Your selections:
An intelligent and efficient network intrusion detection system using deep learning
- Qazi, Emad-ul-Haq, Imran, Muhammad, Haider, Noman, Shoaib, Muhammad, Razzak, Imran
An IoT-based smart healthcare system to detect dysphonia
- Ali, Zulfiqar, Imran, Muhammad, Shoaib, Muhammad
- Khan, Anwar, Imran, Muhammad, Shoaib, Muhammad, Rahman, Atiq, Sama, Najmus
A novel collaborative IoD-assisted VANET approach for coverage area maximization
- Ahmed, Gamil, Sheltami, Tarek, Mahmoud, Ashraf, Imran, Muhammad, Shoaib, Muhammad
A policy-based solution for the detection of colluding GPS-Spoofing attacks in FANETs
- Bada, Mousaab, Boubiche, Djallel, Lagraa, Nasreddine, Kerrache, Chaker, Imran, Muhammad, Shoaib, Muhammad
Cloudlet computing : recent advances, taxonomy, and challenges
- Babar, Mohammad, Khan, Muhammad, Ali, Farman, Imran, Muhammad, Shoaib, Muhammad
Deep learning-based approach for detecting trajectory modifications of cassini-huygens spacecraft
- Aldabbas, Ashraf, Gal, Zoltan, Ghori, Khawaja, Imran, Muhammad, Shoaib, Muhammad
Resource optimization‐based software risk reduction model for large‐scale application development
- Shahzad, Basit, Amin, Fazal-e, Abro, Ahsanullah, Imran, Muhammad, Shoaib, Muhammad
Smart dynamic traffic monitoring and enforcement system
- El-Hansali, Youssef, Outay, Fatma, Yasar, Ansar, Farrag, Siham, Shoaib, Muhammad, Imran, Muhammad, Awan, Hammad
A cooperative heterogeneous vehicular clustering mechanism for road traffic management
- Ahmad, Iftikhar, Noor, Rafidah, Zaba, Muhammad, Qureshi, Muhammad, Imran, Muhammad, Shoaib, Muhammad
- Tang, Hao, Li, Di, Wan, Jiafu, Imran, Muhammad, Shoaib, Muhammad
An incentive scheme for VANETs based on traffic event validation using blockchain
- Iftikhar, Muhammad, Javaid, Nadeem, Samuel, Omaji, Shoaib, Muhammad, Imran, Muhammad
CNN and GRU based deep neural network for electricity theft detection to secure smart grid
- Ullah, Ashraf, Javaid, Nadeem, Samuel, Omaji, Imran, Muhammad, Shoaib, Muhammad
Countering stasistical attacks in cloud-based searchable encryption
- Ahsan, M., Ali, Ihsan, Bin Idris, Mohd, Imran, Muhammad, Shoaib, Muhammad
Data-driven prognosis method using hybrid deep recurrent neural network
- Xia, Min, Zheng, Xi, Imran, Muhammad, Shoaib, Muhammad
Electric Load Forecasting using EEMD and machine learning techniques
- Naz, Aqdas, Javaid, Nadeem, Khalid, Adia, Shoaib, Muhammad, Imran, Muhammad
Electricity theft detection using pipeline in machine learning
- Anwar, Mubbashra, Javaid, Nadeem, Khalid, Adia, Imran, Muhammad, Shoaib, Muhammad
Have you been a victim of COVID-19-related cyber incidents? Survey, taxonomy, and mitigation strategies
- Hakak, Saqib, Khan, Wazir, Imran, Muhammad, Choo, Kim-Kwang, Shoaib, Muhammad
Novel one time signatures (NOTS) : a compact post-quantum digital signature scheme
- Shahid, Furqan, Ahmad, Iftikhar, Imran, Muhammad, Shoaib, Muhammad
Towards a low complexity scheme for medical images in scalable video coding
- Shoaib, Muhammad, Imran, Muhammad, Subhan, Fazli, Ahmad, Iftikhar
Are you sure you would like to clear your session, including search history and login status?