Sadaqat ur Rehman

Orcid: 0000-0001-7823-3814

According to our database1, Sadaqat ur Rehman authored at least 52 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ENSO dataset & comparison of deep learning models for ENSO forecasting.
Earth Sci. Informatics, June, 2024

Enhancing the security in IoT and IIoT networks: An intrusion detection scheme leveraging deep transfer learning.
Knowl. Based Syst., 2024

A Two-branch Edge Guided Lightweight Network for infrared image saliency detection.
Comput. Electr. Eng., 2024

2023
A novel routing optimization strategy based on reinforcement learning in perception layer networks.
Comput. Networks, December, 2023

Cyberattacks and Security of Cloud Computing: A Complete Guideline.
Symmetry, November, 2023

Two-Stage Domain Adaptation for Infrared Ship Target Segmentation.
IEEE Trans. Geosci. Remote. Sens., 2023

Facial Expression Recognition from Occluded Images Using Deep Convolution Neural Network with Vision Transformer.
Proceedings of the Image and Graphics - 12th International Conference, 2023

Trends and Challenges of Project-Based Learning in Computer Science and Engineering Education.
Proceedings of the 15th International Conference on Education Technology and Computers, 2023

A Hybrid Deep Learning Model for Breast Cancer Detection and Classification.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

Physical Layer Authentication Based on Transformer.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

2022
A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations.
Wirel. Pers. Commun., 2022

Social Phenomena and Fog Computing Networks: A Novel Perspective for Future Networks.
IEEE Trans. Comput. Soc. Syst., 2022

A new color image encryption technique using DNA computing and Chaos-based substitution box.
Soft Comput., 2022

A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map.
Multim. Tools Appl., 2022

The role of artificial intelligence and machine learning in wireless networks security: principle, practice and challenges.
Artif. Intell. Rev., 2022

An Improved dynamic functional connectivity and deep neural network model for Autism Spectrum Disorder Classification.
Proceedings of the ICDLT 2022: 6th International Conference on Deep Learning Technologies, Xi'an, China, July 26, 2022

A Spatial-Temporal Integration Analysis to Classify Dynamic Functional Connectivity for Brain Disease Diagnosis.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

2021
Reinforcement Learning Assisted Impersonation Attack Detection in Device-to-Device Communications.
IEEE Trans. Veh. Technol., 2021

Software Birthmark Usability for Source Code Transformation Using Machine Learning Algorithms.
Sci. Program., 2021

ModPSO-CNN: an evolutionary convolution neural network with application to visual recognition.
Soft Comput., 2021

A Hybrid Deep CNN Model for Abnormal Arrhythmia Detection Based on Cardiac ECG Signal.
Sensors, 2021

An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks.
Sensors, 2021

A fusing framework of shortcut convolutional neural networks.
Inf. Sci., 2021

Recent Development, Trends and Challenges in IoT Security.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021

Deep Learning Models for Intelligent Healthcare: Implementation and Challenges.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021

News on Twitter: Engagement, Exposure and Estimating Credibility using Machine Learning.
Proceedings of the 8th International Conference on Behavioral and Social Computing, 2021

2020
The Allocation and Reuse Scheme of Physical Cell Identifications Based on Maximum Degree First Coloring Algorithm.
IEEE Syst. J., 2020

Optimisation-based training of evolutionary convolution neural network for visual classification applications.
IET Comput. Vis., 2020

Power maximisation technique for generating secret keys by exploiting physical layer security in wireless communication.
IET Commun., 2020

Deep Learning Techniques for Future Intelligent Cross-Media Retrieval.
CoRR, 2020

Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL.
Comput. Commun., 2020

Tracking area list allocation scheme based on overlapping community algorithm.
Comput. Networks, 2020

A Novel Quantum Inspired Particle Swarm Optimization Algorithm for Electromagnetic Applications.
IEEE Access, 2020

Implementation and Use of Disease Diagnosis Systems for Electronic Medical Records Based on Machine Learning: A Complete Review.
IEEE Access, 2020

An Efficient Non-Toxic and Non-Corrosive Perovskite Solar Cell.
IEEE Access, 2020

High-Performance Linguistic Steganalysis, Capacity Estimation and Steganographic Positioning.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020

An Efficient Approach for Selecting a Secure Relay Node in Fog Computing Social Ties Network.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

2019
Unsupervised pre-trained filter learning approach for efficient convolution neural network.
Neurocomputing, 2019

Tracking areas planning based on spectral clustering in small cell networks.
IET Commun., 2019

Water Preservation in Soan River Basin using Deep Learning Techniques.
CoRR, 2019

Learning a Semantic Space for Modeling Images, Tags and Feelings in Cross-Media Search.
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2019

Multicast Multipath TCP for Reliable Communication in Wireless Scenarios.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2018
Optimization of CNN through Novel Training Strategy for Visual Classification Problems.
Entropy, 2018

Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack.
IEEE Access, 2018

FHC-PCIA: A Physical Cell Identification Allocation Method Based on Fuzzy Hierarchical Clustering for Heterogeneous Cellular Network.
IEEE Access, 2018

SSLSS: Semi-Supervised Learning-Based Steganalysis Scheme for Instant Voice Communication Network.
IEEE Access, 2018

A Benchmark Dataset and Learning High-Level Semantic Embeddings of Multimedia for Cross-Media Retrieval.
IEEE Access, 2018

A Quantum Particle Swarm Optimization Method With Fitness Selection Methodology for Electromagnetic Inverse Problems.
IEEE Access, 2018

Facebook5k: A Novel Evaluation Resource Dataset for Cross-Media Search.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
CSFL: A novel unsupervised convolution neural network approach for visual pattern classification.
AI Commun., 2017

Image Captioning with Object Detection and Localization.
Proceedings of the Image and Graphics - 9th International Conference, 2017

2012
Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN).
CoRR, 2012


  Loading...