Babar Shah

Orcid: 0000-0001-7190-550X

According to our database1, Babar Shah authored at least 79 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A deep learning-assisted visual attention mechanism for anomaly detection in videos.
Multim. Tools Appl., September, 2024

Knowledge Graph Enhanced Contextualized Attention-Based Network for Responsible User-Specific Recommendation.
ACM Trans. Intell. Syst. Technol., August, 2024

Discovering the Correlation Between Phishing Susceptibility Causing Data Biases and Big Five Personality Traits Using C-GAN.
IEEE Trans. Comput. Soc. Syst., August, 2024

Blood cell image segmentation and classification: a systematic review.
PeerJ Comput. Sci., 2024

2023
Role of authentication factors in Fin-tech mobile transaction security.
J. Big Data, December, 2023

Adaptive scheduling for multi-objective resource allocation through multi-criteria decision-making and deep Q-network in wireless body area networks.
J. Ambient Intell. Humaniz. Comput., December, 2023

Adaptive Scheduling and Power Control for Multi-Objective Optimization in IEEE 802.15.6 Based Personalized Wireless Body Area Networks.
IEEE Trans. Mob. Comput., November, 2023

Enabling Grant-Free URLLC for AoI Minimization in RAN-Coordinated 5G Health Monitoring System.
IEEE Internet Things J., October, 2023

Cyber security and beyond: Detecting malware and concept drift in AI-based sensor data streams using statistical techniques.
Comput. Electr. Eng., May, 2023

Discriminator-based adversarial networks for knowledge graph completion.
Neural Comput. Appl., April, 2023

DeepClassRooms: a deep learning based digital twin framework for on-campus class rooms.
Neural Comput. Appl., April, 2023

Transfer learning for histopathology images: an empirical study.
Neural Comput. Appl., April, 2023

Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications.
Ann. des Télécommunications, April, 2023

CEER: Cooperative Energy-Efficient Routing Mechanism for Underwater Wireless Sensor Networks Using Clusters.
Comput. Syst. Sci. Eng., 2023

Fuzzy Logic-Based Approach for Location Identification and Routing in the Outdoor Environment.
IEEE Access, 2023

A Survey of EEG and Machine Learning-Based Methods for Neural Rehabilitation.
IEEE Access, 2023

Semantic Orientation of Crosslingual Sentiments: Employment of Lexicon and Dictionaries.
IEEE Access, 2023

Incorporating Feature Penalty in Reinforcement Learning for Ludo Game.
Proceedings of the 7th IEEE Congress on Information Science and Technology, 2023

2022
Haptic Feedback to Assist Blind People in Indoor Environment Using Vibration Patterns.
Sensors, 2022

Using Modified Technology Acceptance Model to Evaluate the Adoption of a Proposed IoT-Based Indoor Disaster Management Software Tool by Rescue Workers.
Sensors, 2022

Gene encoder: a feature selection technique through unsupervised deep learning-based clustering for large gene expression data.
Neural Comput. Appl., 2022

A novel binary chaotic genetic algorithm for feature selection and its utility in affective computing and healthcare.
Neural Comput. Appl., 2022

An Assortment of Evolutionary Computation Techniques (AECT) in gaming.
Neural Comput. Appl., 2022

BANSIM: A new discrete-event simulator for wireless body area networks with deep reinforcement learning in Python.
J. Syst. Archit., 2022

Android malware detection through generative adversarial networks.
Trans. Emerg. Telecommun. Technol., 2022

Forensic investigation of Google Meet for memory and browser artifacts.
Digit. Investig., 2022

A GPU-based machine learning approach for detection of botnet attacks.
Comput. Secur., 2022

Improving Source location privacy in social Internet of Things using a hybrid phantom routing technique.
Comput. Secur., 2022

Integrating visual stimuli for enhancing neural text style transfer with EEG sensors.
Comput. Electr. Eng., 2022

Leveraging brain-computer interface for implementation of a bio-sensor controlled game for attention deficit people.
Comput. Electr. Eng., 2022

A survey on analytical models for dynamic resource management in wireless body area networks.
Ad Hoc Networks, 2022

An extended IEEE 802.15.6 for thermal-aware resource management.
Ad Hoc Networks, 2022

Emotion Quantification Using Variational Quantum State Fidelity Estimation.
IEEE Access, 2022

2021
Optimal Clustering in Wireless Sensor Networks for the Internet of Things Based on Memetic Algorithm: memeWSN.
Wirel. Commun. Mob. Comput., 2021

COVID-19 Patient Count Prediction Using LSTM.
IEEE Trans. Comput. Soc. Syst., 2021

Drone Forensics: A Case Study of Digital Forensic Investigations Conducted on Common Drone Models.
Int. J. Digit. Crime Forensics, 2021

Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models.
Expert Syst. J. Knowl. Eng., 2021

Classification and Analysis of Android Malware Images Using Feature Fusion Technique.
IEEE Access, 2021

2020
Just-in-time customer churn prediction in the telecommunication sector.
J. Supercomput., 2020

A secure fog-based platform for SCADA-based IoT critical infrastructure.
Softw. Pract. Exp., 2020

Adaptive Real-Time Routing Protocol for (m, k)-Firm in Industrial Wireless Multimedia Sensor Networks.
Sensors, 2020

Guaranteed lifetime protocol for IoT based wireless sensor networks with multiple constraints.
Ad Hoc Networks, 2020

Improving M-Learners' Performance Through Deep Learning Techniques by Leveraging Features Weights.
IEEE Access, 2020

Applying Deep Neural Networks for Predicting Dark Triad Personality Trait of Online Users.
Proceedings of the 2020 International Conference on Information Networking, 2020

2019
Wireless Sensor Networks for Big Data Systems.
Sensors, 2019

Cross-company customer churn prediction in telecommunication: A comparison of data transformation methods.
Int. J. Inf. Manag., 2019

Drone forensics: examination and analysis.
Int. J. Electron. Secur. Digit. Forensics, 2019

Compromised user credentials detection in a digital enterprise using behavioral analytics.
Future Gener. Comput. Syst., 2019

Novel Robust Digital Watermarking in Mid-Rank Co-efficient Based on DWT and RT Transform.
Proceedings of the New Knowledge in Information Systems and Technologies, 2019

Features Weight Estimation Using a Genetic Algorithm for Customer Churn Prediction in the Telecom Sector.
Proceedings of the New Knowledge in Information Systems and Technologies, 2019

Forensic Analysis of Wearable Devices: Fitbit, Garmin and HETP Watches.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

2018
Real-Time Communication in Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2018

Context Mining of Sedentary Behaviour for Promoting Self-Awareness Using a Smartphone.
Sensors, 2018

Fuzzy searching and routing in unstructured mobile peer-to-peer networks.
Clust. Comput., 2018

A prudent based approach for compromised user credentials detection.
Clust. Comput., 2018

Analyzing students' performance using multi-criteria classification.
Clust. Comput., 2018

Fuzzy Energy Efficient Routing for Internet of Things (IoT).
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

An Enhanced Temperature Aware Routing Protocol in Wireless Body Area Networks.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Just-in-time Customer Churn Prediction: With and Without Data Transformation.
Proceedings of the 2018 IEEE Congress on Evolutionary Computation, 2018

2017
Adaptive Forwarding Scheme for Bounded Time Constraint in Delay Tolerant Networks.
Wirel. Pers. Commun., 2017

Real-time routing protocols for (m, k)-firm streams based on multi-criteria in wireless sensor networks.
Wirel. Networks, 2017

A Tree Based Broadcast Scheme for (<i>m</i>, <i>k</i>)-firm Real-Time Stream in Wireless Sensor Networks.
Sensors, 2017

Three-dimensional wireless ad hoc and sensor networks 2016.
Int. J. Distributed Sens. Networks, 2017

Variants of Spray and Forwarding Scheme in Delay Tolerant Networks.
IEICE Trans. Commun., 2017

Compromised User Credentials Detection Using Temporal Features: A Prudent Based Approach.
Proceedings of the 9th International Conference on Computer and Automation Engineering, 2017

2016
An architecture for (m, k)-firm real-time streams in wireless sensor networks.
Wirel. Networks, 2016

Bloom Filters Optimized Wu-Manber for Intrusion Detection.
J. Digit. Forensics Secur. Law, 2016

Auto-Configuration of ACL Policy in Case of Topology Change in Hybrid SDN.
IEEE Access, 2016

Fuzzy Query Routing in Unstructured Mobile Peer-to-Peer Networks.
Proceedings of the Tenth IEEE International Conference on Semantic Computing, 2016

Micro-context recognition of sedentary behaviour using smartphone.
Proceedings of the Sixth International Conference on Digital Information and Communication Technology and its Applications, 2016

Multimedia File Signature Analysis for Smartphone Forensics.
Proceedings of the 9th International Conference on Developments in eSystems Engineering, 2016

2015
Fuzzy Logic-Based Guaranteed Lifetime Protocol for Real-Time Wireless Sensor Networks.
Sensors, 2015

2014
Towards Enhanced Searching Architecture for Unstructured Peer-to-Peer Over Mobile Ad Hoc Networks.
Wirel. Pers. Commun., 2014

A Survey on Three-Dimensional Wireless Ad Hoc and Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

A New Real-Time and Guaranteed Lifetime Protocol in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Fuzzy Search Controller in Unstructured Mobile Peer-to-Peer Networks.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

A Guaranteed Lifetime Protocol for Real-Time Wireless Sensor Networks.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
An Enhanced Searching Algorithm over Unstructured Mobile P2P Overlay Networks.
J. Inform. and Commun. Convergence Engineering, 2013

2012
Modeling of Energy Consumption for K-Coverage in Wireless Sensor Networks.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012


  Loading...