Babar Shah
Orcid: 0000-0001-7190-550X
According to our database1,
Babar Shah
authored at least 79 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Multim. Tools Appl., September, 2024
Knowledge Graph Enhanced Contextualized Attention-Based Network for Responsible User-Specific Recommendation.
ACM Trans. Intell. Syst. Technol., August, 2024
Discovering the Correlation Between Phishing Susceptibility Causing Data Biases and Big Five Personality Traits Using C-GAN.
IEEE Trans. Comput. Soc. Syst., August, 2024
PeerJ Comput. Sci., 2024
2023
J. Big Data, December, 2023
Adaptive scheduling for multi-objective resource allocation through multi-criteria decision-making and deep Q-network in wireless body area networks.
J. Ambient Intell. Humaniz. Comput., December, 2023
Adaptive Scheduling and Power Control for Multi-Objective Optimization in IEEE 802.15.6 Based Personalized Wireless Body Area Networks.
IEEE Trans. Mob. Comput., November, 2023
Enabling Grant-Free URLLC for AoI Minimization in RAN-Coordinated 5G Health Monitoring System.
IEEE Internet Things J., October, 2023
Cyber security and beyond: Detecting malware and concept drift in AI-based sensor data streams using statistical techniques.
Comput. Electr. Eng., May, 2023
Neural Comput. Appl., April, 2023
DeepClassRooms: a deep learning based digital twin framework for on-campus class rooms.
Neural Comput. Appl., April, 2023
Neural Comput. Appl., April, 2023
Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications.
Ann. des Télécommunications, April, 2023
CEER: Cooperative Energy-Efficient Routing Mechanism for Underwater Wireless Sensor Networks Using Clusters.
Comput. Syst. Sci. Eng., 2023
Fuzzy Logic-Based Approach for Location Identification and Routing in the Outdoor Environment.
IEEE Access, 2023
IEEE Access, 2023
Semantic Orientation of Crosslingual Sentiments: Employment of Lexicon and Dictionaries.
IEEE Access, 2023
Proceedings of the 7th IEEE Congress on Information Science and Technology, 2023
2022
Haptic Feedback to Assist Blind People in Indoor Environment Using Vibration Patterns.
Sensors, 2022
Using Modified Technology Acceptance Model to Evaluate the Adoption of a Proposed IoT-Based Indoor Disaster Management Software Tool by Rescue Workers.
Sensors, 2022
Gene encoder: a feature selection technique through unsupervised deep learning-based clustering for large gene expression data.
Neural Comput. Appl., 2022
A novel binary chaotic genetic algorithm for feature selection and its utility in affective computing and healthcare.
Neural Comput. Appl., 2022
Neural Comput. Appl., 2022
BANSIM: A new discrete-event simulator for wireless body area networks with deep reinforcement learning in Python.
J. Syst. Archit., 2022
Trans. Emerg. Telecommun. Technol., 2022
Digit. Investig., 2022
Comput. Secur., 2022
Improving Source location privacy in social Internet of Things using a hybrid phantom routing technique.
Comput. Secur., 2022
Integrating visual stimuli for enhancing neural text style transfer with EEG sensors.
Comput. Electr. Eng., 2022
Leveraging brain-computer interface for implementation of a bio-sensor controlled game for attention deficit people.
Comput. Electr. Eng., 2022
A survey on analytical models for dynamic resource management in wireless body area networks.
Ad Hoc Networks, 2022
Ad Hoc Networks, 2022
IEEE Access, 2022
2021
Optimal Clustering in Wireless Sensor Networks for the Internet of Things Based on Memetic Algorithm: memeWSN.
Wirel. Commun. Mob. Comput., 2021
Drone Forensics: A Case Study of Digital Forensic Investigations Conducted on Common Drone Models.
Int. J. Digit. Crime Forensics, 2021
Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models.
Expert Syst. J. Knowl. Eng., 2021
Classification and Analysis of Android Malware Images Using Feature Fusion Technique.
IEEE Access, 2021
2020
J. Supercomput., 2020
Softw. Pract. Exp., 2020
Adaptive Real-Time Routing Protocol for (m, k)-Firm in Industrial Wireless Multimedia Sensor Networks.
Sensors, 2020
Guaranteed lifetime protocol for IoT based wireless sensor networks with multiple constraints.
Ad Hoc Networks, 2020
Improving M-Learners' Performance Through Deep Learning Techniques by Leveraging Features Weights.
IEEE Access, 2020
Applying Deep Neural Networks for Predicting Dark Triad Personality Trait of Online Users.
Proceedings of the 2020 International Conference on Information Networking, 2020
2019
Cross-company customer churn prediction in telecommunication: A comparison of data transformation methods.
Int. J. Inf. Manag., 2019
Int. J. Electron. Secur. Digit. Forensics, 2019
Compromised user credentials detection in a digital enterprise using behavioral analytics.
Future Gener. Comput. Syst., 2019
Novel Robust Digital Watermarking in Mid-Rank Co-efficient Based on DWT and RT Transform.
Proceedings of the New Knowledge in Information Systems and Technologies, 2019
Features Weight Estimation Using a Genetic Algorithm for Customer Churn Prediction in the Telecom Sector.
Proceedings of the New Knowledge in Information Systems and Technologies, 2019
Proceedings of the 10th IFIP International Conference on New Technologies, 2019
2018
Wirel. Commun. Mob. Comput., 2018
Context Mining of Sedentary Behaviour for Promoting Self-Awareness Using a Smartphone.
Sensors, 2018
Clust. Comput., 2018
Clust. Comput., 2018
Clust. Comput., 2018
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Proceedings of the 2018 IEEE Congress on Evolutionary Computation, 2018
2017
Wirel. Pers. Commun., 2017
Real-time routing protocols for (m, k)-firm streams based on multi-criteria in wireless sensor networks.
Wirel. Networks, 2017
A Tree Based Broadcast Scheme for (<i>m</i>, <i>k</i>)-firm Real-Time Stream in Wireless Sensor Networks.
Sensors, 2017
Int. J. Distributed Sens. Networks, 2017
IEICE Trans. Commun., 2017
Compromised User Credentials Detection Using Temporal Features: A Prudent Based Approach.
Proceedings of the 9th International Conference on Computer and Automation Engineering, 2017
2016
Wirel. Networks, 2016
J. Digit. Forensics Secur. Law, 2016
IEEE Access, 2016
Proceedings of the Tenth IEEE International Conference on Semantic Computing, 2016
Proceedings of the Sixth International Conference on Digital Information and Communication Technology and its Applications, 2016
Proceedings of the 9th International Conference on Developments in eSystems Engineering, 2016
2015
Fuzzy Logic-Based Guaranteed Lifetime Protocol for Real-Time Wireless Sensor Networks.
Sensors, 2015
2014
Towards Enhanced Searching Architecture for Unstructured Peer-to-Peer Over Mobile Ad Hoc Networks.
Wirel. Pers. Commun., 2014
Int. J. Distributed Sens. Networks, 2014
Int. J. Distributed Sens. Networks, 2014
Proceedings of the IEEE 12th International Conference on Dependable, 2014
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
2013
J. Inform. and Commun. Convergence Engineering, 2013
2012
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012