default search action
Mohammad Hijji
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Yan Kang, Bin Pu, Yongqi Kou, Yun Yang, Jianguo Chen, Khan Muhammad, Po Yang, Lida Xu, Mohammad Hijji:
A Deep Graph Network with Multiple Similarity for User Clustering in Human-Computer Interaction. ACM Trans. Multim. Comput. Commun. Appl. 20(2): 46:1-46:20 (2024) - 2023
- [j27]Deepika Sirohi, Neeraj Kumar, Prashant Singh Rana, Sudeep Tanwar, Rahat Iqbal, Mohammad Hijji:
Federated learning for 6G-enabled secure communication systems: a comprehensive survey. Artif. Intell. Rev. 56(10): 11297-11389 (2023) - [j26]Cuihong Wen, Shaowu Liu, Shuai Liu, Ali Asghar Heidari, Mohammad Hijji, Carmen Zarco, Khan Muhammad:
ACSN: Attention capsule sampling network for diagnosing COVID-19 based on chest CT scans. Comput. Biol. Medicine 153: 106338 (2023) - [j25]Nilesh Kumar Jadav, Tejal Rathod, Rajesh Gupta, Sudeep Tanwar, Neeraj Kumar, Rahat Iqbal, Shadi Atalla, Mohammad Hijji, Saba Al-Rubaye:
Blockchain-Based Secure and Intelligent Data Dissemination Framework for UAVs in Battlefield Applications. IEEE Commun. Stand. Mag. 7(3): 16-23 (2023) - [j24]Fath U Min Ullah, Mohammad S. Obaidat, Amin Ullah, Khan Muhammad, Mohammad Hijji, Sung Wook Baik:
A Comprehensive Review on Vision-Based Violence Detection in Surveillance Videos. ACM Comput. Surv. 55(10): 200:1-200:44 (2023) - [j23]Shuai Liu, Shuai Wang, Xinyu Liu, Jianhua Dai, Khan Muhammad, Amir H. Gandomi, Weiping Ding, Mohammad Hijji, Victor Hugo C. de Albuquerque:
Human Inertial Thinking Strategy: A Novel Fuzzy Reasoning Mechanism for IoT-Assisted Visual Monitoring. IEEE Internet Things J. 10(5): 3735-3748 (2023) - [j22]Muhammad Ayaz, Mohammad Ammad Uddin, Zubair Sharif, Mohammad Hijji, Ali Mansour:
A hybrid data collection scheme to achieve load balancing for underwater sensor networks. J. King Saud Univ. Comput. Inf. Sci. 35(3): 74-86 (2023) - [j21]Samee Ullah Khan, Noman Khan, Tanveer Hussain, Khan Muhammad, Mohammad Hijji, Javier Del Ser, Sung Wook Baik:
Visual Appearance and Soft Biometrics Fusion for Person Re-Identification Using Deep Learning. IEEE J. Sel. Top. Signal Process. 17(3): 575-586 (2023) - [j20]Samrah Mehraj, Subreena Mushtaq, Shabir A. Parah, Kaiser J. Giri, Javaid A. Sheikh, Amir H. Gandomi, Mohammad Hijji, Brij B. Gupta, Khan Muhammad:
RBWCI: Robust and Blind Watermarking Framework for Cultural Images. IEEE Trans. Consumer Electron. 69(2): 128-139 (2023) - [j19]Parsa Sarosh, Shabir Ahmad Parah, Bilal Ahmad Malik, Mohammad Hijji, Khan Muhammad:
Real-Time Medical Data Security Solution for Smart Healthcare. IEEE Trans. Ind. Informatics 19(7): 8137-8147 (2023) - [j18]Mohammad Hijji, Rahat Iqbal, Anup Kumar Pandey, Faiyaz Doctor, Charalampos Karyotis, Wahid Rajeh, Ali Alshehri, Fahad Aradah:
6G Connected Vehicle Framework to Support Intelligent Road Maintenance Using Deep Learning Data Fusion. IEEE Trans. Intell. Transp. Syst. 24(7): 7726-7735 (2023) - [j17]Khan Muhammad, Hayat Ullah, Salman Khan, Mohammad Hijji, Jaime Lloret Mauri:
Efficient Fire Segmentation for Internet-of-Things-Assisted Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 24(11): 13141-13150 (2023) - [j16]Jose Jaena Mari Ople, Shang-Fu Chen, Yung-Yao Chen, Kai-Lung Hua, Mohammad Hijji, Po Yang, Khan Muhammad:
Controllable Model Compression for Roadside Camera Depth Estimation. IEEE Trans. Intell. Transp. Syst. 24(12): 15478-15485 (2023) - 2022
- [j15]Samrah Mehraj, Subreena Mushtaq, Shabir A. Parah, Kaiser J. Giri, Javaid A. Sheikh, Amir H. Gandomi, Mohammad Hijji, Khan Muhammad:
Spatial Domain-Based Robust Watermarking Framework for Cultural Images. IEEE Access 10: 117248-117260 (2022) - [j14]Upendra Singh, Amit Dua, Neeraj Kumar, Sudeep Tanwar, Rabat Iqbal, Mohammad Hijji, Saad Ali Amin, Ravi Sharma:
Scalable priority-based resource allocation scheme for M2M communication in LTE/LTE-A network. Comput. Electr. Eng. 103: 108321 (2022) - [j13]Bing Jia, Wenling Qiao, Zhaopeng Zong, Shuai Liu, Mohammad Hijji, Javier Del Ser, Khan Muhammad:
A fingerprint-based localization algorithm based on LSTM and data expansion method for sparse samples. Future Gener. Comput. Syst. 137: 380-393 (2022) - [j12]Samee Ullah Khan, Ijaz Ul Haq, Noman Khan, Khan Muhammad, Mohammad Hijji, Sung Wook Baik:
Learning to rank: An intelligent system for person reidentification. Int. J. Intell. Syst. 37(9): 5924-5948 (2022) - [j11]Yifei Guo, Jian Huang, Mingfu Xiong, Zhongyuan Wang, Xinrong Hu, Jihong Wang, Mohammad Hijji:
Facial expressions recognition with multi-region divided attention networks for smart education cloud applications. Neurocomputing 493: 119-128 (2022) - [j10]Zahoor Ahmed, Muhammad Ayaz, Mohammad Hijji, Muhammad Zahid Abbas, Aneel Rahim:
AUV-Based Efficient Data Collection Scheme for Underwater Linear Sensor Networks. Int. J. Semantic Web Inf. Syst. 18(1): 1-19 (2022) - [j9]Slim Ben Chaabane, Mohammad Hijji, Rafika Harrabi, Hassene Seddik:
Face recognition based on statistical features and SVM classifier. Multim. Tools Appl. 81(6): 8767-8784 (2022) - [j8]Mohammad Hijji, Bilal Ahmad, Gulzar Alam, Ahmed Alwakeel, Mohammed Alwakeel, Lubna Abdulaziz Alharbi, Ahd Aljarf, Muhammad Umair Khan:
Cloud Servers: Resource Optimization Using Different Energy Saving Techniques. Sensors 22(21): 8384 (2022) - [j7]Mohammad Hijji, Gulzar Alam:
Cybersecurity Awareness and Training (CAT) Framework for Remote Working Employees. Sensors 22(22): 8663 (2022) - [j6]Faraz Akram, Ahmed Alwakeel, Mohammed Alwakeel, Mohammad Hijji, Usman Masud:
A Symbols Based BCI Paradigm for Intelligent Home Control Using P300 Event-Related Potentials. Sensors 22(24): 10000 (2022) - [j5]Khan Muhammad, Tanveer Hussain, Hayat Ullah, Javier Del Ser, Mahdi Rezaei, Neeraj Kumar, Mohammad Hijji, Paolo Bellavista, Victor Hugo C. de Albuquerque:
Vision-Based Semantic Segmentation in Scene Understanding for Autonomous Driving: Recent Achievements, Challenges, and Outlooks. IEEE Trans. Intell. Transp. Syst. 23(12): 22694-22715 (2022) - [j4]Abbas Khan, Ijaz Ul Haq, Tanveer Hussain, Khan Muhammad, Mohammad Hijji, Muhammad Sajjad, Victor Hugo C. de Albuquerque, Sung Wook Baik:
PMAL: A Proxy Model Active Learning Approach for Vision Based Industrial Applications. ACM Trans. Multim. Comput. Commun. Appl. 18(2s): 123:1-123:18 (2022) - 2021
- [j3]Mohammad Hijji, Gulzar Alam:
A Multivocal Literature Review on Growing Social Engineering Based Cyber-Attacks/Threats During the COVID-19 Pandemic: Challenges and Prospective Solutions. IEEE Access 9: 7152-7169 (2021) - [j2]Adel R. Alharbi, Mohammad Hijji, Amer Aljaedi:
Enhancing topic clustering for Arabic security news based on k-means and topic modelling. IET Networks 10(6): 278-294 (2021)
2010 – 2019
- 2019
- [j1]Saad Ali Amin, Mohammad Hijji, Rahat Iqbal, Wayne Harrop, Victor Chang:
Fuzzy expert system-based framework for flood management in Saudi Arabia. Clust. Comput. 22(5): 11723-11740 (2019) - 2016
- [c2]Mohammad Hijji, Rahat Iqbal, Saad Ali Amin, Wayne Harrop:
An Intelligent IT System for Readiness of Equipment Capabilities in Flood Risk. DeSE 2016: 209-214 - 2013
- [c1]Mohammad Hijji, Saad Ali Amin, Rahat Iqbal, Wayne Harrop:
A Critical Evaluation of the Rational Need for an IT Management System for Flash Flood Events in Jeddah, Saudi Arabia. DeSE 2013: 209-214
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint