An experimental analysis of attack classification using machine learning in IoT networks A Churcher, R Ullah, J Ahmad, S Ur Rehman, F Masood, M Gogate, ... Sensors 21 (2), 446, 2021 | 170 | 2021 |
A lightweight chaos-based medical image encryption scheme using random shuffling and XOR operations F Masood, M Driss, W Boulila, J Ahmad, SU Rehman, SU Jan, A Qayyum, ... Wireless personal communications 127 (2), 1405-1432, 2022 | 113 | 2022 |
A hybrid deep CNN model for abnormal arrhythmia detection based on cardiac ECG signal A Ullah, S Rehman, S Tu, RM Mehmood, Fawad, M Ehatisham-ul-Haq Sensors 21 (3), 951, 2021 | 106 | 2021 |
Security in fog computing: A novel technique to tackle an impersonation attack S Tu, M Waqas, SU Rehman, M Aamir, OU Rehman, Z Jianbiao, ... IEEE Access 6, 74993-75001, 2018 | 86 | 2018 |
The role of artificial intelligence and machine learning in wireless networks security: Principle, practice and challenges M Waqas, S Tu, Z Halim, SU Rehman, G Abbas, ZH Abbas Artificial Intelligence Review 55 (7), 5215-5261, 2022 | 81 | 2022 |
Reinforcement learning assisted impersonation attack detection in device-to-device communications S Tu, M Waqas, SU Rehman, T Mir, G Abbas, ZH Abbas, Z Halim, I Ahmad IEEE Transactions on Vehicular Technology 70 (2), 1474-1479, 2021 | 71 | 2021 |
Unsupervised pre-trained filter learning approach for efficient convolution neural network S ur Rehman, S Tu, M Waqas, Y Huang, O ur Rehman, B Ahmad, ... Neurocomputing 365, 171-190, 2019 | 58 | 2019 |
Image captioning with object detection and localization Z Yang, YJ Zhang, S Rehman, Y Huang Image and Graphics: 9th International Conference, ICIG 2017, Shanghai, China …, 2017 | 58 | 2017 |
Optimization of CNN through novel training strategy for visual classification problems SU Rehman, S Tu, OU Rehman, Y Huang, CMS Magurawalage, ... Entropy 20 (4), 290, 2018 | 54 | 2018 |
Face recognition: A novel un-supervised convolutional neural network method SU Rehman, S Tu, Y Huang, Z Yang 2016 IEEE International Conference of Online Analysis and Computing Science …, 2016 | 52 | 2016 |
Comparison based analysis of different cryptographic and encryption techniques using message authentication code (mac) in wireless sensor networks (wsn) SU Rehman, M Bilal, B Ahmad, KM Yahya, A Ullah, OU Rehman arXiv preprint arXiv:1203.3103, 2012 | 48 | 2012 |
Implementation and use of disease diagnosis systems for electronic medical records based on machine learning: A complete review J Latif, C Xiao, S Tu, SU Rehman, A Imran, A Bilal IEEE Access 8, 150489-150513, 2020 | 46 | 2020 |
A new color image encryption technique using DNA computing and Chaos-based substitution box F Masood, J Masood, L Zhang, SS Jamal, W Boulila, SU Rehman, ... Soft Computing, 1-17, 2022 | 45 | 2022 |
A quantum particle swarm optimizer with enhanced strategy for global optimization of electromagnetic devices OU Rehman, S Yang, S Khan, SU Rehman IEEE Transactions on Magnetics 55 (8), 1-4, 2019 | 41 | 2019 |
ODGNet: a deep learning model for automated optic disc localization and glaucoma classification using fundus images J Latif, S Tu, C Xiao, S Ur Rehman, A Imran, Y Latif SN Applied Sciences 4 (4), 98, 2022 | 40 | 2022 |
A benchmark dataset and learning high-level semantic embeddings of multimedia for cross-media retrieval SU Rehman, S Tu, Y Huang, OU Rehman IEEE Access 6, 67176-67188, 2018 | 38 | 2018 |
Social phenomena and fog computing networks: A novel perspective for future networks S Tu, M Waqas, SU Rehman, T Mir, Z Halim, I Ahmad IEEE Transactions on Computational Social Systems 9 (1), 32-44, 2021 | 37 | 2021 |
A novel quantum inspired particle swarm optimization algorithm for electromagnetic applications S Tu, OU Rehman, SU Rehman, S Ullah, M Waqas, R Zhu IEEE Access 8, 21909-21916, 2020 | 36 | 2020 |
Authentication of Vehicles and Road Side Units in Intelligent Transportation System. M Waqas, S Tu, SU Rehman, Z Halim, S Anwar, G Abbas, ZH Abbas, ... Computers, Materials & Continua, 2020 | 29 | 2020 |
Critical review of authentication mechanisms in cloud computing S Ziyad, S Rehman International Journal of Computer Science Issues (IJCSI) 11 (3), 145, 2014 | 28 | 2014 |