default search action
Imtiaz Ahmed
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Imtiaz Ahmed 0001 — Howard University, Department of Electrical Engineering and Computer Science, Washington, DC, USA (and 1 more)
- Imtiaz Ahmed 0002 — Texas A&M University, Department of Industrial and Systems Engineering, College Station, TX, USA (and 1 more)
- Imtiaz Ahmed 0003 — Mirpur University of Science and Technology, Mirpur, AK, Pakistan
- Imtiaz Ahmed 0004 — National Institute of Technology Srinagar, Computer Science and Engineering, Srinagar, India
- Imtiaz Ahmed 0005 — Purdue University, West Lafayette, IN, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Rizwan Ahmed, Abdul Qadeer Khan, Muhammad Amer, Aniqa Faizan, Imtiaz Ahmed:
Complex Dynamics of a Discretized Predator-Prey System with Prey Refuge Using a Piecewise Constant Argument Method. Int. J. Bifurc. Chaos 34(10): 2450120:1-2450120:29 (2024) - 2023
- [c10]Maruthi Seshidhar Inukonda, Jatin Tarachandani, Imtiaz Ahmed, Bheemarjuna Reddy Tamma, Sparsh Mittal:
ZETA: A Zero-Trust Security based Forensic-Ready Solution for Perimeter-less Enterprise Networks. ANTS 2023: 189-194 - [c9]Ahshanul Haque, Md Naseef-Ur-Rahman Chowdhury, Hamdy Soliman, Mohammad Sahinur Hossen, Tanjim Fatima, Imtiaz Ahmed:
Wireless Sensor Networks Anomaly Detection Using Machine Learning: A Survey. IntelliSys (3) 2023: 491-506 - [c8]Md Naseef-Ur-Rahman Chowdhury, Ahshanul Haque, Hamdy Soliman, Mohammad Sahinur Hossen, Tanjim Fatima, Imtiaz Ahmed:
Android Malware Detection Using Machine Learning: A Review. IntelliSys (3) 2023: 507-522 - [i2]Ahsnaul Haque, Md Naseef-Ur-Rahman Chowdhury, Hamdy Soliman, Mohammad Sahinur Hossen, Tanjim Fatima, Imtiaz Ahmed:
Wireless Sensor Networks anomaly detection using Machine Learning: A Survey. CoRR abs/2303.08823 (2023) - [i1]Md Naseef-Ur-Rahman Chowdhury, Ahshanul Haque, Hamdy Soliman, Mohammad Sahinur Hossen, Tanjim Fatima, Imtiaz Ahmed:
Android Malware Detection using Machine learning: A Review. CoRR abs/2307.02412 (2023)
2010 – 2019
- 2018
- [c7]Duha Shubair, Imtiaz Ahmed, Maytham Safar:
A survey on IoT contribution in smart goods ordering cycle: Amazon buttons. ICFNDS 2018: 14:1-14:8 - [c6]Imtiaz Ahmed, Subhash Baraiya, Rahul Singhal:
Case study on low pin count testing of industry transceiver chip. NATW 2018: 1-5 - 2017
- [j4]Imtiaz Ahmed, Sannapaneni Krishnaiah, Sunil Kumar Yadav, Bharat Balasubramaniam, Ramanathan V. Ramani:
Benefits of an Android Based Tablet Application in Primary Screening for Eye Diseases in a Rural Population, India. J. Medical Syst. 41(4): 49:1-49:6 (2017) - 2015
- [j3]KwangSoo Yang, Apurv Hirsh Shekhar, Faizan Ur Rehman, Hassan F. Lahza, Saleh M. Basalamah, Shashi Shekhar, Imtiaz Ahmed, Arif Ghafoor:
Intelligent Shelter Allotment for Emergency Evacuation Planning: A Case Study of Makkah. IEEE Intell. Syst. 30(5): 66-76 (2015) - [c5]Nataraj Kuntagod, Sanjoy Paul, Senthil Kumaresan, Bharat Balasubramaniam, Imtiaz Ahmed:
Connected vision care for eradication of preventable blindness. MeMeA 2015: 202-207 - [c4]Ashikur Rahman, Nawshad Rehan Rasha, Imtiaz Ahmed, Sirat Samyoun:
Modeling sparsity of planar topologies for wireless multi-hop networks. WiOpt 2015: 339-346 - 2013
- [c3]Hossain Mahbub Elahi, Didar Islam, Imtiaz Ahmed, Syoji Kobashi, Md. Atiqur Rahman Ahad:
Webcam-Based Accurate Eye-Central Localization. RVSP 2013: 47-50 - 2012
- [c2]Md. Hasibul Alam, Iftikhar Ahmad Niaz, Imtiaz Ahmed, Zubair Al Azim, Nadim Chowdhury, Quazi Deen Mohd Khosru:
InxGa1-xSb MOSFET: Performance analysis by self consistent CV characterization and direct tunneling gate leakage current. EIT 2012: 1-6 - [c1]Nadim Chowdhury, Zubair Al Azim, Imtiaz Ahmed, Iftikhar Ahmad Niaz, Md. Hasibul Alam, Quazi Deen Mohd Khosru:
A physically based analytical modeling of threshold voltage control for fully-depleted SOI double gate NMOS-PMOS Flexible-FET. EIT 2012: 1-4 - 2010
- [j2]Ilaria Boscolo Galazzo, Subrata K. Bose, Anil F. Ramlackhansingh, Imtiaz Ahmed, Nicola Pavese, Gaia Rizzo, David J. Brooks, Federico E. Turkheimer, Alessandra Bertoldo:
Kinetic modeling of the adenosine A2A subtype receptor radioligand [11C]SCH442416 in humans. NeuroImage 52(Supplement-1): S178 (2010) - [j1]Subrata K. Bose, Anil F. Ramlackhansingh, Imtiaz Ahmed, Nicola Pavese, David J. Brooks, Federico E. Turkheimer:
Quantitation of adenosine A2A receptors availability in Parkinson's Disease patients with and without dyskinesias with [11C]SCH442416 PET using spectral analysis. NeuroImage 52(Supplement-1): S216-S217 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-29 22:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint