A comparative analysis of blockchain architecture and its applications: Problems and recommendations TA Syed, A Alzahrani, S Jan, MS Siddiqui, A Nadeem, T Alghamdi IEEE access 7, 176838-176869, 2019 | 293 | 2019 |
A blockchain-based value added tax (VAT) system: Saudi Arabia as a use-case A Alkhodre, S Jan, S Khusro, T Ali, Y Alsaawy, M Yasar International Journal of Advanced Computer Science and Applications 10 (5 …, 2019 | 57 | 2019 |
In-depth review of augmented reality: Tracking technologies, development tools, AR displays, collaborative AR, and security concerns TA Syed, MS Siddiqui, HB Abdullah, S Jan, A Namoun, A Alzahrani, ... Sensors 23 (1), 146, 2022 | 38 | 2022 |
A novel blockchain-based framework for vehicle life cycle tracking: An end-to-end solution TA Syed, MS Siddique, A Nadeem, A Alzahrani, S Jan, MAK Khattak IEEE Access 8, 111042-111063, 2020 | 34 | 2020 |
A transparent and trusted property registration system on permissioned blockchain T Ali, A Nadeem, A Alzahrani, S Jan 2019 International Conference on Advances in the Emerging Computing …, 2020 | 33 | 2020 |
DeepMoney: counterfeit money detection using generative adversarial networks T Ali, S Jan, A Alkhodre, M Nauman, M Amin, MS Siddiqui PeerJ Computer Science 5, e216, 2019 | 28 | 2019 |
Trust in IoT: dynamic remote attestation through efficient behavior capture T Ali, M Nauman, S Jan Cluster Computing 21, 409-421, 2018 | 27 | 2018 |
Employing Takaful islamic banking through state of the art blockchain: a case study M Abdeen, J Salman, S Khan, T Ali International Journal of Advanced Computer Science and Applications 10 (12), 2019 | 21 | 2019 |
Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models S Jan, S Musa, T Ali, M Nauman, S Anwar, T Ali Tanveer, B Shah Expert Systems 38 (4), e12611, 2021 | 20 | 2021 |
Context-aware deep learning model for detection of roman urdu hate speech on social media platform M Bilal, A Khan, S Jan, S Musa IEEE Access 10, 121133-121151, 2022 | 18 | 2022 |
Roman Urdu hate speech detection using transformer-based model for cyber security applications M Bilal, A Khan, S Jan, S Musa, S Ali Sensors 23 (8), 3909, 2023 | 14 | 2023 |
Determining bug prioritization using feature reduction and clustering with classification S Iqbal, R Naseem, S Jan, S Alshmrany, M Yasar, A Ali IEEE Access 8, 215661-215678, 2020 | 13 | 2020 |
Towards secure instance migration in the cloud TA Syed, S Musa, A Rahman, S Jan 2015 International Conference on Cloud Computing (ICCC), 1-6, 2015 | 11 | 2015 |
Deep convolutional generative adversarial networks for intent-based dynamic behavior capture S Jan, T Ali, A Alzahrani, S Musa International Journal of Engineering & Technology 7 (4.29), 101-103, 2018 | 10 | 2018 |
Providing efficient, scalable and privacy preserved verification mechanism in remote attestation TA Syed, S Jan, S Musa, J Ali 2016 International Conference on Information and Communication Technology …, 2016 | 10 | 2016 |
CAR-tourist: an integrity-preserved collaborative augmented reality framework-tourism as a use-case TA Syed, S Jan, MS Siddiqui, A Alzahrani, A Nadeem, A Ali, A Ullah Applied Sciences 12 (23), 12022, 2022 | 7 | 2022 |
RACE-SM: Reliability and adaptive cooperation for efficient UWSNs using sink mobility I Ahmad, T Rahman, I Khan, S Jan, S Musa, MI Uddin Frontiers in Marine Science 9, 1030113, 2022 | 3 | 2022 |
Multi Perspectives Steganography Algorithm for Color Images on Multiple-Formats S Rahman, J Uddin, H Hussain, S Jan, I Khan, M Shabir, S Musa Sustainability 15 (5), 4252, 2023 | 2 | 2023 |
S ECURE AND C OLLABORATIVE A UGMENTED R EALITY T OURISM AND E CONOMY P ERSPECTIVE TA Syed, S Jan, S Siddique, A Alzahrani, SA Ullah, A Nadeem International Journal of Energy, Environment and Economics 29 (2), 179-197, 2021 | 1 | 2021 |
DeepMoney: Counterfeit Money Detection T Ali, S Jan, A Alkhodre, M Nauman, M Amin, MS Siddiqui | | |