


default search action
Samsul Huda
Person information
- affiliation: Okayama University, Okayama, Japan
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Le Hoang Anh, Yuta Kawada, Samsul Huda, Md. Arshad Ali, Yuta Kodera, Yasuyuki Nogami:
ELiPS-based Ciphertext-Policy Attribute-Based Encryption. Int. J. Netw. Comput. 14(2): 186-205 (2024) - [j3]Md. Biplob Hossain, Maya Rahayu, Md. Arshad Ali, Samsul Huda, Yuta Kodera, Yasuyuki Nogami:
A Blockchain-based Approach with zk-SNARKs for Secure Email Applications. Int. J. Netw. Comput. 14(2): 225-247 (2024) - [j2]Muhammad Bisri Musthafa
, Samsul Huda
, Yuta Kodera
, Md. Arshad Ali
, Shunsuke Araki
, Jedidah Mwaura, Yasuyuki Nogami
:
Optimizing IoT Intrusion Detection Using Balanced Class Distribution, Feature Selection, and Ensemble Machine Learning Techniques. Sensors 24(13): 4293 (2024) - [c20]Yixuan He, Samsul Huda, Yuta Kodera, Yasuyuki Nogami:
NUSS:Non-Interactive Updatable of Secret Sharing Schemes Using Homomorphic Encryption. CANDARW 2024: 266-271 - [c19]Yang Jie, Yuta Kodera, Samsul Huda, Yasuyuki Nogami:
A Study of Layer-2 Consortium Blockchain with zk-SNARKs for Medical Information Management. CANDARW 2024: 375-379 - [c18]Nobuya Ishihara, Yuta Kodera, Samsul Huda, Tanoshimaru Isokawa, Yasuyuki Nogami:
An Implementation of USB-Enabled Network Isolation for Remote IoT Security Exercises. CANDARW 2024: 391-393 - [c17]Muhammad Bisri Musthafa, Samsul Huda, S. M. Shamim, Yuta Kodera, Jedidah Mwaura, Shunsuke Araki, Yasuyuki Nogami:
A Deployment of Ensemble-Based IDS on Raspberry Pi. GCCE 2024: 184-185 - [c16]Nobuya Ishihara, Samsul Huda, Yasuyuki Nogami:
A Proposal of Quality Assurance Programming Exercise. ICCE 2024 - [c15]Maya Rahayu, Md. Biplob Hossain, Samsul Huda, Md. Arshad Ali, Yuta Kodera, Yasuyuki Nogami:
An In-depth Analysis of Kerberos and Blockchain Integration on VANETs' Security and Performance. ICCE-Taiwan 2024: 391-392 - [c14]Shunri Kudo, Yasuyuki Nogami, Samsul Huda, Yuta Kodera:
Optimizing CRYSTALS-Dilithium in Rust: Radix-4 NTT and Assembly-level Comparison with Official C Implementation. ICCE-Taiwan 2024: 395-396 - [c13]Taichi Saito, Yixuan He, Samsul Huda, Junting Xiao, Yuta Kodera, Yasuyuki Nogami:
A Study to Improve Calculation Efficiency of CKKS Encoding with Parallelization. ICCE-Taiwan 2024: 397-398 - [c12]Linh Nguyen, Andri Santoso, Samsul Huda, Yasuyuki Nogami, Tuy Tan Nguyen:
Securing Data Transmission in Noisy Channels: A Synergistic Approach using Kyber and BCH Codes. ICCE-Taiwan 2024: 399-400 - [c11]Sou Kumagai, Shota Kanzawa, Samsul Huda, Yuta Kodera, Yasuyuki Nogami:
Investigating Vulnerabilities in RSA-like Cryptosystems Through Lattice-based Attacks on Small Exponent Keys. ICCE-Taiwan 2024: 585-586 - [c10]Samsul Huda
, Yasuyuki Nogami, Md. Biplob Hossain, Yang Jie, Le Hoang Anh, Muhammad Bisri Musthafa, Maya Rahayu, Takuma Akada:
A Secure Authentication for Plant Monitoring System Sensor Data Access. ICCE 2024: 1-2 - [c9]Muhammad Bisri Musthafa, Samsul Huda
, Ali Md. Arshad, Yuta Kodera, Yasuyuki Nogami:
Evaluation of IDS model by improving accuracy and reducing overfitting using stacking LSTM. ICCE 2024: 1-5 - [c8]Tuy Tan Nguyen, Tianyi Chen, Ian Philippi, Quoc Bao Phan, Shunri Kudo, Samsul Huda, Yasuyuki Nogami:
A Highly Secure and Accurate System for COVID-19 Diagnosis from Chest X-Ray Images. MWSCAS 2024: 980-984 - 2023
- [c7]Md. Biplob Hossain, Maya Rahayu, Ali Md. Arshad, Samsul Huda
, Yuta Kodera, Yasuyuki Nogami:
A Smart Contract Based Blockchain Approach Integrated with Elliptic Curve Cryptography for Secure Email Application. CANDARW 2023: 195-201 - [c6]Le Hoang Anh
, Yuta Kawada, Samsul Huda
, Ali Md. Arshad, Yuta Kodera, Yasuyuki Nogami:
An implementation of ELiPS-based Ciphertext-Policy Attribute-Based Encryption. CANDARW 2023: 220-226 - [c5]Maya Rahayu, Md. Biplob Hossain, Ali Md. Arshad, Samsul Huda
, Yuta Kodera, Yasuyuki Nogami:
An integrated secured vehicular ad-hoc network leveraging Kerberos authentication and Blockchain technology. CANDARW 2023: 260-266 - [c4]Muhammad Bisri Musthafa, Ali Md. Arshad, Samsul Huda
, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Evaluation of machine learning based optimized feature selection approaches and classification methods for Intrusion Detection System. ICCE-Taiwan 2023: 285-286 - [c3]Samsul Huda
, Yasuyuki Nogami, Takuma Akada, Maya Rahayu, Md. Biplob Hossain, Muhammad Bisri Musthafa, Le Hoang Anh
, Yang Jie:
A Proposal of IoT Application for Plant Monitoring System with AWS Cloud Service. SmartNets 2023: 1-5 - 2020
- [j1]Samsul Huda
, Nobuo Funabiki, Minoru Kuribayashi
, Wen-Chung Kao:
A proposal of calligraphy learning assistant system with letter portion practice function using projection mapping. Int. J. Web Inf. Syst. 16(2): 137-149 (2020) - [c2]Samsul Huda
, Nobuo Funabiki, Minoru Kuribayashi
, Rahardhita Widyatra Sudibyo, Nobuya Ishihara, Wen-Chun Kao:
A Proposal of Air-Conditioning Guidance System Using Discomfort Index. BWCCA 2020: 154-165 - [c1]Samsul Huda
, Nobuo Funabiki, Minoru Kuribayashi
, Wen-Chung Kao:
A Calligraphy Learning Assistant System with Letter Portion Practice Function Using Projection Mapping. ICCE 2020: 1-2
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-07 23:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint