关注
Dr. Sadaqat Rehman
标题
引用次数
引用次数
年份
An experimental analysis of attack classification using machine learning in IoT networks
A Churcher, R Ullah, J Ahmad, S Ur Rehman, F Masood, M Gogate, ...
Sensors 21 (2), 446, 2021
1702021
A lightweight chaos-based medical image encryption scheme using random shuffling and XOR operations
F Masood, M Driss, W Boulila, J Ahmad, SU Rehman, SU Jan, A Qayyum, ...
Wireless personal communications 127 (2), 1405-1432, 2022
1132022
A hybrid deep CNN model for abnormal arrhythmia detection based on cardiac ECG signal
A Ullah, S Rehman, S Tu, RM Mehmood, Fawad, M Ehatisham-ul-Haq
Sensors 21 (3), 951, 2021
1062021
Security in fog computing: A novel technique to tackle an impersonation attack
S Tu, M Waqas, SU Rehman, M Aamir, OU Rehman, Z Jianbiao, ...
IEEE Access 6, 74993-75001, 2018
862018
The role of artificial intelligence and machine learning in wireless networks security: Principle, practice and challenges
M Waqas, S Tu, Z Halim, SU Rehman, G Abbas, ZH Abbas
Artificial Intelligence Review 55 (7), 5215-5261, 2022
812022
Reinforcement learning assisted impersonation attack detection in device-to-device communications
S Tu, M Waqas, SU Rehman, T Mir, G Abbas, ZH Abbas, Z Halim, I Ahmad
IEEE Transactions on Vehicular Technology 70 (2), 1474-1479, 2021
712021
Unsupervised pre-trained filter learning approach for efficient convolution neural network
S ur Rehman, S Tu, M Waqas, Y Huang, O ur Rehman, B Ahmad, ...
Neurocomputing 365, 171-190, 2019
582019
Image captioning with object detection and localization
Z Yang, YJ Zhang, S Rehman, Y Huang
Image and Graphics: 9th International Conference, ICIG 2017, Shanghai, China …, 2017
582017
Optimization of CNN through novel training strategy for visual classification problems
SU Rehman, S Tu, OU Rehman, Y Huang, CMS Magurawalage, ...
Entropy 20 (4), 290, 2018
542018
Face recognition: A novel un-supervised convolutional neural network method
SU Rehman, S Tu, Y Huang, Z Yang
2016 IEEE International Conference of Online Analysis and Computing Science …, 2016
522016
Comparison based analysis of different cryptographic and encryption techniques using message authentication code (mac) in wireless sensor networks (wsn)
SU Rehman, M Bilal, B Ahmad, KM Yahya, A Ullah, OU Rehman
arXiv preprint arXiv:1203.3103, 2012
482012
Implementation and use of disease diagnosis systems for electronic medical records based on machine learning: A complete review
J Latif, C Xiao, S Tu, SU Rehman, A Imran, A Bilal
IEEE Access 8, 150489-150513, 2020
462020
A new color image encryption technique using DNA computing and Chaos-based substitution box
F Masood, J Masood, L Zhang, SS Jamal, W Boulila, SU Rehman, ...
Soft Computing, 1-17, 2022
452022
A quantum particle swarm optimizer with enhanced strategy for global optimization of electromagnetic devices
OU Rehman, S Yang, S Khan, SU Rehman
IEEE Transactions on Magnetics 55 (8), 1-4, 2019
412019
ODGNet: a deep learning model for automated optic disc localization and glaucoma classification using fundus images
J Latif, S Tu, C Xiao, S Ur Rehman, A Imran, Y Latif
SN Applied Sciences 4 (4), 98, 2022
402022
A benchmark dataset and learning high-level semantic embeddings of multimedia for cross-media retrieval
SU Rehman, S Tu, Y Huang, OU Rehman
IEEE Access 6, 67176-67188, 2018
382018
Social phenomena and fog computing networks: A novel perspective for future networks
S Tu, M Waqas, SU Rehman, T Mir, Z Halim, I Ahmad
IEEE Transactions on Computational Social Systems 9 (1), 32-44, 2021
372021
A novel quantum inspired particle swarm optimization algorithm for electromagnetic applications
S Tu, OU Rehman, SU Rehman, S Ullah, M Waqas, R Zhu
IEEE Access 8, 21909-21916, 2020
362020
Authentication of Vehicles and Road Side Units in Intelligent Transportation System.
M Waqas, S Tu, SU Rehman, Z Halim, S Anwar, G Abbas, ZH Abbas, ...
Computers, Materials & Continua, 2020
292020
Critical review of authentication mechanisms in cloud computing
S Ziyad, S Rehman
International Journal of Computer Science Issues (IJCSI) 11 (3), 145, 2014
282014
系统目前无法执行此操作,请稍后再试。
文章 1–20