Image Communication
DOI :
10.1016/j.image.2018.03.012
|
45. |
CMF-iteMS: An Automatic Threshold Selection for Detection of Copy-Move Forgery
2018
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
Forensic Science International
DOI :
10.1016/j.forsciint.2018.12.004
|
46. |
Searching on Encrypted E-Data Using Random Searchable Encryption (RanSCrypt) Scheme
2018
Author(s) : Ainuddin Wahid Bin Abdul Wahab, Mohd Yamani Idna Bin Idris Source :
Symmetry
|
47. |
High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution
2018
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
Applied Sciences
DOI :
10.3390/app8112199
|
48. |
High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution
2018
Author(s) : Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab Source :
APPLIED SCIENCES-BASEL
|
49. |
Feature Selection of Denial-of-Service Attacks Using Entropy and Granular Computing
2018
Author(s) : Abdullah Bin Gani, Ainuddin Wahid Bin Abdul Wahab Source :
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING
|
50. |
Recursive Information Hiding Scheme Through LSB, PVD Shift, and MPE
2018
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
IETE TECHNICAL REVIEW
|
51. |
Image steganography in spatial domain: A survey
2018
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
SIGNAL PROCESSING-IMAGE COMMUNICATION
|
52. |
Searching on Encrypted E-Data Using Random Searchable Encryption (RanSCrypt) Scheme
2018
Author(s) : Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab Source :
SYMMETRY-BASEL
|
53. |
CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics
2018
Author(s) : Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab Source :
IEEE Transactions on Sustainable Computing
|
54. |
Feature Selection of Denial-of-Service Attacks Using Entropy and Granular Computing
2017
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
Arabian Journal for Science and Engineering
DOI :
10.1007/s13369-017-2634-8
|
55. |
A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement
2017
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
Signal Processing-Image Communication
DOI :
10.1016/j.image.2016.10.005
|
56. |
Topology Discovery in Software Defined Networks: Threats, Taxonomy, and State-of-the-Art
2017
Author(s) : Abdullah Bin Gani, Ainuddin Wahid Bin Abdul Wahab Source :
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
|
57. |
Blind Source Computer Device Identification from Recorded VoIP Calls for Forensic Investigation
2017
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
Forensic Science International
DOI :
10.1016/j.forsciint.2017.01.010
|
58. |
SIFT-Symmetry: A Robust Detection Method for Copy-Move Forgery with Reflection Attack
2017
Author(s) : Rosli Bin Salleh, Mohd Yamani Idna Bin Idris, Fazidah Binti Othman, Ainuddin Wahid Bin Abdul Wahab Source :
Journal of Visual Communication and Image Representation
DOI :
10.1016/j.jvcir.2017.04.004
|
59. |
Concept of Entire Boolean Values Recalculation From Aggregates in the Preprocessed Category of Incomplete Soft Sets
2017
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
IEEE ACCESS
|
60. |
Feature-Based Retinal Image Registration Using D-Saddle Feature
2017
Author(s) : Hamzah Bin Arof, Mohd Yamani Idna Bin Idris, Nahrizul Adib Bin Kadri, Ainuddin Wahid Bin Abdul Wahab, Ismail Bin Ahmedy, Khairunnisa Binti Hasikin Source :
JOURNAL OF HEALTHCARE ENGINEERING
|
61. |
Energy Harvesting and Battery Power Based Routing in Wireless Sensor Networks
2017
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
Wireless Networks
DOI :
10.1007/s11276-015-1150-6
|
62. |
Feature-Based Retinal Image Registration Using D-Saddle Feature
2017
Author(s) : Nahrizul Adib Bin Kadri, Roziana Binti Ramli, Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab, Ismail Bin Ahmedy, Khairunnisa Binti Hasikin, Hamzah Bin Arof Source :
Journal of Healthcare Engineering
DOI :
10.1155/2017/1489524
|
63. |
Recursive Information Hiding Scheme Through LSB, PVD Shift, and MPE
2017
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
IETE Technical Review
DOI :
10.1080/02564602.2016.1244496
|
64. |
Sequential Monte Carlo Localization Methods in Mobile Wireless Sensor Networks: A Review
2017
Author(s) : Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab Source :
Journal of Sensors
|
65. |
A comparison study on node clustering techniques used in target tracking WSNs for efficient data aggregation
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab, Mohd Yamani Idna Bin Idris Source :
Wireless Communications and Mobile Computing
|
66. |
Low Communication Cost (LCC) Scheme for Localizing Mobile Wireless Sensor Networks
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
Wireless Networks
|
67. |
DIGITAL VIDEO INPAINTING DETECTION USING CORRELATION OF HESSIAN MATRIX
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
Malaysian Journal of Computer Science
|
68. |
Low Communication Cost (LCC) Scheme for Localizing Mobile Wireless Sensor Networks
2016
Author(s) : Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab Source :
Wireless Networks
|
69. |
Virtual Community Detection Through the Association between Prime Nodes in Online Social Networks and Its Application to Ranking Algorithms
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
IEEE Access
DOI :
10.1109/ACCESS.2016.2639563
|
70. |
Digital Video Inpainting Detection Using Correlation Of Hessian Matrix
2016
Author(s) : Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab Source :
Malaysian Journal of Computer Science
|
71. |
NATURAL INTERACTION OF GAME-BASED LEARNING FOR ELASTICITY
2016
Source :
Malaysian Journal of Computer Science
|
72. |
WDARS: A Weighted Data Aggregation Routing Strategy with Minimum Link Cost in Event-Driven WSNs
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab, Mohd Yamani Idna Bin Idris Source :
Journal of Sensors
|
73. |
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
Symmetry
|
74. |
An evolution of image source camera attribution approaches
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
Forensic Science International
|
75. |
Cloud Log Forensics: Foundations, State of the Art, and Future Directions
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
ACM Computing Surveys (CSUR)
|
76. |
Concept of Entire Boolean Values Recalculation From Aggregates in the Preprocessed Category of Incomplete Soft Sets
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
IEEE Access
DOI :
10.1109/ACCESS.2016.2641982
|
77. |
Image Region Duplication Forgery Detection Based on Angular Radial Partitioning and Harris Key-Points
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
Symmetry
|
78. |
Network forensics: Review, taxonomy, and open challenges
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
Journal of Network and Computer Applications
|
79. |
Efficient and Stable Routing Algorithm Based on User Mobility and Node Density in Urban Vehicular Network
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
PLoS ONE
DOI :
10.1371/journal.pone.0165966
|
80. |
Energy harvesting and battery power based routing in wireless sensor networks
2015
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
Wireless Networks
|
81. |
Robust Watermarking Algorithm for Digital Images Using Discrete Wavelet and Probabilistic Neural Network
2015
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
Journal of King Saud University Computer and Information Sciences
|
82. |
Secure Password Transmission for Web Applications over Internet using Cryptography and Image Steganography
2015
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
International Journal of Security and Its Applications
|
83. |
A review on feature selection in mobile malware detection
2015
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
Digital Investigation
|
84. |
Blind source mobile device identification based on recorded call
2014
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
Engineering Applications of Artificial Intelligence
|
85. |
A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing
2014
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
Scientific World Journal
|
86. |
A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing
2014
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
The Scientific World Journal
|
87. |
Synchronization in coupled Ikeda delay systems
2014
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
The European Physical Journal Special Topics
|
88. |
Blind source mobile device identification based on recorded call
2014
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
Engineering Applications of Artificial Intelligence
|
89. |
Memory Access Reduction for Field Programmable Gate Array-Speeded Up Robust Features Implementation
2013
Author(s) : Hamzah Bin Arof, Noorzaily Bin Mohamed Noor, Ainuddin Wahid Bin Abdul Wahab, Mohd Yamani Idna Bin Idris Source :
Advanced Science Letters
|
90. |
A Novel Approach of an FPGA Design to Improve
Monocular
SLAM Feature State Covariance Matrix Computation
2012
Author(s) : Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab, Hamzah Bin Arof, Noorzaily Bin Mohamed Noor, Emran Bin Mohd Tamil, Zaidi Bin Razak Source :
Journal of Innovative Computing, Information and Control (IJICIC)
|
91. |
Reducing multiplication operation and independent
processing for monocular simultaneous localization and
mapping (SLAM) feature state covariance matrix
computation
2011
Author(s) : Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab |
92. |
Usability and Performance of Secure Mobile Messaging: M-
PKI
2009
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
93. |
On the Performance of Wavelet Decomposition
Steganalysis
with JSteg Steganography
2009
Author(s) : Ainuddin Wahid Bin Abdul Wahab Source :
Lecture Notes in Computer Science (LNCS)
|
94. |
GSM mobile SMS/MMS using public key infrastructure:
m-PKI
2008
Source :
WSEAS Transaction on Computer
|
BOOK
NO | DETAILS OF BOOK |
---|---|
1. |
DUA DEKAD SURAU AL-HIDAYAH, TAMAN BUKIT KAJANG BARU
2016
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
CHAPTER IN BOOK
NO | DETAILS OF CHAPTER IN BOOK |
---|---|
1. |
5G Networks: A Holistic View of Enabling Technologies and Research Challenges
2018
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
PROCEEDING
NO | DETAILS OF PROCEEDING |
---|---|
1. |
An Evaluation Of Error Level Analysis In Image Forensics
2015
|
2. |
Blind Source Mobile Devices Identification Using VoIP Communication
2014
|
3. |
Passive Video Forgery Detection Techniques: A Survey
2014
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
4. |
Forensic Challenges in Mobile Cloud Computing
2014
Author(s) : Ainuddin Wahid Bin Abdul Wahab |
RESEARCH PROJECT
GRANT | PROGRESS | STATUS |
---|---|---|
Improving Retinal Image Quality Using Image Registration Technique For Telemedicine Eye Screening Program
|
|
end |
Aerospace Industry I4.0 Digital Ecosystem Platform For Potential Aerospace Vendors Identification And Competency Level Assessment
|
|
end |
Machine Learning for Image-based Cancer Detection and Classification
Researcher(s) : Prof. Dr. Nor Liyana Bt Mohd Shuib, Prof. Dr. Mohd Yamani Idna Bin Idris |
|
end |
Digital Image Forensics For Online Social Network
|
|
end |
Blind Identification Of Digital Communication Devices.
|
|
end |
Features based audio forgery detection
Researcher(s) : - |
|
end |
RESEARCH COLLABORATOR
GRANT | PROGRESS | STATUS |
---|---|---|
A Lightweight Network Traffic Classifier For Resource-constrained Networks Using Explainable Artificial Intelligence
Researcher(s) : Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at, Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab, Dr. Nurul Binti Japar, Shukor Bin Abd Razak |
|
on going |
Penyelidikan Dalam Konteks Governans, Integriti Dan Antirasuah Dalam Sektor Kewangan Dan Perbankan Di Malaysia: Risiko Dan Intervensi
|
|
on going |
Digitising The Cultural And Natural Heritage
|
|
end |
Small Medium Enterprise's Internet Of Things (iot) Threats Landscape, Talent Development And Strategic Framework
|
|
end |
A Security Framework for Blockchain Applications
|
|
end |
The Investigation into Permutation Property of Block Ciphers
|
|
end |
Water Monitoring Via Internet Of Things
|
|
end |
Real-Time Water Channel Remote Monitoring Based on Internet of Things
|
|
end |
Advertisement Recommender For Indoor Crowd
Researcher(s) : Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab |
|
end |
Intelligent Estimation And Prediction Of Flood Wastes
Researcher(s) : Mr. Noorzaily Bin Mohamed Noor, Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab, Dr. Mohammad Hossein Anisi, Associate Prof. Ts. Dr. Ismail Bin Ahmedy, Prof. Dr. Mohd Yamani Idna Bin Idris, Zaini Bin Ahmad, Muhammad Nadzir Marsono, Mr. Emran Bin Mohd Tamil |
|
end |
Efficient Detection And Reporting Of Flood Wastes Using Wireless Sensor Network
|
|
end |
Measurement Of The Flood Waste Volume Based On The Digital Image
|
|
end |
Image Authentication For Detection And Localization Of Image Forgery
|
|
end |
Data Queuing Scheme of Wireless Sensor Network (WSN) Using Prioritization Techniques
|
|
end |
An Intelligent Tool For Mobile Malware Detection And Responses
Researcher(s) : Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab, Associate Prof. Dr. Rosli Bin Salleh, Dr Madihah Mohd Saudi |
|
end |
Quran And Hadith Authentication Systems
|
|
end |
Detecting Forged Part In An Image
Researcher(s) : Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab |
|
end |
Real Time Scalable Software Video Encoding And Its Applications Through Hi-performance Computing
Researcher(s) : Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab, Vishnu Monn Baskaran, Prof Dr Raphael Phan Chung Wei |
|
end |
Software Project Management Methodology For Small Medium Enterprises
|
|
end |
Guidelines for Information Accessibility for Multi-sensory Learning in Digital Storytelling
Researcher(s) : Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab, Ariffin Abdul Mutallib |
|
end |
Realistic Video-based Assistive Living
Researcher(s) : Associate Prof. Dr. Ling Teck Chaw, Prof. Ts. Dr. Ainuddin Wahid Bin Abdul Wahab, Professor Ir. Dr. Chan Chee Seng, Prof Dr Raphael Phan Chung Wei, Chang Yoong Choong, Vishnu Monn Baskaran |
|
end |
Digital Image splicing detecting based on image color spaces
|
|
end |
Accelerating Image Feature Detection Module
|
|
end |
Mobile Botnet
|
|
end |