default search action
Hamad Naeem
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j22]Hamad Naeem, Shi Dong, Olorunjube James Falana, Farhan Ullah:
Development of a deep stacked ensemble with process based volatile memory forensics for platform independent malware detection and classification. Expert Syst. Appl. 223: 119952 (2023) - 2022
- [j21]Ali Abdulqader Bin-Salem, Tat Chee Wan, Hamad Naeem, Mohammed Anbar, Sabri M. Hanshi, Abdellah Redjaimia:
Efficient models for enhancing the link adaptation performance of LTE/LTE-A networks. EURASIP J. Wirel. Commun. Netw. 2022(1): 10 (2022) - [j20]Farhan Ullah, Hamad Naeem, Muhammad Rashid Naeem, Sohail Jabbar, Shehazad Khalid, Fadi Al-Turjman, Abdelrahman Abuarqoub:
Detection of clone scammers in Android markets using IoT-based edge computing. Trans. Emerg. Telecommun. Technol. 33(6) (2022) - [j19]Farhan Ullah, Muhammad Rashid Naeem, Hamad Naeem, Xiaochun Cheng, Mamoun Alazab:
CroLSSim: Cross-language software similarity detector using hybrid approach of LSA-based AST-MDrep features and CNN-LSTM model. Int. J. Intell. Syst. 37(9): 5768-5795 (2022) - [j18]Hamad Naeem, Xiaochun Cheng, Farhan Ullah, Sohail Jabbar, Shi Dong:
A Deep Convolutional Neural Network Stacked Ensemble for Malware Threat Classification in Internet of Things. J. Circuits Syst. Comput. 31(17): 2250302:1-2250302:21 (2022) - [j17]Farhan Ullah, Amjad Alsirhani, Mohammed Mujib Alshahrani, Abdullah Alomari, Hamad Naeem, Syed Aziz Shah:
Explainable Malware Detection System Using Transformers-Based Transfer Learning and Multi-Model Visual Representation. Sensors 22(18): 6766 (2022) - [j16]Farhan Ullah, Jihoon Moon, Hamad Naeem, Sohail Jabbar:
Explainable artificial intelligence approach in combating real-time surveillance of COVID19 pandemic from CT scan and X-ray images using ensemble model. J. Supercomput. 78(17): 19246-19271 (2022) - [j15]Shahzad Ashraf, Mingsheng Gao, Zhengming Chen, Hamad Naeem, Tauqeer Ahmed:
CED-OR Based Opportunistic Routing Mechanism for Underwater Wireless Sensor Networks. Wirel. Pers. Commun. 125(1): 487-511 (2022) - 2021
- [j14]Hamad Naeem, Ali Abdulqader Bin-Salem:
A CNN-LSTM network with multi-level feature extraction-based approach for automated detection of coronavirus from CT scan and X-ray images. Appl. Soft Comput. 113(Part): 107918 (2021) - [j13]Shahzad Ashraf, Mingsheng Gao, Zhengming Chen, Tauqeer Ahmed, Asif Raza, Hamad Naeem:
Corrigendum to "USPF: Underwater Shrewd Packet Flooding Mechanism through Surrogate Holding Time". Wirel. Commun. Mob. Comput. 2021: 9693787:1-9693787:1 (2021) - 2020
- [j12]Shahzad Ashraf, Mingsheng Gao, Zhengming Chen, Hamad Naeem, Arshad Ahmad, Tauqeer Ahmed:
Underwater Pragmatic Routing Approach Through Packet Reverberation Mechanism. IEEE Access 8: 163091-163114 (2020) - [j11]Hamad Naeem, Farhan Ullah, Muhammad Rashid Naeem, Shehzad Khalid, Danish Vasan, Sohail Jabbar, Saqib Saeed:
Malware detection in industrial internet of things based on hybrid image visualization and deep learning model. Ad Hoc Networks 105: 102154 (2020) - [j10]Danish Vasan, Mamoun Alazab, Sobia Wassan, Hamad Naeem, Babak Safaei, Zheng Qin:
IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture. Comput. Networks 171: 107138 (2020) - [j9]Muhammad Rashid Naeem, Tao Lin, Hamad Naeem, Hailu Liu:
A machine learning approach for classification of equivalent mutants. J. Softw. Evol. Process. 32(5) (2020) - [j8]Shahzad Ashraf, Mingsheng Gao, Zheng Mingchen, Tauqeer Ahmed, Asif Raza, Hamad Naeem:
USPF: Underwater Shrewd Packet Flooding Mechanism through Surrogate Holding Time. Wirel. Commun. Mob. Comput. 2020: 9625974:1-9625974:12 (2020)
2010 – 2019
- 2019
- [j7]Farhan Ullah, Hamad Naeem, Sohail Jabbar, Shehzad Khalid, Muhammad Ahsan Latif, Fadi M. Al-Turjman, Leonardo Mostarda:
Cyber Security Threats Detection in Internet of Things Using Deep Learning Approach. IEEE Access 7: 124379-124389 (2019) - [j6]Muhammad Rashid Naeem, Tao Lin, Hamad Naeem, Farhan Ullah, Saqib Saeed:
Scalable Mutation Testing Using Predictive Analysis of Deep Learning Model. IEEE Access 7: 158264-158283 (2019) - [j5]Hamad Naeem, Bing Guo, Muhammad Rashid Naeem, Farhan Ullah, Hamza Aldabbas, Muhammad Sufyan Javed:
Identification of malicious code variants based on image visualization. Comput. Electr. Eng. 76: 225-237 (2019) - [j4]Hamad Naeem, Bing Guo, Farhan Ullah, Muhammad Rashid Naeem:
A Cross-Platform Malware Variant Classification based on Image Representation. KSII Trans. Internet Inf. Syst. 13(7): 3756-3777 (2019) - [j3]Muhammad Aamir, Yi-Fei Pu, Ziaur Rahman, Muhammad Tahir, Hamad Naeem, Qiang Dai:
A Framework for Automatic Building Detection from Low-Contrast Satellite Images. Symmetry 11(1): 3 (2019) - [j2]Hamad Naeem:
Detection of Malicious Activities in Internet of Things Environment Based on Binary Visualization and Machine Intelligence. Wirel. Pers. Commun. 108(4): 2609-2629 (2019) - 2018
- [j1]Muhammad Aamir, Yi-Fei Pu, Ziaur Rahman, Waheed Ahmed Abro, Hamad Naeem, Farhan Ullah, Aymen Mudheher Badr:
A Hybrid Proposed Framework for Object Detection and Classification. J. Inf. Process. Syst. 14(5): 1176-1194 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint