Security and privacy challenges in smart cities T Braun, BCM Fung, F Iqbal, B Shah Sustainable cities and society 39, 499-507, 2018 | 319 | 2018 |
Customer churn prediction in telecommunication industry using data certainty A Amin, F Al-Obeidat, B Shah, A Adnan, J Loo, S Anwar Journal of Business Research 94, 290-301, 2019 | 220 | 2019 |
Security analysis of IoT protocols: A focus in CoAP RA Rahman, B Shah 2016 3rd MEC international conference on big data and smart city (ICBDSC), 1-7, 2016 | 173 | 2016 |
Cross-company customer churn prediction in telecommunication: A comparison of data transformation methods A Amin, B Shah, AM Khattak, FJL Moreira, G Ali, A Rocha, S Anwar International Journal of Information Management 46, 304-319, 2019 | 84 | 2019 |
A secure fog‐based platform for SCADA‐based IoT critical infrastructure T Baker, M Asim, A MacDermott, F Iqbal, F Kamoun, B Shah, O Alfandi, ... Software: Practice and Experience 50 (5), 503-518, 2020 | 74 | 2020 |
Wireless sensor networks for big data systems BS Kim, KI Kim, B Shah, F Chow, KH Kim Sensors 19 (7), 1565, 2019 | 69 | 2019 |
A novel binary chaotic genetic algorithm for feature selection and its utility in affective computing and healthcare M Tahir, A Tubaishat, F Al-Obeidat, B Shah, Z Halim, M Waqas Neural Computing and Applications, 1-22, 2020 | 49 | 2020 |
A survey on three-dimensional wireless ad hoc and sensor networks B Shah, KI Kim International Journal of Distributed Sensor Networks 10 (7), 616014, 2014 | 43 | 2014 |
Gene encoder: a feature selection technique through unsupervised deep learning-based clustering for large gene expression data Uzma, F Al-Obeidat, A Tubaishat, B Shah, Z Halim Neural Computing and Applications, 1-23, 2020 | 42 | 2020 |
Deep learning-based segmentation and classification of leaf images for detection of tomato plant disease M Shoaib, T Hussain, B Shah, I Ullah, SM Shah, F Ali, SH Park Frontiers in Plant Science 13, 1031748, 2022 | 41 | 2022 |
A novel text mining approach for mental health prediction using Bi-LSTM and BERT model K Zeberga, M Attique, B Shah, F Ali, YZ Jembre, TS Chung Computational Intelligence and Neuroscience 2022, 2022 | 41 | 2022 |
Android malware detection through generative adversarial networks M Amin, B Shah, A Sharif, T Ali, KI Kim, S Anwar Transactions on Emerging Telecommunications Technologies 33 (2), e3675, 2022 | 40 | 2022 |
Classification and analysis of android malware images using feature fusion technique J Singh, D Thakur, T Gera, B Shah, T Abuhmed, F Ali IEEE Access 9, 90102-90117, 2021 | 38 | 2021 |
Fuzzy logic-based guaranteed lifetime protocol for real-time wireless sensor networks B Shah, F Iqbal, A Abbas, KI Kim Sensors 15 (8), 20373-20391, 2015 | 37 | 2015 |
Just-in-time customer churn prediction in the telecommunication sector A Amin, F Al-Obeidat, B Shah, MA Tae, C Khan, HUR Durrani, S Anwar The Journal of Supercomputing 76, 3924-3948, 2020 | 36 | 2020 |
Enhancing the teaching and learning process using video streaming servers and forecasting techniques R Hasan, S Palaniappan, S Mahmood, B Shah, A Abbas, KU Sarker Sustainability 11 (7), 2049, 2019 | 33 | 2019 |
COVID-19 patient count prediction using LSTM M Iqbal, F Al-Obeidat, F Maqbool, S Razzaq, S Anwar, A Tubaishat, ... IEEE Transactions on Computational Social Systems 8 (4), 974-981, 2021 | 30 | 2021 |
Guaranteed lifetime protocol for IoT based wireless sensor networks with multiple constraints B Shah, A Abbas, G Ali, F Iqbal, AM Khattak, O Alfandi, KI Kim Ad Hoc Networks 104, 102158, 2020 | 30 | 2020 |
Just-in-time customer churn prediction: With and without data transformation A Amin, B Shah, AM Khattak, T Baker, S Anwar 2018 IEEE congress on evolutionary computation (CEC), 1-6, 2018 | 30 | 2018 |
Analyzing students performance using multi-criteria classification F Al-Obeidat, A Tubaishat, A Dillon, B Shah Cluster Computing 21, 623-632, 2018 | 29 | 2018 |