Machine-learning algorithms for mapping debris-covered glaciers: the Hunza Basin case study AA Khan, A Jamil, D Hussain, M Taj, G Jabeen, MK Malik Ieee Access 8, 12725-12734, 2020 | 57 | 2020 |
Surface remeshing: A systematic literature review of methods and research directions D Khan, A Plopski, Y Fujimoto, M Kanbara, G Jabeen, YJ Zhang, X Zhang, ... IEEE transactions on visualization and computer graphics 28 (3), 1680-1713, 2020 | 47 | 2020 |
A low-cost interactive writing board for primary education using distinct augmented reality markers D Khan, I Rehman, S Ullah, W Ahmad, Z Cheng, G Jabeen, H Kato Sustainability 11 (20), 5720, 2019 | 19 | 2019 |
An improved software reliability prediction model by using high precision error iterative analysis method G Jabeen, P Luo, W Afzal Software Testing, Verification and Reliability 29 (6-7), e1710, 2019 | 19 | 2019 |
Machine learning techniques for software vulnerability prediction: a comparative study G Jabeen, S Rahim, W Afzal, D Khan, AA Khan, Z Hussain, T Bibi Applied Intelligence 52 (15), 17614-17635, 2022 | 18 | 2022 |
Do commercial banks benefited from the belt and road initiative? A three-stage DEA-tobit-NN analysis AA Shah, DD Wu, V Korotkov, G Jabeen IEEE Access 7, 37936-37949, 2019 | 18 | 2019 |
Fingertip gestures recognition using leap motion and camera for interaction with virtual environment IU Rehman, S Ullah, D Khan, S Khalid, A Alam, G Jabeen, I Rabbi, ... Electronics 9 (12), 1986, 2020 | 17 | 2020 |
A unified measurement solution of software trustworthiness based on social-to-software framework X Yang, G Jabeen, P Luo, XL Zhu, MH Liu Journal of Computer Science and Technology 33, 603-620, 2018 | 14 | 2018 |
Similarity measures of Pythagorean fuzzy sets with applications to pattern recognition and multicriteria decision making with Pythagorean TOPSIS Z Hussain, S Abbas, S Hussain, Z Ali, G Jabeen Journal of mechanics of continua and mathematical sciences 16 (6), 64-86, 2021 | 13 | 2021 |
DroidMD: an efficient and scalable android malware detection approach at source code level J Akram, M Mumtaz, G Jabeen, P Luo International Journal of Information and Computer Security 15 (2-3), 299-321, 2021 | 13 | 2021 |
An Integrated Software Vulnerability Discovery Model based on Artificial Neural Network AAS Gul Jabeen, Luo Ping, Junaid Akram The 31st International Conference on Software Engineering and Knowledge …, 2019 | 8* | 2019 |
The concept model of software trustworthiness based on trust-theory of sociology X Yang, P Luo, G Jabeen Acta Electronica Sinica 47 (11), 2344-2353, 2019 | 6 | 2019 |
School level ICT policy plan for rural areas of developing countries: Case study is Gilgit Baltistan Pakistan S Rahim, G Sahar, G Jabeen, I Ali, SMA Shah 2016 Sixth International Conference on Innovative Computing Technology …, 2016 | 6 | 2016 |
Tuned schema merging (tusme) G Jabeen, N Masood 2011 5th International Conference on Software, Knowledge Information …, 2011 | 6 | 2011 |
Mobile Phone Technologies in Coping with the Challenges and Opportunities of CPEC by the Youth of Rural Mountainous Areas of Gilgit‐Baltistan, Pakistan S Rahim, SB Qutoshi, G Sahar, G Jabeen, I Ali Mobile Information Systems 2020 (1), 5816803, 2020 | 5 | 2020 |
A unified measurable software trustworthy model based on vulnerability loss speed index G Jabeen, L Ping 2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019 | 5 | 2019 |
Social Threats Modelling with i*. L Liu, E Yu, G Jabeen iStar, 97-102, 2016 | 5 | 2016 |
Vulnerability severity prediction model for software based on Markov chain G Jabeen, X Yang, P Luo International Journal of Information and Computer Security 15 (2-3), 109-140, 2021 | 4 | 2021 |
Application of Grey-Markov Chain Model in Software Reliability Prediction GJXYPLS Rahim Journal of Computers 14 (027), 2019 | 4 | 2019 |
Hybrid software reliability prediction model based on residual errors G Jabeen, X Yang, L Ping, S Rahim, G Sahar, AA Shah 2017 8th IEEE International Conference on Software Engineering and Service …, 2017 | 4 | 2017 |