Shamsul Huda

3.2k total citations
82 papers, 2.2k citations indexed

About

Shamsul Huda is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Shamsul Huda has authored 82 papers receiving a total of 2.2k indexed citations (citations by other indexed papers that have themselves been cited), including 30 papers in Computer Networks and Communications, 25 papers in Information Systems and 23 papers in Artificial Intelligence. Recurrent topics in Shamsul Huda's work include Network Security and Intrusion Detection (20 papers), Advanced Malware Detection Techniques (18 papers) and Smart Grid Security and Resilience (12 papers). Shamsul Huda is often cited by papers focused on Network Security and Intrusion Detection (20 papers), Advanced Malware Detection Techniques (18 papers) and Smart Grid Security and Resilience (12 papers). Shamsul Huda collaborates with scholars based in Australia, Saudi Arabia and Pakistan. Shamsul Huda's co-authors include Mohammad Mehedi Hassan, John Yearwood, Jemal Abawajy, Ahmad Almogren, Giancarlo Fortino, Md. Zia Uddin, Md. Rafiul Hassan, Shafiq Ahmad, Md. Golam Rabiul Alam and Herbert F. Jelinek and has published in prestigious journals such as European Journal of Operational Research, IEEE Access and Sensors.

In The Last Decade

Shamsul Huda

79 papers receiving 2.2k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Shamsul Huda Australia 26 925 817 676 651 299 82 2.2k
Fadi Aloul United Arab Emirates 28 1.2k 1.3× 637 0.8× 456 0.7× 742 1.1× 253 0.8× 137 3.0k
Manju Khari India 26 897 1.0× 613 0.8× 366 0.5× 519 0.8× 131 0.4× 132 2.3k
Vinayakumar Ravi Saudi Arabia 31 1.1k 1.2× 1.1k 1.3× 723 1.1× 496 0.8× 102 0.3× 194 2.8k
Chung–Horng Lung Canada 29 2.1k 2.3× 712 0.9× 276 0.4× 838 1.3× 450 1.5× 218 3.2k
Limin Sun China 22 909 1.0× 682 0.8× 610 0.9× 654 1.0× 267 0.9× 156 1.9k
Chao Shen China 34 966 1.0× 1.3k 1.6× 921 1.4× 960 1.5× 1.1k 3.5× 187 4.0k
Karl Koscher United States 17 1.0k 1.1× 969 1.2× 817 1.2× 660 1.0× 461 1.5× 23 3.4k
Zhuo Ma China 21 492 0.5× 622 0.8× 297 0.4× 479 0.7× 106 0.4× 74 1.4k
Farhan Ullah China 22 837 0.9× 657 0.8× 645 1.0× 544 0.8× 64 0.2× 112 1.8k
Ahmad Y. Javaid United States 22 1.1k 1.2× 1.0k 1.2× 655 1.0× 285 0.4× 187 0.6× 84 2.2k

Countries citing papers authored by Shamsul Huda

Since Specialization
Citations

This map shows the geographic impact of Shamsul Huda's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Shamsul Huda with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Shamsul Huda more than expected).

Fields of papers citing papers by Shamsul Huda

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Shamsul Huda. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Shamsul Huda. The network helps show where Shamsul Huda may publish in the future.

Co-authorship network of co-authors of Shamsul Huda

This figure shows the co-authorship network connecting the top 25 collaborators of Shamsul Huda. A scholar is included among the top collaborators of Shamsul Huda based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Shamsul Huda. Shamsul Huda is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Shahidinejad, Ali, Jemal Abawajy, & Shamsul Huda. (2024). Highly-Secure Yet Efficient Blockchain-Based CRL-Free Key Management Protocol for IoT-Enabled Smart Grid Environments. IEEE Transactions on Information Forensics and Security. 19. 6738–6750. 8 indexed citations
2.
Razzaque, Md. Abdur, et al.. (2024). Cross regional online food delivery: Service quality optimization and real-time order assignment. Computers & Operations Research. 173. 106877–106877. 3 indexed citations
3.
Altaf, Saud, et al.. (2023). Radio-Frequency-Identification-Based 3D Human Pose Estimation Using Knowledge-Level Technique. Electronics. 12(2). 374–374. 3 indexed citations
5.
Ahmad, Shafiq, et al.. (2023). A Novel Approach to Improve Software Defect Prediction Accuracy Using Machine Learning. IEEE Access. 11. 63579–63597. 18 indexed citations
6.
Khan, Muhammad Sohail, et al.. (2023). Non Functional Requirements Identification and Classification Using Transfer Learning Model. IEEE Access. 11. 74997–75005. 6 indexed citations
7.
Altaf, Saud, et al.. (2022). Hand Gesture Recognition with Symmetric Pattern under Diverse Illuminated Conditions Using Artificial Neural Network. Symmetry. 14(10). 2045–2045. 8 indexed citations
8.
Huda, Shamsul, et al.. (2022). A Weighted Minimum Redundancy Maximum Relevance Technique for Ransomware Early Detection in Industrial IoT. Sustainability. 14(3). 1231–1231. 30 indexed citations
9.
Alam, Md. Golam Rabiul, et al.. (2022). An Industry-4.0-Compliant Sustainable Bitcoin Model Through Optimized Transaction Selection and Sustainable Block Integration. IEEE Transactions on Industrial Informatics. 18(12). 9162–9172. 2 indexed citations
10.
Wu, Jimmy Ming‐Tai, et al.. (2022). A Privacy Frequent Itemsets Mining Framework for Collaboration in IoT Using Federated Learning. ACM Transactions on Sensor Networks. 19(2). 1–15. 14 indexed citations
11.
Ahmad, Shafiq, et al.. (2022). Dynamic Key Extraction Technique Using Pulse Signal and Lightweight Cryptographic Authentication Scheme for WBAN. Sustainability. 14(21). 14625–14625. 1 indexed citations
12.
Abdollahian, Mali, et al.. (2021). An Edge Tier Task Offloading to Identify Sources of Variance Shifts in Smart Grid Using a Hybrid of Wrapper and Filter Approaches. IEEE Transactions on Green Communications and Networking. 6(1). 329–340. 4 indexed citations
13.
Huda, Shamsul, et al.. (2021). An Advanced Boundary Protection Control for the Smart Water Network Using Semisupervised and Deep Learning Approaches. IEEE Internet of Things Journal. 9(10). 7298–7310. 11 indexed citations
14.
Hassan, Mohammad Mehedi, et al.. (2020). An Adaptive Trust Boundary Protection for IIoT Networks Using Deep-Learning Feature-Extraction-Based Semisupervised Model. IEEE Transactions on Industrial Informatics. 17(4). 2860–2870. 47 indexed citations
15.
Gumaei, Abdu, Mohammad Mehedi Hassan, Shamsul Huda, et al.. (2020). A robust cyberattack detection approach using optimal features of SCADA power systems in smart grids. Applied Soft Computing. 96. 106658–106658. 51 indexed citations
16.
17.
Pan, Lei, et al.. (2020). Improving malicious PDF classifier with feature engineering: A data-driven approach. Future Generation Computer Systems. 115. 314–326. 16 indexed citations
18.
Huda, Shamsul, Rafiqul Islam, Jemal Abawajy, et al.. (2018). A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection. Future Generation Computer Systems. 83. 193–207. 34 indexed citations
19.
Kelarev, Andrei, Andrew Stranieri, Herbert F. Jelinek, Shamsul Huda, & Jemal Abawajy. (2012). A Decision Tree Approach for Ewing Test Selection to Support the Clinical Assessment of Cardiac Autonomic Neuropathy.
20.
Huda, Shamsul, John Yearwood, & Ron Borland. (2010). Smokers' characteristics and cluster based quitting rule discovery model for enhancement of government's tobacco control systems. Pacific Asia Conference on Information Systems. 433(3). 26–80. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026