Identifying vital nodes from local and global perspectives in complex networks A Ullah, B Wang, JF Sheng, J Long, N Khan, ZJ Sun Expert Systems with Applications 186, 115778, 2021 | 66 | 2021 |
A privacy-conserving framework based intrusion detection method for detecting and recognizing malicious behaviours in cyber-physical power networks IA Khan, D Pi, N Khan, ZU Khan, Y Hussain, A Nawaz, F Ali Applied Intelligence, 1-16, 2021 | 65 | 2021 |
Identification of nodes influence based on global structure model in complex networks A Ullah, B Wang, JF Sheng, J Long, N Khan, ZJ Sun Scientific Reports 11 (1), 6173, 2021 | 62 | 2021 |
Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control Systems IA Khan, M Keshk, D Pi, N Khan, Y Hussain, H Soliman Ad Hoc Networks 134, 102930, 2022 | 45 | 2022 |
Identification of influential nodes via effective distance‐based centrality mechanism in complex networks A Ullah, B Wang, J Sheng, J Long, N Khan Complexity 2021 (1), 8403738, 2021 | 32 | 2021 |
Dca-iomt: Knowledge-graph-embedding-enhanced deep collaborative alert recommendation against covid-19 N Khan, Z Ma, A Ullah, K Polat IEEE Transactions on Industrial Informatics 18 (12), 8924-8935, 2022 | 17 | 2022 |
A novel relevance-based information interaction model for community detection in complex networks A Ullah, B Wang, JF Sheng, J Long, N Khan, M Ejaz Expert Systems with Applications 196, 116607, 2022 | 16 | 2022 |
Categorization of knowledge graph based recommendation methods and benchmark datasets from the perspectives of application scenarios: A comprehensive survey N Khan, Z Ma, A Ullah, K Polat Expert Systems with Applications 206, 117737, 2022 | 15 | 2022 |
Escape velocity centrality: escape influence-based key nodes identification in complex networks A Ullah, B Wang, JF Sheng, N Khan Applied Intelligence 52 (14), 16586-16604, 2022 | 15 | 2022 |
Similarity attributed knowledge graph embedding enhancement for item recommendation N Khan, Z Ma, A Ullah, K Polat Information Sciences 613, 69-95, 2022 | 15 | 2022 |
Fed-inforce-fusion: A federated reinforcement-based fusion model for security and privacy protection of IoMT networks against cyber-attacks IA Khan, I Razzak, D Pi, N Khan, Y Hussain, B Li, T Kousar Information Fusion 101, 102002, 2024 | 9 | 2024 |
LSS: A locality-based structure system to evaluate the spreader’s importance in social complex networks A Ullah, J Shao, Q Yang, N Khan, CM Bernard, R Kumar Expert Systems with Applications 228, 120326, 2023 | 9 | 2023 |
Hashing-based semantic relevance attributed knowledge graph embedding enhancement for deep probabilistic recommendation N Khan, Z Ma, L Yan, A Ullah Applied Intelligence 53 (2), 2295-2320, 2023 | 8 | 2023 |
Modeling and querying temporal RDF knowledge graphs with relational databases R Ma, X Han, L Yan, N Khan, Z Ma Journal of Intelligent Information Systems 61 (2), 569-609, 2023 | 7 | 2023 |
Intelligent optimization of Reference Evapotranspiration (ETo) for precision irrigation RN Bashir, FA Khan, AA Khan, M Tausif, MZ Abbas, MMA Shahid, N Khan Journal of Computational Science 69, 102025, 2023 | 7 | 2023 |
Generating realistic IoT‐based IDS dataset centred on fuzzy qualitative modelling for cyber‐physical systems I Ahmed Khan, D Pi, AK Bhatia, N Khan, W Haider, A Wahab Electronics Letters 56 (9), 441-444, 2020 | 6 | 2020 |
AMF-MSPF: A retrospective analysis with online object tracking algorithms AS Khattak, N Anjum, N Khan, MR Mufti, N Ramzan Displays 76, 102354, 2023 | 5 | 2023 |
Optimized Tokenization Process for Open-Vocabulary Code Completion: An Empirical Study Y Hussain, Z Huang, Y Zhou, IA Khan, N Khan, MZ Abbas Proceedings of the 27th International Conference on Evaluation and …, 2023 | 4 | 2023 |