Your selections:
- Wang, Yanping, Wang, Xiaofen, Dai, Hong-Ning, Zhang, Xiaosong, Imran, Muhammad
Automated methods for diagnosis of Parkinson’s disease and predicting severity level
- Ayaz, Zainab, Naz, Saeeda, Khan, Naila, Razzak, Imran, Imran, Muhammad
Data evolution governance for ontology-based digital twin product lifecycle management
- Ren, Zijie, Shi, Jianhua, Imran, Muhammad
- Ali, Sajid, Abusabha, Omar, Ali, Farman, Imran, Muhammad, Abuhmed, Tamer
Federated learning based trajectory optimization for UAV enabled MEC
- Nehra, Anushka, Consul, Prakhar, Budhiraja, Ishan, Kaur, Gagandeep, Nasser, Nidal, Imran, Muhammad
Formal verification of fraud-resilience in a crowdsourcing consensus protocol
- Afzaal, Hamra, Imran, Muhammad, Janjua, Muhammad
Modeling and analysis of finite-scale clustered backscatter communication networks
- Wang, Qiu, Zhou, Yong, Dai, Hong-Ning, Zhang, Guopeng, Imran, Muhammad, Nasser, Nidal
Review on variants of restricted boltzmann machines and autoencoders for cyber-physical systems
- Ul Haq, Qazi, Imran, Muhammad, Saleem, Kashif, Zia, Tanveer, Al Muhtadi, Jalal
A cloud-based IoMT data sharing scheme with conditional anonymous source authentication
- Wang, Yan-Ping, Wang, Xiao-Fen, Dai, Hong-Ning, Zhang, Xiao-Song, Su, Yu, Imran, Muhammad, Nasser, Nidal
- Sahraoui, Yesin, Kerrache, Chaker, Amadeo, Marica, Vegni, Anna, Korichi, Ahmed, Nebhen, Jamel, Imran, Muhammad
- Nasser, Nasser, Fadlullah, Zubair, Fouda, Mostafa, Ali, Asmaa, Imran, Muhammad
An intelligent and efficient network intrusion detection system using deep learning
- Qazi, Emad-ul-Haq, Imran, Muhammad, Haider, Noman, Shoaib, Muhammad, Razzak, Imran
Clustering-based real-time anomaly detection—a breakthrough in big data technologies
- Habeeb, Riyaz, Nasaruddin, Fariza, Gani, Abdullah, Amanullah, Mohamed, Hashem, Ibrahim, Ahmed, Ejaz, Imran, Muhammad
Contrastive GNN-based traffic anomaly analysis against imbalanced dataset in IoT-based ITS
- Wang, Yang, Lin, Xi, Wu, Jun, Bashir, Ali, Yang, Wu, Li, Jianhua, Imran, Muhammad
Extracting built-up areas from spectro-textural information using machine learning
- Maqsoom, Ahsen, Aslam, Bilal, Yousafzai, Arbaz, Ullah, Fahim, Ullah, Sami, Imran, Muhammad
- Afzaal, Hamra, Imran, Muhammad, Janjua, Muhammad
- Khan, Anwar, Imran, Muhammad, Shoaib, Muhammad, Rahman, Atiq, Sama, Najmus
Metric learning-based few-shot malicious node detection for IoT backhaul/fronthaul networks
- Zhou, Ke, Lin, Xi, Wu, Jun, Bashir, Ali, Li, Jianhua, Imran, Muhammad
- Ali, Sajid, El-Sappagh, Shaker, Ali, Farman, Imran, Muhammad, Abuhmed, Tamer
Wireless powering internet of things with UAVs : challenges and opportunities
- Liu, Yalin, Dai, Hong-Ning, Wang, Qubeijian, Imran, Muhammad, Guizani, Nadra
Are you sure you would like to clear your session, including search history and login status?