default search action
Muhammad Salman Pathan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Shaheer Habib, Mubashir Ahmad, Yasin Ul Haq, Rabia Sana, Asia Muneer, Muhammad Waseem, Muhammad Salman Pathan, Soumyabrata Dev:
Advancing Taxonomic Classification Through Deep Learning: A Robust Artificial Intelligence Framework for Species Identification Using Natural Images. IEEE Access 12: 146718-146732 (2024) - [j20]Imran Ihsan, Azhar Imran, Tahir Sher, Mahmood Basil A. Al-Rawi, Mohammed A. El-Meligy, Muhammad Salman Pathan:
Graph-Based COVID-19 Detection Using Conditional Generative Adversarial Network. IEEE Access 12: 191323-191344 (2024) - [j19]Ahsan Nazir, Jingsha He, Nafei Zhu, Muhammad Shahid Anwar, Muhammad Salman Pathan:
Enhancing IoT security: a collaborative framework integrating federated learning, dense neural networks, and blockchain. Clust. Comput. 27(6): 8367-8392 (2024) - [j18]Hewei Wang, Yijie Li, Kaiwen Gong, Muhammad Salman Pathan, Shijia Xi, Bolun Zhu, Ziyuan Wen, Soumyabrata Dev:
MFCSNet: A Musician-Follower Complex Social Network for Measuring Musical Influence. Entertain. Comput. 48: 100601 (2024) - [j17]Ahsan Nazir, Jingsha He, Nafei Zhu, Ahsan Wajahat, Faheem Ullah, Sirajuddin Qureshi, Xiangjun Ma, Muhammad Salman Pathan:
Collaborative threat intelligence: Enhancing IoT security through blockchain and machine learning integration. J. King Saud Univ. Comput. Inf. Sci. 36(2): 101939 (2024) - [c5]Yijie Li, Hewei Wang, Shaofan Wang, Yee Hui Lee, Muhammad Salman Pathan, Soumyabrata Dev:
UCloudNet: A Residual U-Net with Deep Supervision for Cloud Image Segmentation. IGARSS 2024: 5553-5557 - 2023
- [j16]Naveed Khan, Jianbiao Zhang, Huhnkuk Lim, Jehad Ali, Intikhab Ullah, Muhammad Salman Pathan, Shehzad Ashraf Chaudhry:
An ECC-based mutual data access control protocol for next-generation public cloud. J. Cloud Comput. 12(1): 101 (2023) - [j15]Ahsan Wajahat, Jingsha He, Nafei Zhu, Tariq Mahmood, Ahsan Nazir, Muhammad Salman Pathan, Sirajuddin Qureshi, Faheem Ullah:
An adaptive semi-supervised deep learning-based framework for the detection of Android malware. J. Intell. Fuzzy Syst. 45(3): 5141-5157 (2023) - [j14]Ahsan Nazir, Jingsha He, Nafei Zhu, Ahsan Wajahat, Xiangjun Ma, Faheem Ullah, Sirajuddin Qureshi, Muhammad Salman Pathan:
Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets. J. King Saud Univ. Comput. Inf. Sci. 35(10): 101820 (2023) - 2022
- [j13]Yu Du, Tong Li, Muhammad Salman Pathan, Hailay Kidu Teklehaymanot, Zhen Yang:
An Effective Sarcasm Detection Approach Based on Sentimental Context and Individual Expression Habits. Cogn. Comput. 14(1): 78-90 (2022) - [j12]Hewei Wang, Yijie Li, Shijia Xi, Shaofan Wang, Muhammad Salman Pathan, Soumyabrata Dev:
AMDCNet: An attentional multi-directional convolutional network for stereo matching. Displays 74: 102243 (2022) - [j11]Yanhui Liu, Zhang Jianbiao, Muhammad Salman Pathan, Yuan Yijian, Zhang Puzhe, Sarah Maroc, Avishek Nag:
Research on identity authentication system of Internet of Things based on blockchain technology. J. King Saud Univ. Comput. Inf. Sci. 34(10, Part B): 10365-10377 (2022) - [c4]Jiantao Wu, Fabrizio Orlandi, Muhammad Salman Pathan, Declan O'Sullivan, Soumyabrata Dev:
Augmenting Weather Sensor Data with Remote Knowledge Graphs. IGARSS 2022: 1264-1267 - [c3]Muhammad Salman Pathan, Avishek Nag, Soumyabrata Dev:
Efficient Rainfall Prediction Using a Dimensionality Reduction Method. IGARSS 2022: 6737-6740 - [i3]Muhammad Salman Pathan, Avishek Nag, Muhammad Mohisn Pathan, Soumyabrata Dev:
Analyzing the impact of feature selection on the accuracy of heart disease prediction. CoRR abs/2206.03239 (2022) - 2021
- [j10]Muhammad Iftikhar Hussain, Jingsha He, Nafei Zhu, Zulfiqar Ali Zardari, Fahad Razque, Saqib Hussain, Muhammad Salman Pathan:
An archetype for mitigating the security threats in multi-cloud environment by implementing tree-based next-generation firewalls. J. Intell. Fuzzy Syst. 41(1): 125-136 (2021) - [j9]Muhammad Qasim Memon, Yu Lu, Penghe Chen, Aasma Memon, Muhammad Salman Pathan, Zulfiqar Ali Zardari:
An ensemble clustering approach for topic discovery using implicit text segmentation. J. Inf. Sci. 47(4) (2021) - [j8]Yanhui Liu, Jianbiao Zhang, Shupei Wu, Muhammad Salman Pathan:
Research on digital copyright protection based on the hyperledger fabric blockchain network technology. PeerJ Comput. Sci. 7: e709 (2021) - [i2]Hewei Wang, Muhammad Salman Pathan, Soumyabrata Dev:
Stereo Matching Based on Visual Sensitive Information. CoRR abs/2105.10831 (2021) - [i1]Muhammad Salman Pathan, Jianbiao Zhang, Deepu John, Avishek Nag, Soumyabrata Dev:
Identifying Stroke Indicators Using Rough Sets. CoRR abs/2110.10152 (2021) - 2020
- [j7]Muhammad Salman Pathan, Jianbiao Zhang, Deepu John, Avishek Nag, Soumyabrata Dev:
Identifying Stroke Indicators Using Rough Sets. IEEE Access 8: 210318-210327 (2020)
2010 – 2019
- 2019
- [j6]Zulfiqar Ali Zardari, Jingsha He, Nafei Zhu, Khalid Hussain Mohammadani, Muhammad Salman Pathan, Muhammad Iftikhar Hussain, Muhammad Qasim Memon:
A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs. Future Internet 11(3): 61 (2019) - [j5]Zulfiqar Ali Zardari, Jingsha He, Nafei Zhu, Muhammad Salman Pathan, Muhammad Qasim Memon, Muhammad Iftikhar Hussain, Peng He, Chengyue Chang:
A Scheme for Finding and Blocking to Isolate Black Hole Nodes in Mobile Ad Hoc Networks. Int. J. Netw. Secur. 21(6): 1021-1030 (2019) - 2018
- [j4]Muhammad Salman Pathan, Nafei Zhu, Jingsha He, Zulfiqar Ali Zardari, Muhammad Qasim Memon, Muhammad Iftikhar Hussain:
An Efficient Trust-Based Scheme for Secure and Quality of Service Routing in MANETs. Future Internet 10(2): 16 (2018) - [j3]Jingsha He, Jianan Wu, Nafei Zhu, Muhammad Salman Pathan:
MinHash-Based Fuzzy Keyword Search of Encrypted Data across Multiple Cloud Servers. Future Internet 10(5): 38 (2018) - 2017
- [j2]Jingsha He, Qi Xiao, Peng He, Muhammad Salman Pathan:
An Adaptive Privacy Protection Method for Smart Home Environments Using Supervised Learning. Future Internet 9(1): 7 (2017) - 2016
- [j1]Jingsha He, Chengyue Chang, Peng He, Muhammad Salman Pathan:
Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning. Future Internet 8(4): 54 (2016) - [c2]Jingsha He, Qi Xiao, Muhammad Salman Pathan:
A Method for Countering Snooping-Based Side Channel Attacks in Smart Home Applications. ChinaCom (1) 2016: 200-207 - [c1]Jing Fang, Jingsha He, Muhammad Salman Pathan, Mengchen Gao:
A Novel Storage and Search Scheme in Cloud Computing. CIS 2016: 304-308
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-07 00:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint