Outlier Detection in Multivariate Time Series Data Using a Fusion of K-Medoid, Standardized Euclidean Distance and Z-Score BC Nwodo, DA Mohammed, OA Abisoye, SA Bashir Information and Communication Technology and Applications: Third …, 2021 | 39* | 2021 |
A framework for computer aided investigation of ATM Fraud in Nigeria AN Ayofe, SA Bashir, AR Ajetola, AF Abdulwahab International Journal of Soft Computing 5 (3), 78-82, 2010 | 21 | 2010 |
A review of DNA cryptograhic approaches MA Iliyasu, OA Abisoye, SA Bashir, JA Ojeniyi 2020 IEEE 2nd International Conference on Cyberspac (CYBER NIGERIA), 66-72, 2021 | 18 | 2021 |
The Effect of Window Length on Accuracy of Smartphone-Based Activity Recognition SA Bashir, DC Doolan, A Petrovski IAENG International Journal of Computer Science 43 (1), 126-136, 2016 | 17 | 2016 |
A framework for unsupervised change detection in activity recognition SA Bashir, A Petrovski, D Doolan International journal of pervasive computing and communications 13 (2), 157-175, 2017 | 14 | 2017 |
An Enhanced Bank Customers Churn Prediction Model Using A Hybrid Genetic Algorithm and K-means Filter And Artificial Neural Network R Yahaya, O Abisoye, SA Bashir 2020 IEEE 2nd International Conference on Cyberspace (CYBER NIGERIA 2020), 2021 | 10 | 2021 |
The impact of feature vector length on activity recognition accuracy on mobile phone S Bashir, D Doolan, A Petrovski World Congress on Engineering, 2015 | 10 | 2015 |
ClusterNN: A Hybrid Classification Approach to Mobile Activity Recognition S Bashir, D Doolan, A Petrovski Proceedings of the 13th International Conference on Advances in Mobile …, 2015 | 9 | 2015 |
A Review on Machine Learning Techniques for Image Based Spam Emails Detection M Abdullahi, AD Mohammed, SA Bashir, OO Abisoye 2020 IEEE 2nd International Conference on Cyberspac (CYBER NIGERIA), 59-65, 2021 | 8 | 2021 |
Face Morphing Attack Detection in the Presence of Post-processed Image Sources Using Neighborhood Component Analysis and Decision Tree Classifier MO Kenneth, SA Bashir, OA Abisoye, AD Mohammed Information and Communication Technology and Applications: Third …, 2021 | 8 | 2021 |
Comparative Study of Various Machine Learning Algorithms for Tweet Classification U Abubakar, SA Bashir, MB Abdullahi, OS Adebayo Journal on Computer Science 6 (4), 20-31, 2019 | 7* | 2019 |
A systematic literature review on face morphing attack detection (mad) MO Kenneth, BA Sulaimon, SM Abdulhamid, LC Ochei Illumination of Artificial Intelligence in Cybersecurity and Forensics, 139-172, 2022 | 5 | 2022 |
Information Security on The Communication Network In Nigeria Based On Digital Signature OS Adebayo, VO Waziri, JA Ojeniyi, SA Bashir | 4 | 2012 |
Systematic review on text normalization techniques and its approach to non-standard words AA Aliero, SA Bashir, HO Aliyu, AG Tafida, UK Bashar, MD Nasiru International Journal of Computer Applications., 2023 | 3 | 2023 |
Impact of pixel scaling on classification accuracy of dermatological skin disease detection AA Adeyemo, SA Bashir, AD Mohammed, OO Abisoye 2020 IEEE 2nd International Conference on Cyberspac (CYBER NIGERIA), 36-43, 2021 | 3 | 2021 |
Mobile Application Software Usability Evaluation: Issues, Methods and Future Research Directions BI Attah, JK Alhassan, IO Oyefolahan, SA Bashir Information and Communication Technology and Applications: Third …, 2021 | 2 | 2021 |
Profiling Inappropriate Users’ Tweets Using Deep Long Short-Term Memory (LSTM) Neural Network A Umar, SA Bashir, CO Laud, A Ibrahim i-manager Publications, 2018 | 2 | 2018 |
Android Malware Classification using Whale Optimization Algorithm SA Sulaiman, OS Adebayo, I Idris, SA Bashir Journal on Mobile Applications and Technologies 5 (2), 37-45, 2018 | 2 | 2018 |
UDetect: unsupervised concept change detection for mobile activity recognition SA Bashir, A Petrovski, D Doolan Proceedings of the 14th International Conference on Advances in Mobile …, 2016 | 2 | 2016 |
Multifaceted E-health System for Monitoring Diabetes Patient OM Olaniyi, A Omotosho, SA Bashir, OM Olaniyan, AD Ojiakor | 2 | 2012 |