EEWMP: an IoT-based energy-efficient water management platform for smart irrigation R Ullah, AW Abbas, M Ullah, RU Khan, IU Khan, N Aslam, SS Aljameel Scientific Programming 2021, 1-9, 2021 | 46 | 2021 |
Acute myeloid leukemia (AML) detection using AlexNet model M Shaheen, R Khan, RR Biswal, M Ullah, A Khan, MI Uddin, M Zareei, ... Complexity 2021, 1-8, 2021 | 42 | 2021 |
Remote diagnosis and triaging model for skin cancer using EfficientNet and extreme gradient boosting IU Khan, N Aslam, T Anwar, SS Aljameel, M Ullah, R Khan, A Rehman, ... Complexity 2021, 1-13, 2021 | 36 | 2021 |
Roman Urdu opinion mining system (RUOMiS) M Daud, R Khan, A Daud arXiv preprint arXiv:1501.01386, 2015 | 33 | 2015 |
USAD: an intelligent system for slang and abusive text detection in PERSO-Arabic-scripted Urdu NU Haq, M Ullah, R Khan, A Ahmad, A Almogren, B Hayat, B Shafi Complexity 2020, 1-7, 2020 | 21 | 2020 |
QuPiD attack: machine learning-based privacy quantification mechanism for PIR protocols in health-related web search R Khan, A Ahmad, AO Alsayed, M Binsawad, MA Islam, M Ullah Scientific Programming 2020, 2020 | 19 | 2020 |
ObSecure Logging (OSLo): a framework to protect and evaluate the web search privacy in health care domain M Ullah, MA Islam, R Khan, M Aleem, MA Iqbal Journal of Medical Imaging and Health Informatics 9 (6), 1181-1190, 2019 | 14 | 2019 |
Privacy Exposure Measure: A Privacy-Preserving Technique for Health-Related Web Search R Khan, MA Islam, M Ullah, M Aleem, MA Iqbal Journal of Medical Imaging and Health Informatics 9 (6), 1196-1204, 0 | 12* | |
Revealing pir protocols protected users R Khan, M Ullah, MA Islam 2016 Sixth International Conference on Innovative Computing Technology …, 2016 | 11 | 2016 |
Poshida, a protocol for private information retrieval M Ullah, R Khan, MA Islam 2016 Sixth International Conference on Innovative Computing Technology …, 2016 | 11 | 2016 |
Multi-group ObScure logging (MG-OSLo) A privacy-preserving protocol for private web search M Ullah, R Khan, MIU Haq, A Khan, W Alosaimi, MI Uddin, A Alharbi IEEE Access 9, 79005-79020, 2021 | 10 | 2021 |
Quantification of PIR protocols privacy R Khan, MA Islam 2017 International Conference on Communication, Computing and Digital …, 2017 | 10 | 2017 |
An effective deep learning approach for the classification of Bacteriosis in peach leave M Akbar, M Ullah, B Shah, RU Khan, T Hussain, F Ali, F Alenezi, I Syed, ... Frontiers in Plant Science 13, 1064854, 2022 | 9 | 2022 |
Poshida II, a multi group distributed peer to peer protocol for private web search M Ullah, R Khan, MA Islam 2016 International Conference on Frontiers of Information Technology (FIT …, 2016 | 8 | 2016 |
IDBR: IoT enabled depth base routing method for underwater wireless sensor network U Farooq, M Ullah, RU Khan, A Alharbi, MI Uddin, MIU Haq, W Alosaimi Journal of Sensors 2021, 1-8, 2021 | 7 | 2021 |
NN-QuPiD attack: neural network-based privacy quantification model for private information retrieval protocols R Khan, M Ullah, A Khan, MI Uddin, M Al-Yahya Complexity 2021, 1-8, 2021 | 7 | 2021 |
SiFSO: Fish swarm optimization-based technique for efficient community detection in complex networks Y Ahmad, M Ullah, R Khan, B Shafi, A Khan, M Zareei, A Aldosary, ... Complexity 2020, 1-9, 2020 | 7 | 2020 |
Profile aware obscure logging (paoslo): A web search privacy-preserving protocol to mitigate digital traces M Ullah, RU Khan, IU Khan, N Aslam, SS Aljameel, MI Ul Haq, MA Islam Security and Communication Networks 2022, 2022 | 6 | 2022 |
An efficient way of finding polarity of roman urdu reviews by using Boolean rules H Sadia, M Ullah, T Hussain, N Gul, MF Hussain, N ul Haq, A Bakar Scalable Computing: Practice and Experience 21 (2), 277-289, 2020 | 4 | 2020 |
An Ml-based classification scheme for analyzing the social network reviews of yemeni people. E Al-Buraihy, W Dan, R Khan, M Ullah Int. Arab J. Inf. Technol. 19 (6), 904-914, 2022 | 3 | 2022 |