Analysis of ResNet and GoogleNet models for malware detection RU Khan, X Zhang, R Kumar Journal of Computer Virology and Hacking Techniques 15 (1), 29-37, 2019 | 224 | 2019 |
An Adaptive Multi-Layer Botnet Detection Technique Using Machine Learning Classifiers RU Khan, X Zhang, R Kumar, A Sharif, NA Golilarz, M Alazab Applied Sciences 9 (11), 2375, 2019 | 157 | 2019 |
A Multimodal Malware Detection Technique for Android IoT Devices Using Various Features R Kumar, X Zhang, W Wang, RU Khan, J Kumar, A Sharif IEEE Access 7, 64411-64430, 2019 | 151 | 2019 |
An Improved Convolutional Neural Network Model for Intrusion Detection in Networks RU Khan, X Zhang, M Alazab, R Kumar 2019 Cybersecurity and Cyberforensics Conference (CCC), 74-77, 2019 | 135 | 2019 |
A New Automatic Method for Control Chart Patterns Recognition Based on ConvNet and Harris Hawks Meta Heuristic Optimization Algorithm NA Golilarz, A Addeh, H Gao, L Ali, AM Roshandel, HM Munir, RU Khan IEEE Access, 2019 | 98 | 2019 |
Evaluating the Performance of ResNet Model Based on Image Recognition RU Khan, X Zhang, R Kumar, EO Aboagye Proceedings of the 2018 International Conference on Computing and Artificial …, 2018 | 88 | 2018 |
Malicious Code Detection based on Image Processing Using Deep Learning R Kumar, Z Xiaosong, RU Khan, I Ahad, J Kumar Proceedings of the 2018 International Conference on Computing and Artificial …, 2018 | 79 | 2018 |
Research on Data Mining of Permission-Induced Risk for Android IoT Devices R Kumar, X Zhang, RU Khan, A Sharif Applied Sciences 9 (2), 277, 2019 | 38 | 2019 |
Effective and Explainable Detection of Android Malware Based on Machine Learning Algorithms R Kumar, Z Xiaosong, RU Khan, J Kumar, I Ahad Proceedings of the 2018 International Conference on Computing and Artificial …, 2018 | 33 | 2018 |
A Hybrid Technique To Detect Botnets, Based on P2P Traffic Similarity RU Khan, R Kumar, M Alazab, X Zhang 2019 Cybersecurity and Cyberforensics Conference (CCC), 136-142, 2019 | 32 | 2019 |
Malicious URL Detection using Multi-layer Filtering Model. R Kumar, X Zhang, HA Tariq, RU Khan 2017 14th International Computer Conference on Wavelet Active Media …, 2018 | 29 | 2018 |
Benchmarking the two-dimensional conductive Y3 (C6X6) 2 (Y= Co, Cu, Pd, Pt; X= NH, NHS, S) metal-organic framework nanosheets for CO2 reduction reaction with tunable performance S Ali, PM Ismail, F Wahid, A Kumar, M Haneef, F Raziq, S Ali, M Javed, ... Fuel Processing Technology 236, 107427, 2022 | 25 | 2022 |
Honey bee algorithm–based efficient cluster formation and optimization scheme in mobile ad hoc networks M Ahmad, AA Ikram, R Lela, I Wahid, R Ullah International Journal of Distributed Sensor Networks 13 (6), 1-12, 2017 | 25 | 2017 |
An intelligent traffic surveillance system using integrated wireless sensor network and improved phase timing optimization QN Naveed, H Alqahtani, RU Khan, S Almakdi, M Alshehri, ... Sensors 22 (9), 3333, 2022 | 22 | 2022 |
Blockchain and homomorphic encryption based privacy-preserving model aggregation for medical images R Kumar, J Kumar, AA Khan, H Ali, CM Bernard, RU Khan, S Zeng Computerized Medical Imaging and Graphics 102, 102139, 2022 | 20 | 2022 |
Stacking approach for accurate Invasive Ductal Carcinoma classification AU Haq, JP Li, Z Ali, I Khan, A Khan, MI Uddin, BLY Agbley, R Ullah Khan Computers and Electrical Engineering 100, 107937, 2022 | 19 | 2022 |
Probabilistic Approach to COVID-19 Data Analysis and Forecasting Future Outbreaks Using a Multi-Layer Perceptron Neural Network RU Khan, S Almakdi, M Alshehri, R Kumar, I Ali, ... Diagnostics 12 (10), 1-25, 2022 | 12 | 2022 |
Analysis of ResNet Model for Malicious Code Detection RU Khan, X Zhang, R Kumar, HA Tariq Wavelet Active Media Technology and Information Processing (ICCWAMTIP), 2017 …, 2017 | 10 | 2017 |
A Novel Blockchain-Based Encryption Model to Protect Fog Nodes from Behaviors of Malicious Nodes M Alshehri, B Panda, S Almakdi, A Alazeb, H Halawani, NA Mudawi, ... Electronics 10 (24), 3135, 2021 | 7 | 2021 |
Probabilistic Time Context Framework for Big Data Collaborative Recommendation EO Aboagye, GC James, G Jianbin, R Kumar, RU Khan Proceedings of the 2018 International Conference on Computing and Artificial …, 2018 | 6 | 2018 |