Deep learning in big data analytics: a comparative study B Jan, H Farman, M Khan, M Imran, IU Islam, A Ahmad, S Ali, G Jeon Computers & Electrical Engineering 75, 275-287, 2019 | 271 | 2019 |
Energy efficient hierarchical clustering approaches in wireless sensor networks: A survey B Jan, H Farman, H Javed, B Montrucchio, M Khan, S Ali Wireless Communications and Mobile Computing 2017 (1), 6457942, 2017 | 182 | 2017 |
Privacy and security issues in online social networks S Ali, N Islam, A Rauf, IU Din, M Guizani, JJPC Rodrigues Future Internet 10 (12), 114, 2018 | 132 | 2018 |
A comprehensive analysis of healthcare big data management, analytics and scientific programming S Nazir, S Khan, HU Khan, S Ali, I Garcia-Magarino, RB Atan, M Nawaz IEEE Access 8, 95714-95733, 2020 | 100 | 2020 |
Multi-criteria based zone head selection in Internet of Things based wireless sensor networks H Farman, B Jan, H Javed, N Ahmad, J Iqbal, M Arshad, S Ali Future Generation Computer Systems 87, 364-371, 2018 | 88 | 2018 |
SQLIPA: An Authentication Mechanism Against SQL Injection S Ali, A Rauf, H Javed SQLIPA: An Authentication Mechanism Against SQL Injection 38 (4), 604-611, 2009 | 77 | 2009 |
Analytical network process based optimum cluster head selection in wireless sensor network H Farman, H Javed, B Jan, J Ahmad, S Ali, FN Khalil, M Khan PLoS One 12 (7), e0180848, 2017 | 63 | 2017 |
Deep Learning Algorithms and Multicriteria Decision‐Making Used in Big Data: A Systematic Literature Review M Yang, S Nazir, Q Xu, S Ali Complexity 2020 (1), 2836064, 2020 | 58 | 2020 |
piEnPred: a bi-layered discriminative model for enhancers and their subtypes via novel cascade multi-level subset feature selection algorithm ZU Khan, D Pi, S Yao, A Nawaz, F Ali, S Ali Frontiers of Computer Science 15, 1-11, 2021 | 35 | 2021 |
Big data visualization in cardiology—a systematic review and future directions S Nazir, MN Khan, S Anwar, A Adnan, S Asadi, S Shahzad, S Ali IEEE Access 7, 115945-115958, 2019 | 22 | 2019 |
Roman Urdu hate speech detection using transformer-based model for cyber security applications M Bilal, A Khan, S Jan, S Musa, S Ali Sensors 23 (8), 3909, 2023 | 16 | 2023 |
A framework for secure and privacy protected collaborative contents sharing using public OSN S Ali, A Rauf, N Islam, H Farman Cluster Computing, 1-12, 2017 | 16 | 2017 |
User profiling: a privacy issue in online public network S Ali, A Rauf, N Islam, H Farman, S Khan Sindh University Research Journal-SURJ (Science Series) 49 (1), 2017 | 12 | 2017 |
SGKMP: A scalable group key management protocol S Ali, A Rauf, N Islam, H Farman, B Jan, M Khan, A Ahmad Sustainable cities and society 39, 37-42, 2018 | 9 | 2018 |
Impact of lexical features on answer detection model in discussion forums A Khan, MA Gul, A Alharbi, MI Uddin, S Ali, B Alouffi Complexity 2021 (1), 2893257, 2021 | 8 | 2021 |
An authorization model to access the summarized data of data warehouse S Ali, A Rauf, S Khusro, M Zubair, H Farman, S Ullah Life Science Journal 11 (6s), 2014 | 4 | 2014 |
Efficient XQuery over encrypted XML documents A Rauf, W Ali, M Ahmed, S Khusro, S Ali 2015 10th International Conference on Computer Science & Education (ICCSE …, 2015 | 2 | 2015 |
A technique for handling range and fuzzy match queries on encrypted data. S Ali, A Rauf, H Javed Int. Arab J. Inf. Technol. 10 (3), 239-244, 2013 | 2 | 2013 |
UPDATE query over encrypted data S Ali, A Rauf, S Mahfooz International Conference on Computer Networks and Information Technology …, 2011 | 2 | 2011 |
DeepEnzyPred: A Bi-Layered Deep Learning Framework for prediction of Bacteriophage Enzymes and their Sub-Hydrolases Enzymes via Novel Multi Level-Multi Thresholds Feature … Y Wang, ZU Khan, S Ali, M Hayat | 1 | 2020 |