Sr. # |
|
1 |
Shah, A. A., Malik, H.A.M., Muhammad, A. et al. Deep learning ensemble 2D CNN approach towards the detection of lung cancer. Sci Rep 13, 2987 (2023). https://doi.org/10.1038/ s41598-023-29656-z. (Impact factor. 4.996, Q2, Category W in HJRS) |
2 |
A. Sohail, N. A. Nawaz, A. A. Shah, S. Rasheed, S. Ilyas and M. K. Ehsan, “A Systematic Literature Review on Machine Learning and Deep Learning Methods for Semantic Segmentation,” in IEEE Access, doi: 10.1109/ACCESS.2022.3230983. (Impact factor. 3.467, Q2, Category W in HJRS) |
3 |
Malik, H.A.M.; Shah, A.A.; Muhammad, A.; Kananah, A.; Aslam, A. Resolving Security Issues in the IoT Using Blockchain. Electronics 2022, 11, 3950. https://doi.org/10.3390/electronics11233950. (Impact factor. 2.69, Q3, Category W in HJRS) |
4 |
Shah AA, Alturise F, Alkhalifah T, Khan YD. Evaluation of deep learning techniques for identification of sarcoma-causing carcinogenic mutations. DIGITAL HEALTH. 2022;8. doi:10.1177/20552076221133703. (Impact factor. 4.687, Q1, Category W in HJRS) |
5 |
Shah, Asghar Ali, Fahad Alturise, Tamim Alkhalifah, and Yaser Daanial Khan. 2022. “Deep Learning Approaches for Detection of Breast Adenocarcinoma Causing Carcinogenic Mutations” International Journal of Molecular Sciences 23, no. 19: 11539. https://doi.org/10.3390/ijms231911539. (Impact factor. 6.208, Q1, Category W in HJRS) |
6 |
A. A. Shah, H. Malik, A. Mohammad, Y. Khan and A. Alourani, “Machine learning techniques for identification of carcinogenic mutations, which cause breast adenocarcinoma”, Scientific Reports, vol. 12, no. 1, 2022. Available: 10.1038/s41598-022-15533-8. (Impact factor. 4.996, Q2, Category W in HJRS) |
7 |
H. Shafique, A. A. Shah, M. A. Qureshi, M. K. Ehsan, M. R. Amirzada, “Machine Learning Empowered Efficient Intrusion Detection Framework,” VFAST Transactions on Software Engineering, vol. 10, no. 2, pp. 27-35, 2022. (HEC Recognized Journal Category Y in HJRS) |
8 |
S. Chaudhry, A. Muhammad, A. A. Shah, and F. Batool, “Human-Computer User Interface Design for Semiliterate and Illiterate Users”, Lahore Garrison University Research Journal of Computer Science and Information Technology, vol. 5, no. 4, pp. 62-77, 2021. Available: 10.54692/lgurjcsit.2021.0504254. (HEC Recognized Journal Category Y in HJRS) |
9 |
S. Saeed, A. A. Shah, M. Ehsan, M. Amirzada, A. Mahmood and T. Mezgebo, “Automated Facial Expression Recognition Framework Using Deep Learning”, Journal of Healthcare Engineering, vol. 2022, pp. 1-11, 2022. Available: 10.1155/2022/5707930 [Accessed 24 June 2022]. (Impact factor. 2.682, Q2, Category W in HJRS) |
10 |
H. Shamim and A. A. Shah, “Automated Vulnerability detection for software using NLP techniques”, jictra, pp. 48-57, Dec. 2021. (HEC Recognized Journal Category Y in HJRS) |
11 |
Prediction of covid-19 daily infected cases (worldwide & united states) using regression models and Neural Network (HEC Recognized Journal Category Y in HJRS) |
12 |
H. Shamim and A. A. Shah, “Detecting social bots activity in Twitter using deep learning approach”, jictra, pp. 36-46, Jun. 2021. (HEC Recognized Journal Category Y in HJRS) |
13 |
M. Qadir, I. Noreen, and A. A. Shah, “Bi-LSTM Deep Learning Approach for Employee Churn Prediction”, jictra, Jun. 2021. (HEC Recognized Journal Category Y in HJRS) |
14 |
M. Elhoseny, K. Haseeb, A. A. Shah, I. Ahmad, Z. Jan, and M. I. Alghamdi, “IoT Solution for AI-Enabled PRIVACY-PREServing with Big Data Transferring: An Application for Healthcare Using Blockchain,” Energies, vol. 14, no. 17, p. 5364, 2021. (Impact factor. 3.004, Q3, Category W in HJRS) |
15 |
S. Ilyas, A. A. Shah and A. Sohail, “Order Management System for Time and Quantity Saving of Recipes Ingredients Using GPS Tracking Systems,” in IEEE Access, vol. 9, pp. 100490-100497, 2021, doi: 10.1109/ACCESS.2021.3090808. (Impact factor. 3.367, Q1, Category W in HJRS) |
16 |
T. Saba, K. Haseeb, A. A. Shah, A. Rehman, U. Tariq, and Z. Mehmood, “A Machine-Learning-Based Approach for Autonomous IoT Security,” in IT Professional, vol. 23, no. 3, pp. 69-75, 1 May-June 2021, doi: 10.1109/MITP.2020.3031358. (Impact factor. 2.626, Q2, Category W in HJRS) |
17 |
A. A. Shah and Y. D. Khan, “Identification of 4-carboxyglutamate residue sites based on position based statistical feature and multiple classification,” Scientific Reports, vol. 10, no. 1, 2020. (Impact factor. 3.998, Q1, Category W in HJRS) |
18 |
M. K. Ehsan, A. A. Shah, M. R. Amirzada, N. Naz, K. Konstantin, M. Sajid, and A. R. Gardezi, “Characterization of sparse WLAN data traffic in opportunistic indoor environments as a prior for coexistence scenarios of modern wireless technologies,” Alexandria Engineering Journal, 2020. (Impact factor. 2.46, Q2, Category W in HJRS) |
19 |
A. A. Shah, G. Mustafa, Z. Ali, and T. Anees, “Video Stitching with Localized 360o Model for Intelligent Car Parking Monitoring and Assistance System,” IJCSNS International Journal of Computer Science and Network Security, vol. 19, no. 5, pp. 43–47, May. 2019. (HEC Recognized Journal Category Y in HJRS) |
20 |
A. Ali, A. A. Shah, K. Aftab, M. Usman, “Multicamera video stitching surveillance system,” VAWKUM Transactions on Computer Sciences, vol. 16, no. 1, pp. 09-18, Jan. 2019. |
21 |
M. H. Aziz, A. A. Shah, “Anomaly based intrusion detection system which analyze the dataset and detect intrusion,” VAWKUM Transactions on Computer Sciences, vol. 16, no. 1, pp. 09-18, Jan. 2019 |
22 |
A. A. Shah, M. K. Ehsan, K. Ishaq, Z. Ali, “An efficient hybrid classifier model for anomaly intrusion detection system,” IJCSNS International Journal of Computer Science and Network Security, vol. 18, no. 11, pp. 127-136, Nov. 2018. (HEC Recognized Journal Category Y in HJRS) |
23 |
A. A. Shah, Y. D. Khan, M. A. Ashraf, “Attacks analysis of TCP and UDP of UNSW-NB15 dataset,” VAWKUM Transactions on Computer Sciences, vol. 15, no. 3, pp. 147-149, Sept. 2018 |
24 |
Z. U. Rehman, H. Fayyaz, A. A. Shah, N. Aslam, M. Hanif, S. Abbas, “Performance evaluation of MLPNN and NB: comparative study on car evaluation dataset,” IJCSNS International Journal of Computer Science and Network Security, vol. 18, no. 9, pp. 144-147, Sept. 2018. (HEC Recognized Journal Category Y in HJRS) |
25 |
A. A. Shah, M. S. H. Khiyal, M. D. Awan, “Analysis of Machine Learning Techniques for Intrusion Detection System: A Review,” International Journal of Computer Applications, vol. 119, no. 3, pp. 19-29, June 2015 |
26 |
G. A. Shah, A. Khan, A. A. Shah, M. Raza, “A review on image contrast enhancement techniques using histogram equalization,” Science International, vol. 27, no. 2, pp. 1297-1302, March 2015. (HEC Recognized Journal Category Y) |