default search action
Babar Shah
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j64]Muhammad Shoaib, Babar Shah, Tariq Hussain, Bailin Yang, Asad Ullah, Jahangir Khan, Farman Ali:
A deep learning-assisted visual attention mechanism for anomaly detection in videos. Multim. Tools Appl. 83(29): 73363-73390 (2024) - [j63]Muhammad Shahzad, Farman Ali, Syed Hamad Shirazi, Assad Rasheed, Awais Ahmad, Babar Shah, Daehan Kwak:
Blood cell image segmentation and classification: a systematic review. PeerJ Comput. Sci. 10: e1813 (2024) - [j62]Atta Ur Rahman, Feras N. Al-Obeidat, Abdallah Tubaishat, Babar Shah, Sajid Anwar, Zahid Halim:
Discovering the Correlation Between Phishing Susceptibility Causing Data Biases and Big Five Personality Traits Using C-GAN. IEEE Trans. Comput. Soc. Syst. 11(4): 4800-4808 (2024) - [j61]Ehsan Elahi, Sajid Anwar, Babar Shah, Zahid Halim, Abrar Ullah, Imad Rida, Muhammad Waqas:
Knowledge Graph Enhanced Contextualized Attention-Based Network for Responsible User-Specific Recommendation. ACM Trans. Intell. Syst. Technol. 15(4): 83:1-83:24 (2024) - [c16]Babar Shah, Muhammad Junaid, Mohammad Habib:
Enhancing IoT Protocol Security Through AI and ML: A Comprehensive Analysis. ISNCC 2024: 1-7 - 2023
- [j60]Arslan Ali Raza, Asad Habib, Jawad Ashraf, Babar Shah, Fernando Moreira:
Semantic Orientation of Crosslingual Sentiments: Employment of Lexicon and Dictionaries. IEEE Access 11: 7617-7629 (2023) - [j59]Saravjeet Singh, Jaiteg Singh, Sukhjit Singh Sehra, Babar Shah, Farman Ali, Daehan Kwak:
Fuzzy Logic-Based Approach for Location Identification and Routing in the Outdoor Environment. IEEE Access 11: 65517-65529 (2023) - [j58]Jaiteg Singh, Farman Ali, Rupali Gill, Babar Shah, Daehan Kwak:
A Survey of EEG and Machine Learning-Based Methods for Neural Rehabilitation. IEEE Access 11: 114155-114171 (2023) - [j57]Zainab Khalid, Farkhund Iqbal, Faouzi Kamoun, Liaqat Ali Khan, Babar Shah:
Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications. Ann. des Télécommunications 78(3-4): 183-208 (2023) - [j56]Muhammad Amin, Feras N. Al-Obeidat, Abdallah Tubaishat, Babar Shah, Sajid Anwar, Tamleek Ali Tanveer:
Cyber security and beyond: Detecting malware and concept drift in AI-based sensor data streams using statistical techniques. Comput. Electr. Eng. 108: 108702 (2023) - [j55]Sayyed Mudassar Shah, Tariq Hussain, Babar Shah, Farman Ali, Khalid Zaman, Kyung-Sup Kwak:
CEER: Cooperative Energy-Efficient Routing Mechanism for Underwater Wireless Sensor Networks Using Clusters. Comput. Syst. Sci. Eng. 45(3): 2587-2602 (2023) - [j54]Beom-Su Kim, Byung Hyun Lim, Beomkyu Suh, Sangtae Ha, Ting He, Babar Shah, Ki-Il Kim:
Enabling Grant-Free URLLC for AoI Minimization in RAN-Coordinated 5G Health Monitoring System. IEEE Internet Things J. 10(19): 17356-17368 (2023) - [j53]Beom-Su Kim, Babar Shah, Ki-Il Kim:
Adaptive scheduling for multi-objective resource allocation through multi-criteria decision-making and deep Q-network in wireless body area networks. J. Ambient Intell. Humaniz. Comput. 14(12): 16255-16268 (2023) - [j52]Habib Ullah Khan, Muhammad Sohail, Shah Nazir, Tariq Hussain, Babar Shah, Farman Ali:
Role of authentication factors in Fin-tech mobile transaction security. J. Big Data 10(1): 138 (2023) - [j51]Tayyab Aitazaz, Abdallah Tubaishat, Feras N. Al-Obeidat, Babar Shah, Tehseen Zia, Syed Ali Tariq:
Transfer learning for histopathology images: an empirical study. Neural Comput. Appl. 35(11): 7963-7974 (2023) - [j50]Abdallah Tubaishat, Tehseen Zia, Rehana Faiz, Feras N. Al-Obeidat, Babar Shah, David Windridge:
Discriminator-based adversarial networks for knowledge graph completion. Neural Comput. Appl. 35(11): 7975-7987 (2023) - [j49]Muhammad Saad Razzaq, Babar Shah, Farkhund Iqbal, Muhammad Ilyas, Fahad Maqbool, Álvaro Rocha:
DeepClassRooms: a deep learning based digital twin framework for on-campus class rooms. Neural Comput. Appl. 35(11): 8017-8026 (2023) - [j48]Beom-Su Kim, Babar Shah, Ki-Il Kim:
Adaptive Scheduling and Power Control for Multi-Objective Optimization in IEEE 802.15.6 Based Personalized Wireless Body Area Networks. IEEE Trans. Mob. Comput. 22(11): 6251-6268 (2023) - [c15]Abdallah Tubaishat, Sajid Anwar, Feras N. Al-Obeidat, Babar Shah, Muhammad Saad Razzaq:
Incorporating Feature Penalty in Reinforcement Learning for Ludo Game. CiSt 2023: 524-530 - 2022
- [j47]Jaiteg Singh, Farman Ali, Babar Shah, Kamalpreet Singh Bhangu, Daehan Kwak:
Emotion Quantification Using Variational Quantum State Fidelity Estimation. IEEE Access 10: 115108-115119 (2022) - [j46]Beomsu Kim, Ki-Il Kim, Babar Shah, Sana Ullah, Kyong Hoon Kim:
An extended IEEE 802.15.6 for thermal-aware resource management. Ad Hoc Networks 131: 102856 (2022) - [j45]Beom-Su Kim, Babar Shah, Ting He, Ki-Il Kim:
A survey on analytical models for dynamic resource management in wireless body area networks. Ad Hoc Networks 135: 102936 (2022) - [j44]Muhammad Amin, Abdallah Tubaishat, Feras N. Al-Obeidat, Babar Shah, Waseef Ullah:
Integrating visual stimuli for enhancing neural text style transfer with EEG sensors. Comput. Electr. Eng. 102: 108192 (2022) - [j43]Muhammad Amin, Abdallah Tubaishat, Feras N. Al-Obeidat, Babar Shah, Muzamil Karamat:
Leveraging brain-computer interface for implementation of a bio-sensor controlled game for attention deficit people. Comput. Electr. Eng. 102: 108277 (2022) - [j42]Tariq Hussain, Bailin Yang, Haseeb Ur Rahman, Arshad Iqbal, Farman Ali, Babar Shah:
Improving Source location privacy in social Internet of Things using a hybrid phantom routing technique. Comput. Secur. 123: 102917 (2022) - [j41]Michal Motylinski, Áine MacDermott, Farkhund Iqbal, Babar Shah:
A GPU-based machine learning approach for detection of botnet attacks. Comput. Secur. 123: 102918 (2022) - [j40]Farkhund Iqbal, Zainab Khalid, Andrew Marrington, Babar Shah, Patrick C. K. Hung:
Forensic investigation of Google Meet for memory and browser artifacts. Digit. Investig. 43(Supplement): 301448 (2022) - [j39]Muhammad Amin, Babar Shah, Aizaz Sharif, Tamleek Ali, Ki-Il Kim, Sajid Anwar:
Android malware detection through generative adversarial networks. Trans. Emerg. Telecommun. Technol. 33(2) (2022) - [j38]Beom-Su Kim, Ki-Il Kim, Babar Shah:
BANSIM: A new discrete-event simulator for wireless body area networks with deep reinforcement learning in Python. J. Syst. Archit. 126: 102489 (2022) - [j37]Maham Khalid, Feras N. Al-Obeidat, Abdallah Tubaishat, Babar Shah, Muhammad Saad Razzaq, Fahad Maqbool, Muhammad Ilyas:
An Assortment of Evolutionary Computation Techniques (AECT) in gaming. Neural Comput. Appl. 34(11): 8295-8308 (2022) - [j36]Uzma, Feras N. Al-Obeidat, Abdallah Tubaishat, Babar Shah, Zahid Halim:
Gene encoder: a feature selection technique through unsupervised deep learning-based clustering for large gene expression data. Neural Comput. Appl. 34(11): 8309-8331 (2022) - [j35]Madiha Tahir, Abdallah Tubaishat, Feras N. Al-Obeidat, Babar Shah, Zahid Halim, Muhammad Waqas:
A novel binary chaotic genetic algorithm for feature selection and its utility in affective computing and healthcare. Neural Comput. Appl. 34(14): 11453-11474 (2022) - [j34]Shah Khusro, Babar Shah, Inayat Khan, Sumayya Rahman:
Haptic Feedback to Assist Blind People in Indoor Environment Using Vibration Patterns. Sensors 22(1): 361 (2022) - [j33]Preetinder Singh Brar, Babar Shah, Jaiteg Singh, Farman Ali, Daehan Kwak:
Using Modified Technology Acceptance Model to Evaluate the Adoption of a Proposed IoT-Based Indoor Disaster Management Software Tool by Rescue Workers. Sensors 22(5): 1866 (2022) - 2021
- [j32]Jaiteg Singh, Deepak Thakur, Tanya Gera, Babar Shah, Tamer AbuHmed, Farman Ali:
Classification and Analysis of Android Malware Images Using Feature Fusion Technique. IEEE Access 9: 90102-90117 (2021) - [j31]Salman Jan, Shahrulniza Musa, Toqeer Ali Syed, Mohammad Nauman, Sajid Anwar, Tamleek Ali Tanveer, Babar Shah:
Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models. Expert Syst. J. Knowl. Eng. 38(4) (2021) - [j30]Khalifa Al-Room, Farkhund Iqbal, Thar Baker, Babar Shah, Benjamin Yankson, Áine MacDermott, Patrick C. K. Hung:
Drone Forensics: A Case Study of Digital Forensic Investigations Conducted on Common Drone Models. Int. J. Digit. Crime Forensics 13(1): 1-25 (2021) - [j29]Muhammad Iqbal, Feras N. Al-Obeidat, Fahad Maqbool, Muhammad Saad Razzaq, Sajid Anwar, Abdallah Tubaishat, Muhammad Shahrose Khan, Babar Shah:
COVID-19 Patient Count Prediction Using LSTM. IEEE Trans. Comput. Soc. Syst. 8(4): 974-981 (2021) - [j28]Masood Ahmad, Babar Shah, Abrar Ullah, Fernando Moreira, Omar Alfandi, Gohar Ali, Abdul Hameed:
Optimal Clustering in Wireless Sensor Networks for the Internet of Things Based on Memetic Algorithm: memeWSN. Wirel. Commun. Mob. Comput. 2021: 8875950:1-8875950:14 (2021) - 2020
- [j27]Muhammad Adnan, Asad Habib, Jawad Ashraf, Babar Shah, Gohar Ali:
Improving M-Learners' Performance Through Deep Learning Techniques by Leveraging Features Weights. IEEE Access 8: 131088-131106 (2020) - [j26]Babar Shah, Ali Abbas, Gohar Ali, Farkhund Iqbal, Asad Masood Khattak, Omar Alfandi, Ki-Il Kim:
Guaranteed lifetime protocol for IoT based wireless sensor networks with multiple constraints. Ad Hoc Networks 104: 102158 (2020) - [j25]Beomsu Kim, Sangdae Kim, Kyong Hoon Kim, Tae-Eung Sung, Babar Shah, Ki-Il Kim:
Adaptive Real-Time Routing Protocol for (m, k)-Firm in Industrial Wireless Multimedia Sensor Networks. Sensors 20(6): 1633 (2020) - [j24]Thar Baker, Muhammad Asim, Áine MacDermott, Farkhund Iqbal, Faouzi Kamoun, Babar Shah, Omar Alfandi, Mohammad Hammoudeh:
A secure fog-based platform for SCADA-based IoT critical infrastructure. Softw. Pract. Exp. 50(5): 503-518 (2020) - [j23]Adnan Amin, Feras N. Al-Obeidat, Babar Shah, May Al Taei, Changez Khan, Hamood Ur Rehman Durrani, Sajid Anwar:
Just-in-time customer churn prediction in the telecommunication sector. J. Supercomput. 76(6): 3924-3948 (2020) - [c14]Hussain Ahmad, Areeba Arif, Asad Masood Khattak, Anam Habib, Muhammad Zubair Asghar, Babar Shah:
Applying Deep Neural Networks for Predicting Dark Triad Personality Trait of Online Users. ICOIN 2020: 102-105
2010 – 2019
- 2019
- [j22]Saleh Shah, Babar Shah, Adnan Amin, Feras N. Al-Obeidat, Francis Chow, Fernando Moreira, Sajid Anwar:
Compromised user credentials detection in a digital enterprise using behavioral analytics. Future Gener. Comput. Syst. 93: 407-417 (2019) - [j21]Farkhund Iqbal, Benjamin Yankson, Maryam A. AlYammahi, Naeema AlMansoori, Suaad Mohammed Qayed, Babar Shah, Thar Baker:
Drone forensics: examination and analysis. Int. J. Electron. Secur. Digit. Forensics 11(3): 245-264 (2019) - [j20]Adnan Amin, Babar Shah, Asad Masood Khattak, Fernando Moreira, Gohar Ali, Álvaro Rocha, Sajid Anwar:
Cross-company customer churn prediction in telecommunication: A comparison of data transformation methods. Int. J. Inf. Manag. 46: 304-319 (2019) - [j19]Beomsu Kim, Ki-Il Kim, Babar Shah, Francis Chow, Kyong Hoon Kim:
Wireless Sensor Networks for Big Data Systems. Sensors 19(7): 1565 (2019) - [c13]Áine MacDermott, Stephen Lea, Farkhund Iqbal, Ibrahim Idowu, Babar Shah:
Forensic Analysis of Wearable Devices: Fitbit, Garmin and HETP Watches. NTMS 2019: 1-6 - [c12]Zahoor Jan, Inayat Ullah, Faryal Tahir, Naveed Islam, Babar Shah:
Novel Robust Digital Watermarking in Mid-Rank Co-efficient Based on DWT and RT Transform. WorldCIST (2) 2019: 295-302 - [c11]Adnan Amin, Babar Shah, Ali Abbas, Sajid Anwar, Omar Alfandi, Fernando Moreira:
Features Weight Estimation Using a Genetic Algorithm for Customer Churn Prediction in the Telecom Sector. WorldCIST (2) 2019: 483-491 - 2018
- [j18]Babar Shah, Farkhund Iqbal, Omar Alfandi, Yoonsoo Kim, SeokYoon Kang, Ki-Il Kim:
Fuzzy searching and routing in unstructured mobile peer-to-peer networks. Clust. Comput. 21(1): 363-375 (2018) - [j17]Adnan Amin, Babar Shah, Sajid Anwar, Feras N. Al-Obeidat, Asad Masood Khattak, Awais Adnan:
A prudent based approach for compromised user credentials detection. Clust. Comput. 21(1): 423-441 (2018) - [j16]Feras N. Al-Obeidat, Abdallah Tubaishat, Anna Dillon, Babar Shah:
Analyzing students' performance using multi-criteria classification. Clust. Comput. 21(1): 623-632 (2018) - [j15]Muhammad Fahim, Thar Baker, Asad Masood Khattak, Babar Shah, Saiqa Aleem, Francis Chow:
Context Mining of Sedentary Behaviour for Promoting Self-Awareness Using a Smartphone. Sensors 18(3): 874 (2018) - [j14]Jeongcheol Lee, Babar Shah, Giovanni Pau, Javier Prieto, Ki-Il Kim:
Real-Time Communication in Wireless Sensor Networks. Wirel. Commun. Mob. Comput. 2018 (2018) - [c10]Adnan Amin, Babar Shah, Asad Masood Khattak, Thar Baker, Hamood ur Rahman Durani, Sajid Anwar:
Just-in-time Customer Churn Prediction: With and Without Data Transformation. CEC 2018: 1-6 - [c9]Beomsu Kim, Ki-Il Kim, Babar Shah:
An Enhanced Temperature Aware Routing Protocol in Wireless Body Area Networks. COMPSAC (1) 2018: 789-790 - [c8]Babar Shah:
Fuzzy Energy Efficient Routing for Internet of Things (IoT). ICUFN 2018: 320-325 - 2017
- [j13]Mohammad Abdul Azim, Babar Shah, Beomsu Kim, Kyong Hoon Kim, Ki-Il Kim:
Variants of Spray and Forwarding Scheme in Delay Tolerant Networks. IEICE Trans. Commun. 100-B(10): 1807-1817 (2017) - [j12]Soochang Park, Babar Shah, Euisin Lee, Ki-Il Kim:
Three-dimensional wireless ad hoc and sensor networks 2016. Int. J. Distributed Sens. Networks 13(6) (2017) - [j11]Hosung Park, Beomsu Kim, Kyong Hoon Kim, Babar Shah, Ki-Il Kim:
A Tree Based Broadcast Scheme for (m, k)-firm Real-Time Stream in Wireless Sensor Networks. Sensors 17(11): 2578 (2017) - [j10]Mohammad Abdul Azim, Beomsu Kim, Babar Shah, Ki-Il Kim:
Real-time routing protocols for (m, k)-firm streams based on multi-criteria in wireless sensor networks. Wirel. Networks 23(4): 1233-1248 (2017) - [j9]Ali Abbas, Babar Shah, Ki-Il Kim:
Adaptive Forwarding Scheme for Bounded Time Constraint in Delay Tolerant Networks. Wirel. Pers. Commun. 96(2): 1803-1817 (2017) - [c7]Adnan Amin, Sajid Anwar, Babar Shah, Asad Masood Khattak:
Compromised User Credentials Detection Using Temporal Features: A Prudent Based Approach. ICCAE 2017: 104-110 - 2016
- [j8]Rashid Amin, Nadir Shah, Babar Shah, Omar Alfandi:
Auto-Configuration of ACL Policy in Case of Topology Change in Hybrid SDN. IEEE Access 4: 9437-9450 (2016) - [j7]Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah:
Bloom Filters Optimized Wu-Manber for Intrusion Detection. J. Digit. Forensics Secur. Law 11(4): 5-22 (2016) - [j6]Chung-Jae Lee, Babar Shah, Ki-Il Kim:
An architecture for (m, k)-firm real-time streams in wireless sensor networks. Wirel. Networks 22(1): 69-81 (2016) - [c6]Dua'a Abu Hamdi, Farkhund Iqbal, Thar Baker, Babar Shah:
Multimedia File Signature Analysis for Smartphone Forensics. DeSE 2016: 130-137 - [c5]Muhammad Fahim, Asad Masood Khattak, Thar Baker, Francis Chow, Babar Shah:
Micro-context recognition of sedentary behaviour using smartphone. DICTAP 2016: 30-34 - [c4]Babar Shah, Farkhund Iqbal, Asad Masood Khattak:
Fuzzy Query Routing in Unstructured Mobile Peer-to-Peer Networks. ICSC 2016: 154-161 - 2015
- [j5]Babar Shah, Farkhund Iqbal, Ali Abbas, Ki-Il Kim:
Fuzzy Logic-Based Guaranteed Lifetime Protocol for Real-Time Wireless Sensor Networks. Sensors 15(8): 20373-20391 (2015) - 2014
- [j4]Babar Shah, Ki-Il Kim:
A New Real-Time and Guaranteed Lifetime Protocol in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j3]Babar Shah, Ki-Il Kim:
A Survey on Three-Dimensional Wireless Ad Hoc and Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j2]Babar Shah, Ki-Il Kim:
Towards Enhanced Searching Architecture for Unstructured Peer-to-Peer Over Mobile Ad Hoc Networks. Wirel. Pers. Commun. 77(2): 1167-1189 (2014) - [c3]Babar Shah, Ki-Il Kim:
A Guaranteed Lifetime Protocol for Real-Time Wireless Sensor Networks. AINA 2014: 421-428 - [c2]Babar Shah, Chung-Jae Lee, Ki-Il Kim:
Fuzzy Search Controller in Unstructured Mobile Peer-to-Peer Networks. DASC 2014: 173-178 - 2013
- [j1]Babar Shah, Ki-Il Kim:
An Enhanced Searching Algorithm over Unstructured Mobile P2P Overlay Networks. J. Inform. and Commun. Convergence Engineering 11(3): 173-178 (2013) - 2012
- [c1]Babar Shah, Ki-Il Kim:
Modeling of Energy Consumption for K-Coverage in Wireless Sensor Networks. ITCS 2012: 55-61
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-19 23:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint