Saqib Ali

Orcid: 0000-0001-7905-7306

According to our database1, Saqib Ali authored at least 90 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Examining the Factors That Influence User Information Security Behavior toward COVID-19 Scams.
Int. J. Hum. Comput. Interact., December, 2024

An improved 3D U-Net-based deep learning system for brain tumor segmentation using multi-modal MRI.
Multim. Tools Appl., November, 2024

Fake or Fact News? Investigating Users' Online Fake News Sharing Behavior: The Moderating Role of Social Networking Sites (SNS) Dependency.
Int. J. Hum. Comput. Interact., July, 2024

Efficient scheme to perform semantic segmentation on 3-D brain tumor using 3-D u-net architecture.
Multim. Tools Appl., March, 2024

Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: a survey.
Ad Hoc Networks, January, 2024

DCFH: A dynamic clustering approach based on fire hawk optimizer in flying ad hoc networks.
Veh. Commun., 2024

A novel Q-learning-based secure routing scheme with a robust defensive system against wormhole attacks in flying ad hoc networks.
Veh. Commun., 2024

Energy optimized data fusion approach for scalable wireless sensor network using deep learning-based scheme.
J. Netw. Comput. Appl., 2024

A smart filtering-based adaptive optimized link state routing protocol in flying ad hoc networks for traffic monitoring.
J. King Saud Univ. Comput. Inf. Sci., 2024

ELIDS: Ensemble Feature Selection for Lightweight IDS against DDoS Attacks in Resource-Constrained IoT Environment.
Future Gener. Comput. Syst., 2024

Cyber Risk Assessment for Cyber-Physical Systems: A Review of Methodologies and Recommendations for Improved Assessment Effectiveness.
CoRR, 2024

Corrections to "An Author Gender Detection Method Using Whale Optimization Algorithm and Artificial Neural Network".
IEEE Access, 2024

Corrections to "Deep Learning-Based Intrusion Detection Systems: A Systematic Review".
IEEE Access, 2024

Sensors Faults Classification and Faulty Signals Reconstruction Using Deep Learning.
IEEE Access, 2024

2023
A novel Q-learning-based routing scheme using an intelligent filtering algorithm for flying ad hoc networks (FANETs).
J. King Saud Univ. Comput. Inf. Sci., December, 2023

Examining the effect of regulatory factors on avoiding online blackmail threats on social media: A structural equation modeling approach.
Comput. Hum. Behav., July, 2023

A recognition model for handwritten Persian/Arabic numbers based on optimized deep convolutional neural network.
Multim. Tools Appl., April, 2023

Differentially private block coordinate descent.
J. King Saud Univ. Comput. Inf. Sci., January, 2023

Membership inference attack on differentially private block coordinate descent.
PeerJ Comput. Sci., 2023

2022
Designing an E-Voting Framework Using Blockchain Technology: A Case Study of Oman.
Int. J. Electron. Gov. Res., May, 2022

OLSR+: A new routing method based on fuzzy logic in flying ad-hoc networks (FANETs).
Veh. Commun., 2022

Determinants of intention to use e-government services: An integrated marketing relation view.
Telematics Informatics, 2022

The Impact of Social Media in Learning and Teaching: A Bibliometric-based Citation Analysis.
CoRR, 2022

Technomoral Affordances of Artificial Intelligence in Data-Driven Systems.
Computer, 2022

Smart Cities Security Threat Landscape: A Review.
Comput. Informatics, 2022

A state-of-the-art technique to perform cloud-based semantic segmentation using deep learning 3D U-Net architecture.
BMC Bioinform., 2022

A Multi-module 3D U-Net Learning Architecture for Brain Tumor Segmentation.
Proceedings of the Data Mining and Big Data - 7th International Conference, 2022

2021
A multiple multilayer perceptron neural network with an adaptive learning algorithm for thyroid disease diagnosis in the internet of medical things.
J. Supercomput., 2021

Computer Vision-Based Microcalcification Detection in Digital Mammograms Using Fully Connected Depthwise Separable Convolutional Neural Network.
Sensors, 2021

Artificial intelligence approaches and mechanisms for big data analytics: a systematic study.
PeerJ Comput. Sci., 2021

A new model for investigating the role of knowledge management system on the mental health of employees.
Kybernetes, 2021

Cybersecurity management for distributed control system: systematic approach.
J. Ambient Intell. Humaniz. Comput., 2021

E-Participation Within E-Government: A Bibliometric-Based Systematic Literature Review.
Int. J. Electron. Gov. Res., 2021

An Energy-Aware and Predictive Fuzzy Logic-Based Routing Scheme in Flying Ad Hoc Networks (FANETs).
IEEE Access, 2021

Deep Learning-Based Intrusion Detection Systems: A Systematic Review.
IEEE Access, 2021

Investigating the Challenges Facing Composable/ Disaggregated Infrastructure Implementation: A Literature Review.
Proceedings of the 22nd International Arab Conference on Information Technology, 2021

Applying NIST SP 800-161 in Supply Chain Processes Empowered by Artificial Intelligence.
Proceedings of the 22nd International Arab Conference on Information Technology, 2021

2020
An Effective and Improved CNN-ELM Classifier for Handwritten Digits Recognition and Classification.
Symmetry, 2020

Cloud-based efficient scheme for handwritten digit recognition.
Multim. Tools Appl., 2020

Theoretical Approach for Instrument Development in Measuring User-Perceived E-Government Service Quality: A Case of Oman E-Government Services.
Int. J. Electron. Gov. Res., 2020

An Author Gender Detection Method Using Whale Optimization Algorithm and Artificial Neural Network.
IEEE Access, 2020

A Hybrid Service Selection and Composition Model for Cloud-Edge Computing in the Internet of Things.
IEEE Access, 2020

Aspect Based Sentiment Analysis of Ridesharing Platform Reviews for Kansei Engineering.
IEEE Access, 2020

Risk-Averse Home Energy Management System.
IEEE Access, 2020

The Future Prospects of Adversarial Nets.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

Blockchain and IoT Based Textile Manufacturing Traceability System in Industry 4.0.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

Performance Analysis of ZigBee-based IoT Prototype for Remote Monitoring in Power Grid Systems.
Proceedings of the SMA 2020: The 9th International Conference on Smart Media and Applications, Jeju, Republic of Korea, September 17, 2020

Intelligent Surveillance in Smart City Using 3D Road Monitoring.
Proceedings of the 8th IEEE International Conference on Smart City and Informatization, 2020

Sentiment Analysis of Code-Mixed Roman Urdu-English Social Media Text using Deep Learning Approaches.
Proceedings of the 23rd IEEE International Conference on Computational Science and Engineering, 2020

2019
SEO: A unique approach to enhance the site rank by implementing Efficient Keywords Scheme.
PeerJ Prepr., 2019

Libra Critique Towards Global Decentralized Financial System.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Semantic Knowledge Based Graph Model in Smart Cities.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

To Explore the Factors that Affect Behavior of Employee Regarding Knowledge Sharing in IT Service Companies.
Proceedings of the Intelligent Technologies and Applications, 2019

2018
Cyber Security for Cyber Physical Systems
Studies in Computational Intelligence 768, Springer, ISBN: 978-3-319-75880-0, 2018

Secure Data Provenance in Cloud-Centric Internet of Things via Blockchain Smart Contracts.
Proceedings of the 2018 IEEE SmartWorld, 2018

A Blockchain-Based Decentralized Data Storage and Access Framework for PingER.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Cloud Based Face Recognition for Google Glass.
Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, 2018

Internet Performance Prediction Framework Based on PingER Dataset.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Android Malware Detection Using Category-Based Permission Vectors.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Substituting Missing Values in End-to-End Internet Performance Measurements Using k-Nearest Neighbors.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

2017
Guidelines and deployment of accessibility-aware framework approach.
Int. J. Web Inf. Syst., 2017

Cloud Computing: Virtual Web Hosting on Infrastructure as a Service (IaaS).
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

Internet Performance Analysis of South Asian Countries Using End-to-End Internet Performance Measurements.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Detecting Anomalies from End-to-End Internet Performance Measurements (PingER) Using Cluster Based Local Outlier Factor.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

2016
Optimized interference aware joint channel assignment model for wireless mesh network.
Telecommun. Syst., 2016

Economics of Cyber Security and the Way Forward.
Int. J. Cyber Warf. Terror., 2016

Exploring the Dimensions of Electronic Government Service Quality.
Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering, 2016

Applying big data warehousing and visualization techniques on pingER data.
Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing, 2016

2015
An Analysis of the Security Threats and Vulnerabilities of Cloud Computing in Oman.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

A Road Map to Risk Management Framework for Successful Implementation of Cloud Computing in Oman.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

2014
Interference Nomenclature in Wireless Mesh Networks.
Wirel. Pers. Commun., 2014

2012
Ergonomics of usability/accessibility-ready websites: Tools and guidelines.
Webology, 2012

Multi-criteria Receiver Self-Election Scheme for Optimal Packet Forwarding in Vehicular Ad hoc Networks.
Int. J. Comput. Commun. Control, 2012

A taxonomy of cross layer routing metrics for wireless mesh networks.
EURASIP J. Wirel. Commun. Netw., 2012

Unified Threat Management System Approach for Securing SME's Network Infrastructure.
Proceedings of the Ninth IEEE International Conference on e-Business Engineering, 2012

2011
Application layer QoS optimization for multimedia transmission over cognitive radio networks.
Wirel. Networks, 2011

QoS Provisioning for Multimedia Transmission in Cognitive Radio Networks
CoRR, 2011

2010
The key success factors to mobile commerce for Arab countries in Middle East.
Proceedings of the iiWAS'2010, 2010

2009
A Hopping Code for MMFSK in a Power-line Channel.
J. Commun., 2009

Cross-layer QoS provisioning for multimedia transmissions in cognitive radio networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

Novel Predistortion Algorithm for OFDMA.
Proceedings of the 69th IEEE Vehicular Technology Conference, 2009

2008
A Mobile Business Process Deployment Framework for Device Independence and Context-Aware Environments.
Proceedings of the ICE-B 2008, 2008

2007
Mobile Business Process Deployment in Device Independence & Context-aware Environment.
Proceedings of the iiWAS'2007, 2007

Rule component specification for business process deployment.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

2006
A novel approach toward integration of rules into business processes using an agent-oriented framework.
IEEE Trans. Ind. Informatics, 2006

A New Modelling Approach to Enhance Reliability of Transactional Oriented Web-Services.
Proceedings of the iiWAS'2006, 2006

Location Aware Business Process Deployment.
Proceedings of the Computational Science and Its Applications, 2006

2005
A New Adaptive Business Model for E-Commerce.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Design and Implementation of a Model for Business Rules Automation.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

2002
Exploring Multiple Levels of Parallelism for Regular and Irregular Algorithms using BOPS'DSP.
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002


  Loading...