Security and privacy challenges in smart cities T Braun, BCM Fung, F Iqbal, B Shah Sustainable cities and society 39, 499-507, 2018 | 369 | 2018 |
Customer churn prediction in telecommunication industry using data certainty A Amin, F Al-Obeidat, B Shah, A Adnan, J Loo, S Anwar Journal of Business Research 94, 290-301, 2019 | 255 | 2019 |
Security analysis of IoT protocols: A focus in CoAP RA Rahman, B Shah 2016 3rd MEC international conference on big data and smart city (ICBDSC), 1-7, 2016 | 185 | 2016 |
Cross-company customer churn prediction in telecommunication: A comparison of data transformation methods A Amin, B Shah, AM Khattak, FJL Moreira, G Ali, A Rocha, S Anwar International Journal of Information Management 46, 304-319, 2019 | 97 | 2019 |
An advanced deep learning models-based plant disease detection: A review of recent research M Shoaib, B Shah, S Ei-Sappagh, A Ali, A Ullah, F Alenezi, T Gechev, ... Frontiers in Plant Science 14, 1158933, 2023 | 95 | 2023 |
Deep learning-based segmentation and classification of leaf images for detection of tomato plant disease M Shoaib, T Hussain, B Shah, I Ullah, SM Shah, F Ali, SH Park Frontiers in Plant Science 13, 1031748, 2022 | 95 | 2022 |
A secure fog‐based platform for SCADA‐based IoT critical infrastructure T Baker, M Asim, Á MacDermott, F Iqbal, F Kamoun, B Shah, O Alfandi, ... Software: Practice and Experience 50 (5), 503-518, 2020 | 81 | 2020 |
[Retracted] A Novel Text Mining Approach for Mental Health Prediction Using Bi‐LSTM and BERT Model K Zeberga, M Attique, B Shah, F Ali, YZ Jembre, TS Chung Computational intelligence and neuroscience 2022 (1), 7893775, 2022 | 79 | 2022 |
Wireless sensor networks for big data systems BS Kim, KI Kim, B Shah, F Chow, KH Kim Sensors 19 (7), 1565, 2019 | 72 | 2019 |
A novel binary chaotic genetic algorithm for feature selection and its utility in affective computing and healthcare M Tahir, A Tubaishat, F Al-Obeidat, B Shah, Z Halim, M Waqas Neural Computing and Applications, 1-22, 2022 | 61 | 2022 |
Android malware detection through generative adversarial networks M Amin, B Shah, A Sharif, T Ali, KI Kim, S Anwar Transactions on Emerging Telecommunications Technologies 33 (2), e3675, 2022 | 57 | 2022 |
Gene encoder: a feature selection technique through unsupervised deep learning-based clustering for large gene expression data Uzma, F Al-Obeidat, A Tubaishat, B Shah, Z Halim Neural Computing and Applications, 1-23, 2020 | 54 | 2020 |
Classification and analysis of android malware images using feature fusion technique J Singh, D Thakur, T Gera, B Shah, T Abuhmed, F Ali IEEE Access 9, 90102-90117, 2021 | 50 | 2021 |
A survey on three-dimensional wireless ad hoc and sensor networks B Shah, KI Kim International Journal of Distributed Sensor Networks 10 (7), 616014, 2014 | 44 | 2014 |
Just-in-time customer churn prediction in the telecommunication sector A Amin, F Al-Obeidat, B Shah, MA Tae, C Khan, HUR Durrani, S Anwar The Journal of Supercomputing 76, 3924-3948, 2020 | 41 | 2020 |
Enhancing the teaching and learning process using video streaming servers and forecasting techniques R Hasan, S Palaniappan, S Mahmood, B Shah, A Abbas, KU Sarker Sustainability 11 (7), 2049, 2019 | 40 | 2019 |
Fuzzy logic-based guaranteed lifetime protocol for real-time wireless sensor networks B Shah, F Iqbal, A Abbas, KI Kim Sensors 15 (8), 20373-20391, 2015 | 40 | 2015 |
COVID-19 patient count prediction using LSTM M Iqbal, F Al-Obeidat, F Maqbool, S Razzaq, S Anwar, A Tubaishat, ... IEEE Transactions on Computational Social Systems 8 (4), 974-981, 2021 | 36 | 2021 |
Analyzing students’ performance using multi-criteria classification F Al-Obeidat, A Tubaishat, A Dillon, B Shah Cluster Computing 21, 623-632, 2018 | 35 | 2018 |
Energy-efficient load balancing algorithm for workflow scheduling in cloud data centers using queuing and thresholds N Malik, M Sardaraz, M Tahir, B Shah, G Ali, F Moreira Applied Sciences 11 (13), 5849, 2021 | 33 | 2021 |