Mr. Asghar Ali Shah
Category: Faculty
Published on: March 8, 2023
Personal Information
Name Mr. Asghar Ali Shah
Email aashah.buic@bahria.edu.pk
Phone 9260002 ext 1341
Research Area Machine Learning, Deep Learning, AI, Network Security
Number of Publications Conferences = 6,Journals = 26
Affiliation
Designation Assistant Professor
Department Computer Science
University Bahria University Islamabad Campus
Qualification
Degree Passing Year Majors University
PhD-CS In-Progress since 2017 Machine learning Deep Learning UMT
MS – IT 2007 Computer Networks IMSciences Peshawar
MIT 2004 Computer Networks CECOS University
Teaching Experience
Designation From To Organization
Assistant Professor Feb 2023 Date Bahria University, Islamabad
Assistant Professor Feb 2017 Feb 2023 Bahria University, Lahore
HoD CS Mar 2011 Nov 2013 Kateb University
Lecturer Feb 2008 Mar 2011 Kardan University
Publications

Journals:

Sr. #
1 Shah, A. A., Malik, H.A.M., Muhammad, A. et al. Deep learning ensemble 2D CNN approach towards the detection of lung cancer. Sci Rep 13, 2987 (2023). https://doi.org/10.1038/ s41598-023-29656-z. (Impact factor. 4.996, Q2, Category W in HJRS)
2 A. Sohail, N. A. Nawaz, A. A. Shah, S. Rasheed, S. Ilyas and M. K. Ehsan, “A Systematic Literature Review on Machine Learning and Deep Learning Methods for Semantic Segmentation,” in IEEE Access, doi: 10.1109/ACCESS.2022.3230983. (Impact factor. 3.467, Q2, Category W in HJRS)
3 Malik, H.A.M.; Shah, A.A.; Muhammad, A.; Kananah, A.; Aslam, A. Resolving Security Issues in the IoT Using Blockchain. Electronics 202211, 3950. https://doi.org/10.3390/electronics11233950. (Impact factor. 2.69, Q3, Category W in HJRS)
4 Shah AA, Alturise F, Alkhalifah T, Khan YD. Evaluation of deep learning techniques for identification of sarcoma-causing carcinogenic mutations. DIGITAL HEALTH. 2022;8. doi:10.1177/20552076221133703. (Impact factor. 4.687, Q1, Category W in HJRS)
5 Shah, Asghar Ali, Fahad Alturise, Tamim Alkhalifah, and Yaser Daanial Khan. 2022. “Deep Learning Approaches for Detection of Breast Adenocarcinoma Causing Carcinogenic Mutations” International Journal of Molecular Sciences 23, no. 19: 11539. https://doi.org/10.3390/ijms231911539. (Impact factor. 6.208, Q1, Category W in HJRS)
6 A. A. Shah, H. Malik, A. Mohammad, Y. Khan and A. Alourani, “Machine learning techniques for identification of carcinogenic mutations, which cause breast adenocarcinoma”, Scientific Reports, vol. 12, no. 1, 2022. Available: 10.1038/s41598-022-15533-8. (Impact factor. 4.996, Q2, Category W in HJRS)
7 H. Shafique, A. A. Shah, M. A. Qureshi, M. K. Ehsan, M. R. Amirzada, “Machine Learning Empowered Efficient Intrusion Detection Framework,” VFAST Transactions on Software Engineering, vol. 10, no. 2, pp. 27-35, 2022. (HEC Recognized Journal Category Y in HJRS)
8 S. Chaudhry, A. Muhammad, A. A. Shah, and F. Batool, “Human-Computer User Interface Design for Semiliterate and Illiterate Users”, Lahore Garrison University Research Journal of Computer Science and Information Technology, vol. 5, no. 4, pp. 62-77, 2021. Available: 10.54692/lgurjcsit.2021.0504254. (HEC Recognized Journal Category Y in HJRS)
9 S. Saeed, A. A. Shah, M. Ehsan, M. Amirzada, A. Mahmood and T. Mezgebo, “Automated Facial Expression Recognition Framework Using Deep Learning”, Journal of Healthcare Engineering, vol. 2022, pp. 1-11, 2022. Available: 10.1155/2022/5707930 [Accessed 24 June 2022]. (Impact factor. 2.682, Q2, Category W in HJRS)
10 H. Shamim and A. A. Shah, “Automated Vulnerability detection for software using NLP techniques”, jictra, pp. 48-57, Dec. 2021. (HEC Recognized Journal Category Y in HJRS)
11 Prediction of covid-19 daily infected cases (worldwide & united states) using regression models and Neural Network (HEC Recognized Journal Category Y in HJRS)
12 H. Shamim and A. A. Shah, “Detecting social bots activity in Twitter using deep learning approach”, jictra, pp. 36-46, Jun. 2021. (HEC Recognized Journal Category Y in HJRS)
13 M. Qadir, I. Noreen, and A. A. Shah, “Bi-LSTM Deep Learning Approach for Employee Churn Prediction”, jictra, Jun. 2021. (HEC Recognized Journal Category Y in HJRS)
14 M. Elhoseny, K. Haseeb, A. A. Shah, I. Ahmad, Z. Jan, and M. I. Alghamdi, “IoT Solution for AI-Enabled PRIVACY-PREServing with Big Data Transferring: An Application for Healthcare Using Blockchain,” Energies, vol. 14, no. 17, p. 5364, 2021. (Impact factor. 3.004, Q3, Category W in HJRS)
15 S. Ilyas, A. A. Shah and A. Sohail, “Order Management System for Time and Quantity Saving of Recipes Ingredients Using GPS Tracking Systems,” in IEEE Access, vol. 9, pp. 100490-100497, 2021, doi: 10.1109/ACCESS.2021.3090808. (Impact factor. 3.367, Q1, Category W in HJRS)
16 T. Saba, K. Haseeb, A. A. Shah, A. Rehman, U. Tariq, and Z. Mehmood, “A Machine-Learning-Based Approach for Autonomous IoT Security,” in IT Professional, vol. 23, no. 3, pp. 69-75, 1 May-June 2021, doi: 10.1109/MITP.2020.3031358. (Impact factor. 2.626, Q2, Category W in HJRS)
17 A. A. Shah and Y. D. Khan, “Identification of 4-carboxyglutamate residue sites based on position based statistical feature and multiple classification,” Scientific Reports, vol. 10, no. 1, 2020. (Impact factor. 3.998, Q1, Category W in HJRS)
18 M. K. Ehsan, A. A. Shah, M. R. Amirzada, N. Naz, K. Konstantin, M. Sajid, and A. R. Gardezi, “Characterization of sparse WLAN data traffic in opportunistic indoor environments as a prior for coexistence scenarios of modern wireless technologies,” Alexandria Engineering Journal, 2020. (Impact factor. 2.46, Q2, Category W in HJRS)
19 A. A. Shah, G. Mustafa, Z. Ali, and T. Anees, “Video Stitching with Localized 360o Model for Intelligent Car Parking Monitoring and Assistance System,” IJCSNS International Journal of Computer Science and Network Security, vol. 19, no. 5, pp. 43–47, May. 2019. (HEC Recognized Journal Category Y in HJRS)
20 A. Ali, A. A. Shah, K. Aftab, M. Usman, “Multicamera video stitching surveillance system,” VAWKUM Transactions on Computer Sciences, vol. 16, no. 1, pp. 09-18, Jan. 2019.
21 M. H. Aziz, A. A. Shah, “Anomaly based intrusion detection system which analyze the dataset and detect intrusion,” VAWKUM Transactions on Computer Sciences, vol. 16, no. 1, pp. 09-18, Jan. 2019
22 A. A. Shah, M. K. Ehsan, K. Ishaq, Z. Ali, “An efficient hybrid classifier model for anomaly intrusion detection system,” IJCSNS International Journal of Computer Science and Network Security, vol. 18, no. 11, pp. 127-136, Nov. 2018. (HEC Recognized Journal Category Y in HJRS)
23 A. A. Shah, Y. D. Khan, M. A. Ashraf, “Attacks analysis of TCP and UDP of UNSW-NB15 dataset,” VAWKUM Transactions on Computer Sciences, vol. 15, no. 3, pp. 147-149, Sept. 2018
24 Z. U. Rehman, H. Fayyaz, A. A. Shah, N. Aslam, M. Hanif, S. Abbas, “Performance evaluation of MLPNN and NB: comparative study on car evaluation dataset,” IJCSNS International Journal of Computer Science and Network Security, vol. 18, no. 9, pp. 144-147, Sept. 2018. (HEC Recognized Journal Category Y in HJRS)
25 A. A. Shah, M. S. H. Khiyal, M. D. Awan, “Analysis of Machine Learning Techniques for Intrusion Detection System: A Review,” International Journal of Computer Applications, vol. 119, no. 3, pp. 19-29, June 2015
26 G. A. Shah, A. Khan, A. A. Shah, M. Raza, “A review on image contrast enhancement techniques using histogram equalization,” Science International, vol. 27, no. 2, pp. 1297-1302, March 2015. (HEC Recognized Journal Category Y)

Conferences:

Sr. #
1 Iqbal, T., Bilal, M., Farooq, A., Sarwar, N., Shah, A.A., Chughtai, T.A. (2022). A Survey on Measurement Based Shadow Fading Model for Vehicular Communications. In: Jawawi, D.N.A., Bajwa, I.S., Kazmi, R. (eds) Engineering Software for Modern Challenges. ESMoC 2021. Communications in Computer and Information Science, vol 1615. Springer, Cham. https://doi.org/10.1007/978-3-031-19968-4_17 (International Conference)
2 S. Ud Din, M. A. F. Shah, and A. A. Shah, “Analysis of Machine Learning Techniques for Detection of Tumor Suppressor Genes for Early Detection of Cancer: A Systematic Literature Review,” 2021 International Conference on Innovative Computing (ICIC), 2021, pp. 1-10, doi: 10.1109/ICIC53490.2021.9691506. (IEEE International Conference)
3 M. A. F. Shah, S. Ud Din and A. A. Shah, “Analysis of Machine Learning Techniques for Detection Framework for DNA Repair Genes to help Diagnose Cancer: A Systematic Literature Review,” 2021 International Conference on Innovative Computing (ICIC), 2021, pp. 1-10, doi: 10.1109/ICIC53490.2021.9692921. (IEEE International Conference)
4 S. M. Shehryar, M. A. Shahid and A. A. Shah, “Mutation Detection in Genes Sequence Using Machine Learning,” 2021 International Conference on Innovative Computing (ICIC), 2021, pp. 1-7, doi: 10.1109/ICIC53490.2021.9693088. (IEEE International Conference)
5 A. Shah, M. K. Ehsan, A. Sohail and S. Ilyas, “Analysis of Machine Learning techniques for identification of post translation modification in protein sequencing: A Review,” 2021 International Conference on Innovative Computing (ICIC), 2021, pp. 1-6, doi: 10.1109/ICIC53490.2021.9693020. (IEEE International Conference)
6 A. Shah, N. Usman, J. Waqar and H. Saeed, “An Efficient Machine Learning Prediction based Model for Intrusion Detection,” 2019 International Conference on Innovative Computing (ICIC), Lahore, Pakistan, 2019, pp. 1-6. (IEEE International Conference)