default search action
Yasir Ali
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Yasir Ali, Yuanqing Xia, Tayyab Manzoor, Shahzad Ali, Mohamed Abouhawwash, Sameh S. Askar, Amit Krishan Kumar, Ruifeng Ma:
Efficient Hardware Realization of SC Polar Decoders Using Compound Pipelined Processing Units and Auxiliary Registers. IEEE Access 12: 23808-23826 (2024) - [j24]Yasir Ali, Yuanqing Xia:
Reliability weight-based extended puncturing mechanism for polar codes using translation shift. Trans. Emerg. Telecommun. Technol. 35(1) (2024) - [j23]Yasir Ali, Yuanqing Xia, Wojciech Sulek, Tayyab Manzoor:
Chaos-Encryption-Based Secure Polar Coding for Network-Oriented Cloud Control System. IEEE Trans. Ind. Informatics 20(3): 3935-3947 (2024) - [c7]Sarwan Ali, Haris Mansoor, Prakash Chourasia, Yasir Ali, Murray Patterson:
Gaussian Beltrami-Klein Model for Protein Sequence Classification: A Hyperbolic Approach. ISBRA (1) 2024: 52-62 - 2023
- [j22]Yasir Ali, Muhammad Sardaraz, Muhammad Tahir, Hela Elmannai, Monia Hamdi, Amel Ksibi:
IDriveGenes: Cancer Driver Genes Prediction Using Machine Learning. IEEE Access 11: 28439-28453 (2023) - [j21]Muhammad Asfand Hafeez, Yasir Ali, Kyung Hyun Han, Seong Oun Hwang:
GPU-Accelerated Deep Learning-Based Correlation Attack on Tor Networks. IEEE Access 11: 124139-124149 (2023) - [j20]Yasir Ali, Habib Ullah Khan:
A Survey on harnessing the Applications of Mobile Computing in Healthcare during the COVID-19 Pandemic: Challenges and Solutions. Comput. Networks 224: 109605 (2023) - [j19]Yasir Ali, Habib Ullah Khan, Muhammad Khalid:
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review. J. Big Data 10(1): 128 (2023) - [j18]Yasir Ali, Md. Mazharul Haque, Zuduo Zheng:
Assessing a Connected Environment's Safety Impact During Mandatory Lane-Changing: A Block Maxima Approach. IEEE Trans. Intell. Transp. Syst. 24(6): 6639-6649 (2023) - [c6]Gergo Csonka, Muhammad Khalid, Husnain Rafiq, Yasir Ali:
AI-Based Hand Gesture Recognition Through Camera on Robot. FIT 2023: 256-261 - [d1]Yasir Ali, Muhammad Sardaraz, Muhammad Tahir, Hela Elmannai, Monia Hamdi, Amel Ksibi:
Features Vectors of IDriveGenes: Cancer Driver Genes Dataset. IEEE DataPort, 2023 - 2022
- [j17]Dai-Gyoung Kim, Yasir Ali, Muhammad Asif Farooq, Asif Mushtaq, Muhammad Ahmad Abdul Rehman, Zahid Hussain Shamsi:
Hybrid Deep Learning Framework for Reduction of Mixed Noise via Low Rank Noise Estimation. IEEE Access 10: 46738-46752 (2022) - [j16]Yasir Ali, Habib Ullah Khan:
GTM approach towards engineering a features-oriented evaluation framework for secure authentication in IIoT environment. Comput. Ind. Eng. 168: 108119 (2022) - [j15]Yasir Ali, Habib Ullah Khan:
Designing evaluation framework for the empirical assessment of COVID-19 mobile apps in Pakistan. Comput. Electr. Eng. 102: 108260 (2022) - [j14]Sulaiman Khan, Suleman Khan, Yasir Ali, Muhammad Khalid, Zahid Ullah, Shahid Mumtaz:
Highly Accurate and Reliable Wireless Network Slicing in 5th Generation Networks: A Hybrid Deep Learning Approach. J. Netw. Syst. Manag. 30(2): 29 (2022) - 2021
- [j13]Talha Mahboob Alam, Kamran Shaukat, Mubbashar Mushtaq, Yasir Ali, Matloob Khushi, Suhuai Luo, Abdul Wahab:
Corporate Bankruptcy Prediction: An Approach Towards Better Corporate World. Comput. J. 64(11): 1731-1746 (2021) - [j12]Muhammad Imran, Yasir Ali, Zainab Bibi, Muhammad Saad Ghafar:
Characterization of Extremal Unicyclic Graphs Using F-Coindex. Complex. 2021: 8480971:1-8480971:9 (2021) - [j11]Hafiz Mahfooz Ul Haque, Haidar Zulfiqar, Abrar Ahmed, Yasir Ali:
A context-aware framework for modelling and verification of smart parking systems in urban cities. Concurr. Comput. Pract. Exp. 33(2) (2021) - [j10]Muhammad Imran, Yasir Ali, Mehar Ali Malik, Kiran Hasnat:
Chromatic spectrum of some classes of 2-regular bipartite colored graphs. J. Intell. Fuzzy Syst. 41(1): 1125-1133 (2021) - [j9]Huiqi Zhao, Abdullah Khan, Xu Qiang, Shah Nazir, Yasir Ali, Farhad Ali:
MCDM Approach for Assigning Task to the Workers by Selected Features Based on Multiple Criteria in Crowdsourcing. Sci. Program. 2021: 4600764:1-4600764:12 (2021) - [i2]Sulaiman Khan, Suleman Khan, Yasir Ali, Muhammad Khalid, Zahid Ullah, Shahid Mumtaz:
Highly Accurate and Reliable Wireless Network Slicing in 5th Generation Networks: A Hybrid Deep Learning Approach. CoRR abs/2111.09416 (2021) - 2020
- [j8]Sultan Daud Khan, Yasir Ali, Basim Zafar, Abdulfattah Noorwali:
Robust Head Detection in Complex Videos Using Two-Stage Deep Convolution Framework. IEEE Access 8: 98679-98692 (2020) - [j7]Bin Liao, Yasir Ali, Shah Nazir, Long He, Habib Ullah Khan:
Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review. IEEE Access 8: 120331-120350 (2020) - [j6]Lanjing Wang, Yasir Ali, Shah Nazir, Mahmood Niazi:
ISA Evaluation Framework for Security of Internet of Health Things System Using AHP-TOPSIS Methods. IEEE Access 8: 152316-152332 (2020) - [j5]Ning Li, Yasir Ali, Ke Hu, Shah Nazir, Huanli Zhao:
A Hybrid MCDM Approach of Selecting Lightweight Cryptographic Cipher Based on ISO and NIST Lightweight Cryptography Security Requirements for Internet of Health Things. IEEE Access 8: 220165-220187 (2020)
2010 – 2019
- 2019
- [j4]Aamir Ali, Yasir Ali, Poom Kumam, Khan Babar, Adeel Ahmed, Zahir Shah:
Flow of a Nanofluid and Heat Transfer in Channel With Contracting/Expanding Walls. IEEE Access 7: 102427-102436 (2019) - [j3]Yasir Ali, Amjad Farooq, Talha Mahboob Alam, Muhammad Shoaib Farooq, Mazhar Javed Awan, Talha Imtiaz Baig:
Detection of Schistosomiasis Factors Using Association Rule Mining. IEEE Access 7: 186108-186114 (2019) - [j2]Shah Nazir, Yasir Ali, Naeem Ullah, Iván García-Magariño:
Internet of Things for Healthcare Using Effects of Mobile Computing: A Systematic Literature Review. Wirel. Commun. Mob. Comput. 2019: 5931315:1-5931315:20 (2019) - 2017
- [j1]Yasir Ali, Asma Javaid:
Pairwise Stability in Two Sided Market with Strictly Increasing Valuation Functions. Discret. Math. Theor. Comput. Sci. 19(1) (2017) - [c5]Anshuman Sharma, Yasir Ali, Mohammad Saifuzzaman, Zuduo Zheng, Md. Mazharul Haque:
Human Factors in Modelling Mixed Traffic of Traditional, Connected, and Automated Vehicles. AHFE (7) 2017: 262-273 - 2016
- [i1]Yasir Ali, Asma Javaid:
Pairwise Stability in Two Sided Market with Strictly Increasing Valuation Functions. CoRR abs/1603.05064 (2016) - 2015
- [c4]Abdul Muqtadir Abbasi, Mustafa Al-tekreeti, Yasir Ali, Kshirasagar Naik, Amiya Nayak, Nishith Goel, Bernard Plourde:
A framework for detecting energy bugs in smartphones. NOF 2015: 1-3 - 2014
- [c3]Kshirasagar Naik, Yasir Ali, Veluppillai Mahinthan, Ajit Singh, Abdulhakim Abogharaf:
Categorizing configuration parameters of smartphones for energy performance testing. AST 2014: 15-21 - 2012
- [c2]Denis Kozlov, Jari Veijalainen, Yasir Ali:
Security and privacy threats in IoT architectures. BODYNETS 2012: 256-262
2000 – 2009
- 2004
- [c1]Yasir Ali, Sean W. Smith:
Flexible and Scalable Public Key Security for SSH. EuroPKI 2004: 43-56
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-24 20:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint