Sajid Anwar

Orcid: 0000-0003-3393-1656

According to our database1, Sajid Anwar authored at least 54 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Knowledge Graph Enhanced Contextualized Attention-Based Network for Responsible User-Specific Recommendation.
ACM Trans. Intell. Syst. Technol., August, 2024

Discovering the Correlation Between Phishing Susceptibility Causing Data Biases and Big Five Personality Traits Using C-GAN.
IEEE Trans. Comput. Soc. Syst., August, 2024

2023
Cyber security and beyond: Detecting malware and concept drift in AI-based sensor data streams using statistical techniques.
Comput. Electr. Eng., May, 2023

Special issue on towards advancements in machine learning for exploiting large-scale and heterogeneous repositories.
Neural Comput. Appl., April, 2023

An adaptive learning approach for customer churn prediction in the telecommunication industry using evolutionary computation and Naïve Bayes.
Appl. Soft Comput., April, 2023

Energy optimization in smart urban buildings using bio-inspired ant colony optimization.
Soft Comput., 2023

Incorporating Feature Penalty in Reinforcement Learning for Ludo Game.
Proceedings of the 7th IEEE Congress on Information Science and Technology, 2023

2022
Intrusion detection in networks using cuckoo search optimization.
Soft Comput., 2022

NLP-SEA 2021 Workshop Summary.
ACM SIGSOFT Softw. Eng. Notes, 2022

Clustering uncertain graphs using ant colony optimization (ACO).
Neural Comput. Appl., 2022

Special issue on advanced deep learning methods for large scale repositories.
Neural Comput. Appl., 2022

A deep learning system for health care IoT and smartphone malware detection.
Neural Comput. Appl., 2022

Confusion matrix-based modularity induction into pretrained CNN.
Multim. Tools Appl., 2022

On finding optimum commuting path in a road network: A computational approach for smart city traveling.
Trans. Emerg. Telecommun. Technol., 2022

Android malware detection through generative adversarial networks.
Trans. Emerg. Telecommun. Technol., 2022

2021
COVID-19 Patient Count Prediction Using LSTM.
IEEE Trans. Comput. Soc. Syst., 2021

A novel framework for generating handwritten datasets.
Multim. Tools Appl., 2021

Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models.
Expert Syst. J. Knowl. Eng., 2021

2020
Just-in-time customer churn prediction in the telecommunication sector.
J. Supercomput., 2020

Countering Malicious URLs in Internet of Things Using a Knowledge-Based Approach and a Simulated Expert.
IEEE Internet Things J., 2020

Power maximisation technique for generating secret keys by exploiting physical layer security in wireless communication.
IET Commun., 2020

An Automated Permission Selection Framework for Android Platform.
J. Grid Comput., 2020

Static malware detection and attribution in android byte-code through an end-to-end deep system.
Future Gener. Comput. Syst., 2020

Conceptualization of smartphone usage and feature preferences among various demographics.
Clust. Comput., 2020

2019
Efficient motion estimation using two-bit transform and modified multilevel successive elimination.
J. Ambient Intell. Humaniz. Comput., 2019

Cross-company customer churn prediction in telecommunication: A comparison of data transformation methods.
Int. J. Inf. Manag., 2019

Special Issue on Knowledge Discovery in Big Data (KDBD).
J. Grid Comput., 2019

Compromised user credentials detection in a digital enterprise using behavioral analytics.
Future Gener. Comput. Syst., 2019

The journal of knowledge engineering special issue on WorldCist'17 - fifth world conference on information systems and technologies.
Expert Syst. J. Knowl. Eng., 2019

Big Data Visualization in Cardiology - A Systematic Review and Future Directions.
IEEE Access, 2019

Multiple Moving Vehicle Speed Estimation Using Blob Analysis.
Proceedings of the New Knowledge in Information Systems and Technologies, 2019

Features Weight Estimation Using a Genetic Algorithm for Customer Churn Prediction in the Telecom Sector.
Proceedings of the New Knowledge in Information Systems and Technologies, 2019

2018
A prudent based approach for compromised user credentials detection.
Clust. Comput., 2018

Beyond Beall's Blacklist: Automatic Detection of Open Access Predatory Research Journals.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

Just-in-time Customer Churn Prediction: With and Without Data Transformation.
Proceedings of the 2018 IEEE Congress on Evolutionary Computation, 2018

2017
Structured Pruning of Deep Convolutional Neural Networks.
ACM J. Emerg. Technol. Comput. Syst., 2017

Customer churn prediction in the telecommunication sector using a rough set approach.
Neurocomputing, 2017

Compromised User Credentials Detection Using Temporal Features: A Prudent Based Approach.
Proceedings of the 9th International Conference on Computer and Automation Engineering, 2017

2016
Compact Deep Convolutional Neural Networks With Coarse Pruning.
CoRR, 2016

Comparing Oversampling Techniques to Handle the Class Imbalance Problem: A Customer Churn Prediction Case Study.
IEEE Access, 2016

Learning separable fixed-point kernels for deep convolutional neural networks.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

2015
Churn Prediction in Telecommunication Industry Using Rough Set Approach.
Proceedings of the New Trends in Computational Collective Intelligence, 2015

Site selection for food distribution using rough set approach and TOPSIS method.
J. Intell. Fuzzy Syst., 2015

Posted price selling and online auctions.
Games Econ. Behav., 2015

A Comparison of Two Oversampling Techniques (SMOTE vs MTDF) for Handling Class Imbalance Problem: A Case Study of Customer Churn Prediction.
Proceedings of the New Contributions in Information Systems and Technologies, 2015

Fixed point optimization of deep convolutional neural networks for object recognition.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

A Prudent Based Approach for Customer Churn Prediction.
Proceedings of the Beyond Databases, Architectures and Structures, 2015

2014
Customer Churn Prediction in Telecommunication Industry: With and without Counter-Example.
Proceedings of the Nature-Inspired Computation and Machine Learning, 2014

2013
Behavioral Attestation for Web Services using access policies.
Multim. Tools Appl., 2013

Semantic Based Ontology Driven Feature Interaction Detection & Modeling.
Proceedings of the International Conference on Information Science and Applications, 2013

2012
Project scheduling conflict identification and resolution using genetic algorithms (GA).
Telecommun. Syst., 2012

2010
Maximizing GUI Test Coverage Through Particle Swarm Optimization.
Proceedings of the ISCA 19th International Conference on Software Engineeringand Data Engineering (SEDE-2010) June 16-18, 2010

Automated GUI Test Coverage Analysis Using GA.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

Evolutionary Based Automated Coverage Analysis for GUI Testing.
Proceedings of the Contemporary Computing - Third International Conference, 2010


  Loading...