关注
Nasrullah Khan
Nasrullah Khan
在 nuaa.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Identifying vital nodes from local and global perspectives in complex networks
A Ullah, B Wang, JF Sheng, J Long, N Khan, ZJ Sun
Expert Systems with Applications 186, 115778, 2021
662021
A privacy-conserving framework based intrusion detection method for detecting and recognizing malicious behaviours in cyber-physical power networks
IA Khan, D Pi, N Khan, ZU Khan, Y Hussain, A Nawaz, F Ali
Applied Intelligence, 1-16, 2021
652021
Identification of nodes influence based on global structure model in complex networks
A Ullah, B Wang, JF Sheng, J Long, N Khan, ZJ Sun
Scientific Reports 11 (1), 6173, 2021
622021
Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control Systems
IA Khan, M Keshk, D Pi, N Khan, Y Hussain, H Soliman
Ad Hoc Networks 134, 102930, 2022
452022
Identification of influential nodes via effective distance‐based centrality mechanism in complex networks
A Ullah, B Wang, J Sheng, J Long, N Khan
Complexity 2021 (1), 8403738, 2021
322021
Dca-iomt: Knowledge-graph-embedding-enhanced deep collaborative alert recommendation against covid-19
N Khan, Z Ma, A Ullah, K Polat
IEEE Transactions on Industrial Informatics 18 (12), 8924-8935, 2022
172022
A novel relevance-based information interaction model for community detection in complex networks
A Ullah, B Wang, JF Sheng, J Long, N Khan, M Ejaz
Expert Systems with Applications 196, 116607, 2022
162022
Categorization of knowledge graph based recommendation methods and benchmark datasets from the perspectives of application scenarios: A comprehensive survey
N Khan, Z Ma, A Ullah, K Polat
Expert Systems with Applications 206, 117737, 2022
152022
Escape velocity centrality: escape influence-based key nodes identification in complex networks
A Ullah, B Wang, JF Sheng, N Khan
Applied Intelligence 52 (14), 16586-16604, 2022
152022
Similarity attributed knowledge graph embedding enhancement for item recommendation
N Khan, Z Ma, A Ullah, K Polat
Information Sciences 613, 69-95, 2022
152022
Fed-inforce-fusion: A federated reinforcement-based fusion model for security and privacy protection of IoMT networks against cyber-attacks
IA Khan, I Razzak, D Pi, N Khan, Y Hussain, B Li, T Kousar
Information Fusion 101, 102002, 2024
92024
LSS: A locality-based structure system to evaluate the spreader’s importance in social complex networks
A Ullah, J Shao, Q Yang, N Khan, CM Bernard, R Kumar
Expert Systems with Applications 228, 120326, 2023
92023
Hashing-based semantic relevance attributed knowledge graph embedding enhancement for deep probabilistic recommendation
N Khan, Z Ma, L Yan, A Ullah
Applied Intelligence 53 (2), 2295-2320, 2023
82023
Modeling and querying temporal RDF knowledge graphs with relational databases
R Ma, X Han, L Yan, N Khan, Z Ma
Journal of Intelligent Information Systems 61 (2), 569-609, 2023
72023
Intelligent optimization of Reference Evapotranspiration (ETo) for precision irrigation
RN Bashir, FA Khan, AA Khan, M Tausif, MZ Abbas, MMA Shahid, N Khan
Journal of Computational Science 69, 102025, 2023
72023
Generating realistic IoT‐based IDS dataset centred on fuzzy qualitative modelling for cyber‐physical systems
I Ahmed Khan, D Pi, AK Bhatia, N Khan, W Haider, A Wahab
Electronics Letters 56 (9), 441-444, 2020
62020
AMF-MSPF: A retrospective analysis with online object tracking algorithms
AS Khattak, N Anjum, N Khan, MR Mufti, N Ramzan
Displays 76, 102354, 2023
52023
Optimized Tokenization Process for Open-Vocabulary Code Completion: An Empirical Study
Y Hussain, Z Huang, Y Zhou, IA Khan, N Khan, MZ Abbas
Proceedings of the 27th International Conference on Evaluation and …, 2023
42023
系统目前无法执行此操作,请稍后再试。
文章 1–18