An effective genetic algorithm-based feature selection method for intrusion detection systems Z Halim, MN Yousaf, M Waqas, M Sulaiman, G Abbas, M Hussain, ... Computers & Security 110, 102448, 2021 | 110 | 2021 |
Deep learning for edge computing: Current trends, cross-layer optimizations, and open research challenges A Marchisio, MA Hanif, F Khalid, G Plastiras, C Kyrkou, T Theocharides, ... 2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 553-559, 2019 | 93 | 2019 |
TOSCA-based and federation-aware cloud orchestration for Kubernetes container platform D Kim, H Muhammad, E Kim, S Helal, C Lee Applied Sciences 9 (1), 191, 2019 | 44 | 2019 |
Towards energy-efficient and secure edge AI: A cross-layer framework ICCAD special session paper M Shafique, A Marchisio, RVW Putra, MA Hanif 2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD), 1-9, 2021 | 37 | 2021 |
A survey of big data analytics in healthcare MU Sarwar, MK Hanif, R Talib, A Mobeen, M Aslam Int. J. Adv. Comput. Sci. Appl 8 (6), 2017 | 29 | 2017 |
Automated HW/SW co-design for edge AI: State, challenges and steps ahead O Bringmann, W Ecker, I Feldner, A Frischknecht, C Gerum, ... Proceedings of the 2021 International Conference on Hardware/Software …, 2021 | 23 | 2021 |
Fadec: A fast decision-based attack for adversarial machine learning F Khalid, H Ali, MA Hanif, S Rehman, R Ahmed, M Shafique 2020 International Joint Conference on Neural Networks (IJCNN), 1-8, 2020 | 21 | 2020 |
Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL S Tu, M Waqas, Y Meng, SU Rehman, I Ahmad, A Koubaa, Z Halim, ... Computer Communications 160, 790-798, 2020 | 21 | 2020 |
Predictive container auto-scaling for cloud-native applications H Zhao, H Lim, M Hanif, C Lee 2019 International Conference on Information and Communication Technology …, 2019 | 17 | 2019 |
VM capacity-aware scheduling within budget constraints in IaaS clouds V Thanasias, C Lee, M Hanif, E Kim, S Helal Plos one 11 (8), e0160456, 2016 | 14 | 2016 |
An efficient impersonation attack detection method in fog computing J Wan, M Waqas, S Tu, SM Hussain, A Shah, SU Rehman, M Hanif CMC-Comput Mater Cont 68 (1), 267-281, 2021 | 13 | 2021 |
An efficient key partitioning scheme for heterogeneous MapReduce clusters M Hanif, C Lee 2016 18th International Conference on Advanced Communication Technology …, 2016 | 13 | 2016 |
Mapping allochemical limestone formations in Hazara, Pakistan using google cloud architecture: application of machine-learning algorithms on multispectral data MFA Khan, K Muhammad, S Bashir, S Ud Din, M Hanif ISPRS International Journal of Geo-Information 10 (2), 58, 2021 | 12 | 2021 |
Clustering uncertain graphs using ant colony optimization (ACO) SF Hussain, IA Butt, M Hanif, S Anwar Neural Computing and Applications 34 (14), 11721-11738, 2022 | 11 | 2022 |
An adaptive SLA-based data flow mechanism for stream processing engines M Hanif, H Yoon, S Jang, C Lee 2017 International Conference on Information and Communication Technology …, 2017 | 10 | 2017 |
Improved particle swarm optimization based on blockchain mechanism for flexible job shop problem MU Sana, Z Li, F Javaid, MW Hanif, I Ashraf Cluster Computing, 1-19, 2023 | 8 | 2023 |
Cost-aware orchestration of applications over heterogeneous clouds K Alexander, M Hanif, C Lee, E Kim, S Helal Plos one 15 (2), e0228086, 2020 | 7 | 2020 |
SLA-based adaptation schemes in distributed stream processing engines M Hanif, E Kim, S Helal, C Lee Applied Sciences 9 (6), 1045, 2019 | 7 | 2019 |
Benchmarking tool for modern distributed stream processing engines M Hanif, H Yoon, C Lee 2019 International Conference on Information Networking (ICOIN), 393-395, 2019 | 7 | 2019 |
Deep Learning Techniques for Future Intelligent Cross-Media Retrieval SU Rehman, M Waqas, S Tu, A Koubaa, O ur Rehman, J Ahmad, M Hanif, ... CISTER-Research Centre in Realtime and Embedded Computing Systems, 2020 | 6 | 2020 |