A survey of software clone detection techniques A Sheneamer, J Kalita International Journal of Computer Applications 137 (10), 1-21, 2016 | 132 | 2016 |
Semantic clone detection using machine learning A Sheneamer, J Kalita 2016 15th IEEE international conference on machine learning and applications …, 2016 | 74 | 2016 |
A detection framework for semantic code clones and obfuscated code A Sheneamer, S Roy, J Kalita Expert Systems with Applications 97, 405-420, 2018 | 41 | 2018 |
Code clone detection using coarse and fine-grained hybrid approaches A Sheneamer, J Kalita 2015 IEEE seventh international conference on intelligent computing and …, 2015 | 27 | 2015 |
Early predicting of students performance in higher education E Alhazmi, A Sheneamer IEEE Access 11, 27579-27589, 2023 | 25 | 2023 |
An automatic advisor for refactoring software clones based on machine learning AM Sheneamer IEEE Access 8, 124978-124988, 2020 | 24 | 2020 |
Comparison of Deep and Traditional Learning Methods for Email Spam Filtering A Sheneamer International Journal of Advanced Computer Science and Applications(IJACSA …, 2021 | 16 | 2021 |
CCDLC detection framework-combining clustering with deep learning classification for semantic clones A Sheneamer 2018 17th IEEE International Conference on Machine Learning and Applications …, 2018 | 15 | 2018 |
An effective semantic code clone detection framework using pairwise feature fusion A Sheneamer, S Roy, J Kalita IEEE Access 9, 84828-84844, 2021 | 12 | 2021 |
Schemes for labeling semantic code clones using machine learning A Sheneamer, H Hazazi, S Roy, J Kalita 2017 16th IEEE International Conference on Machine Learning and Applications …, 2017 | 10 | 2017 |
Multiple Similarity-based Features Blending for Detecting Code Clones using Consensus-Driven Classification AM Sheneamer Expert Systems with Applications, 115364, 2021 | 5 | 2021 |
Graph-of-code: Semantic clone detection using graph fingerprints EA Alhazami, AM Sheneamer IEEE Transactions on Software Engineering 49 (8), 3972-3988, 2023 | 3 | 2023 |
Vulnerable JavaScript functions detection using stacking of convolutional neural networks A Sheneamer PeerJ Computer Science 10, e1838, 2024 | 1 | 2024 |
Non-Orthogonal Random Access (NORA) in Large Cellular Networks E Alhazmi, A Sheneamer IEEE ACCESS 11, 27579-27589, 2023 | 1 | 2023 |
Two Approaches of Natural Numbers Sorting: TAISN and Improved Array-Indexed Algorithms A Sheneamer, A Alharthi, H Hazazi International Journal of Computer Applications 121 (8), 1-6, 2015 | 1 | 2015 |
A Deep-Learning-Based Approach to the Classification of Fire Types EA Refaee, A Sheneamer, B Assiri Applied Sciences 14 (17), 7862, 2024 | | 2024 |
Enhancing Precision Agriculture and Land Cover Classification: A Self-Attention 3D Convolutional Neural Network Approach for Hyperspectral Image Analysis KK Reddy, A Daduvy, RM Mohana, B Assiri, M Shuaib, S Alam, ... IEEE Access, 2024 | | 2024 |
A hybrid human recognition framework using machine learning and deep neural networks AM Sheneamer, MH Halawi, MH Al-Qahtani PLOS ONE 19 (6), e0300614, 2024 | | 2024 |
Visualized Malware Images using Hybrid Ensemble Deep Transfer Learning A Sheneamer 2024 7th International Conference on Information and Computer Technologies …, 2024 | | 2024 |
A fine-tuned vision transformer based enhanced multi-class brain tumor classification using MRI scan imagery CKK Reddy, PA Reddy, H Janapati, B Assiri, M Shuaib, S Alam, ... Frontiers in Oncology 14, 2024 | | 2024 |