Sadaqat ur Rehman
Orcid: 0000-0001-7823-3814
According to our database1,
Sadaqat ur Rehman
authored at least 52 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Earth Sci. Informatics, June, 2024
Enhancing the security in IoT and IIoT networks: An intrusion detection scheme leveraging deep transfer learning.
Knowl. Based Syst., 2024
Comput. Electr. Eng., 2024
2023
A novel routing optimization strategy based on reinforcement learning in perception layer networks.
Comput. Networks, December, 2023
Symmetry, November, 2023
IEEE Trans. Geosci. Remote. Sens., 2023
Facial Expression Recognition from Occluded Images Using Deep Convolution Neural Network with Vision Transformer.
Proceedings of the Image and Graphics - 12th International Conference, 2023
Trends and Challenges of Project-Based Learning in Computer Science and Engineering Education.
Proceedings of the 15th International Conference on Education Technology and Computers, 2023
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023
2022
A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations.
Wirel. Pers. Commun., 2022
Social Phenomena and Fog Computing Networks: A Novel Perspective for Future Networks.
IEEE Trans. Comput. Soc. Syst., 2022
A new color image encryption technique using DNA computing and Chaos-based substitution box.
Soft Comput., 2022
A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map.
Multim. Tools Appl., 2022
The role of artificial intelligence and machine learning in wireless networks security: principle, practice and challenges.
Artif. Intell. Rev., 2022
An Improved dynamic functional connectivity and deep neural network model for Autism Spectrum Disorder Classification.
Proceedings of the ICDLT 2022: 6th International Conference on Deep Learning Technologies, Xi'an, China, July 26, 2022
A Spatial-Temporal Integration Analysis to Classify Dynamic Functional Connectivity for Brain Disease Diagnosis.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
2021
Reinforcement Learning Assisted Impersonation Attack Detection in Device-to-Device Communications.
IEEE Trans. Veh. Technol., 2021
Software Birthmark Usability for Source Code Transformation Using Machine Learning Algorithms.
Sci. Program., 2021
ModPSO-CNN: an evolutionary convolution neural network with application to visual recognition.
Soft Comput., 2021
A Hybrid Deep CNN Model for Abnormal Arrhythmia Detection Based on Cardiac ECG Signal.
Sensors, 2021
An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks.
Sensors, 2021
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021
News on Twitter: Engagement, Exposure and Estimating Credibility using Machine Learning.
Proceedings of the 8th International Conference on Behavioral and Social Computing, 2021
2020
The Allocation and Reuse Scheme of Physical Cell Identifications Based on Maximum Degree First Coloring Algorithm.
IEEE Syst. J., 2020
Optimisation-based training of evolutionary convolution neural network for visual classification applications.
IET Comput. Vis., 2020
Power maximisation technique for generating secret keys by exploiting physical layer security in wireless communication.
IET Commun., 2020
Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL.
Comput. Commun., 2020
Comput. Networks, 2020
A Novel Quantum Inspired Particle Swarm Optimization Algorithm for Electromagnetic Applications.
IEEE Access, 2020
Implementation and Use of Disease Diagnosis Systems for Electronic Medical Records Based on Machine Learning: A Complete Review.
IEEE Access, 2020
High-Performance Linguistic Steganalysis, Capacity Estimation and Steganographic Positioning.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020
An Efficient Approach for Selecting a Secure Relay Node in Fog Computing Social Ties Network.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020
2019
Unsupervised pre-trained filter learning approach for efficient convolution neural network.
Neurocomputing, 2019
IET Commun., 2019
Learning a Semantic Space for Modeling Images, Tags and Feelings in Cross-Media Search.
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2019
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
2018
Optimization of CNN through Novel Training Strategy for Visual Classification Problems.
Entropy, 2018
IEEE Access, 2018
FHC-PCIA: A Physical Cell Identification Allocation Method Based on Fuzzy Hierarchical Clustering for Heterogeneous Cellular Network.
IEEE Access, 2018
SSLSS: Semi-Supervised Learning-Based Steganalysis Scheme for Instant Voice Communication Network.
IEEE Access, 2018
A Benchmark Dataset and Learning High-Level Semantic Embeddings of Multimedia for Cross-Media Retrieval.
IEEE Access, 2018
A Quantum Particle Swarm Optimization Method With Fitness Selection Methodology for Electromagnetic Inverse Problems.
IEEE Access, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
CSFL: A novel unsupervised convolution neural network approach for visual pattern classification.
AI Commun., 2017
Proceedings of the Image and Graphics - 9th International Conference, 2017
2012
Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN).
CoRR, 2012