Convolutional neural networks based fire detection in surveillance videos K Muhammad, J Ahmad, I Mehmood, S Rho, SW Baik Ieee Access 6, 18174-18183, 2018 | 586 | 2018 |
Efficient visual attention based framework for extracting key frames from videos N Ejaz, I Mehmood, SW Baik Signal Processing: Image Communication 28 (1), 34-44, 2013 | 226 | 2013 |
Transfer learning assisted classification and detection of Alzheimer’s disease stages using 3D MRI scans M Maqsood, F Nazir, U Khan, F Aadil, H Jamal, I Mehmood, O Song Sensors 19 (11), 2645, 2019 | 221 | 2019 |
Grey wolf optimization based clustering algorithm for vehicular ad-hoc networks M Fahad, F Aadil, S Khan, PA Shah, K Muhammad, J Lloret, H Wang, ... Computers & Electrical Engineering 70, 853-870, 2018 | 218 | 2018 |
A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image K Muhammad, M Sajjad, I Mehmood, S Rho, SW Baik Multimedia Tools and Applications 75, 14867-14893, 2016 | 218 | 2016 |
Region-of-interest based transfer learning assisted framework for skin cancer detection R Ashraf, S Afzal, AU Rehman, S Gul, J Baber, M Bakhtyar, I Mehmood, ... IEEE Access 8, 147858-147871, 2020 | 217 | 2020 |
A local and global event sentiment based efficient stock exchange forecasting using deep learning H Maqsood, I Mehmood, M Maqsood, M Yasir, S Afzal, F Aadil, MM Selim, ... International Journal of Information Management 50, 432-451, 2020 | 194 | 2020 |
Quantum-inspired blockchain-based cybersecurity: securing smart edge utilities in IoT-based smart cities AA Abd El-Latif, B Abd-El-Atty, I Mehmood, K Muhammad, ... Information Processing & Management 58 (4), 102549, 2021 | 176 | 2021 |
Underground sewer pipe condition assessment based on convolutional neural networks SI Hassan, LM Dang, I Mehmood, S Im, C Choi, J Kang, YS Park, H Moon Automation in Construction 106, 102849, 2019 | 153 | 2019 |
Energy aware cluster-based routing in flying ad-hoc networks F Aadil, A Raza, MF Khan, M Maqsood, I Mehmood, S Rho Sensors 18 (5), 1413, 2018 | 149 | 2018 |
A new chaotic map with dynamic analysis and encryption application in internet of health things N Tsafack, S Sankar, B Abd-El-Atty, J Kengne, KC Jithin, A Belazi, ... IEEE Access 8, 137731-137744, 2020 | 138 | 2020 |
A data augmentation-based framework to handle class imbalance problem for Alzheimer’s stage detection S Afzal, M Maqsood, F Nazir, U Khan, F Aadil, KM Awan, I Mehmood, ... IEEE access 7, 115528-115539, 2019 | 134 | 2019 |
Image steganography using uncorrelated color space and its application for security of visual contents in online social networks K Muhammad, M Sajjad, I Mehmood, S Rho, SW Baik Future Generation Computer Systems 86, 951-960, 2018 | 132 | 2018 |
Leukocytes classification and segmentation in microscopic blood smear: a resource-aware healthcare service in smart cities M Sajjad, S Khan, Z Jan, K Muhammad, H Moon, JT Kwak, S Rho, ... IEEE Access 5, 3475-3489, 2016 | 127 | 2016 |
A deep feature-based real-time system for Alzheimer disease stage detection H Nawaz, M Maqsood, S Afzal, F Aadil, I Mehmood, S Rho Multimedia Tools and Applications 80, 35789-35807, 2021 | 125 | 2021 |
Edge intelligence-assisted smoke detection in foggy surveillance environments K Muhammad, S Khan, V Palade, I Mehmood, VHC De Albuquerque IEEE Transactions on Industrial Informatics 16 (2), 1067-1075, 2019 | 123 | 2019 |
An IoT based efficient hybrid recommender system for cardiovascular disease F Jabeen, M Maqsood, MA Ghazanfar, F Aadil, S Khan, MF Khan, ... Peer-to-Peer Networking and Applications 12, 1263-1276, 2019 | 121 | 2019 |
Cerebral micro‐bleeding identification based on a nine‐layer convolutional neural network with stochastic pooling S Wang, J Sun, I Mehmood, C Pan, Y Chen, YD Zhang Concurrency and Computation: Practice and Experience 32 (1), e5130, 2020 | 119 | 2020 |
Clustering algorithm for internet of vehicles (IoV) based on dragonfly optimizer (CAVDO) F Aadil, W Ahsan, ZU Rehman, PA Shah, S Rho, I Mehmood The Journal of Supercomputing 74, 4542-4567, 2018 | 113 | 2018 |
Machine learning-assisted signature and heuristic-based detection of malwares in Android devices ZU Rehman, SN Khan, K Muhammad, JW Lee, Z Lv, SW Baik, PA Shah, ... Computers & Electrical Engineering 69, 828-841, 2018 | 107 | 2018 |