Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 24 matches
- 2023
- Farkhund Iqbal, Ahmad Abbasi, Abdul Rehman Javed, Gautam Srivastava, Zunera Jalil, Thippa Reddy Gadekallu:
Identification and Categorization of Unusual Internet of Vehicles Events in Noisy Audio. VTC2023-Spring 2023: 1-6 - 2022
- Ahmed Abbasi, Abdul Rehman Javed, Amanullah Yasin, Zunera Jalil, Natalia Kryvinska, Usman Tariq:
A Large-Scale Benchmark Dataset for Anomaly Detection and Rare Event Classification for Audio Forensics. IEEE Access 10: 38885-38894 (2022) - Ameer Hamza, Abdul Rehman Javed, Farkhund Iqbal, Natalia Kryvinska, Ahmad S. Almadhor, Zunera Jalil, Rouba Borghol:
Deepfake Audio Detection via MFCC Features Using Machine Learning. IEEE Access 10: 134018-134028 (2022) - Abdul Rehman Javed, Waqas Ahmed, Mamoun Alazab, Zunera Jalil, Kashif Kifayat, Thippa Reddy Gadekallu:
A Comprehensive Survey on Computer Forensics: State-of-the-Art, Tools, Techniques, Challenges, and Future Directions. IEEE Access 10: 11065-11089 (2022) - Abdul Rehman Javed, Zunera Jalil, Syed Atif Moqurrab, Sidra Abbas, Xuan Liu:
Ensemble Adaboost classifier for accurate and fast detection of botnet attacks in connected vehicles. Trans. Emerg. Telecommun. Technol. 33(10) (2022) - Farkhund Iqbal, Ahmed Abbasi, Abdul Rehman Javed, Zunera Jalil, Jamal N. Al-Karaki:
Deepfake Audio Detection Via Feature Engineering And Machine Learning. CIKM Workshops 2022 - 2021
- Ahmad Abbasi, Abdul Rehman Javed, Chinmay Chakraborty, Jamel Nebhen, Wisha Zehra, Zunera Jalil:
ElStream: An Ensemble Learning Approach for Concept Drift Detection in Dynamic Social Big Data Stream Learning. IEEE Access 9: 66408-66419 (2021) - Waqas Ahmed, Aamir Rasool, Abdul Rehman Javed, Neeraj Kumar, Thippa Reddy Gadekallu, Zunera Jalil, Natalia Kryvinska:
Security in Next Generation Mobile Payment Systems: A Comprehensive Survey. IEEE Access 9: 115932-115950 (2021) - Maryam Al Hinai, Mohsin Ali, Abdul Rehman Javed, Fahad Ghabban, Liaqat Ali Khan, Zunera Jalil:
SeFACED: Semantic-Based Forensic Analysis and Classification of E-Mail Data Using Deep Learning. IEEE Access 9: 98398-98411 (2021) - Abdul Rehman Javed, Zunera Jalil, Wisha Zehra, Thippa Reddy Gadekallu, Doug Young Suh, Md. Jalil Piran:
A comprehensive survey on digital video forensics: Taxonomy, challenges, and future directions. Eng. Appl. Artif. Intell. 106: 104456 (2021) - Syed Ibrahim Imtiaz, Saif ur Rehman, Abdul Rehman Javed, Zunera Jalil, Xuan Liu, Waleed S. Alnumay:
DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network. Future Gener. Comput. Syst. 115: 844-856 (2021) - Saif ur Rehman, Mubashir Khaliq, Syed Ibrahim Imtiaz, Aamir Rasool, Muhammad Shafiq, Abdul Rehman Javed, Zunera Jalil, Ali Kashif Bashir:
DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU). Future Gener. Comput. Syst. 118: 453-466 (2021) - Aamir Rasool, Abdul Rehman Javed, Zunera Jalil:
SHA-AMD: sample-efficient hyper-tuned approach for detection and identification of Android malware family and category. Int. J. Ad Hoc Ubiquitous Comput. 38(1/2/3): 172-183 (2021) - Shafaq Abbas, Zunera Jalil, Abdul Rehman Javed, Iqra Batool, Mohammad Zubair Khan, Abdulfattah Noorwali, Thippa Reddy Gadekallu, Aqsa Akbar:
BCD-WERT: a novel approach for breast cancer detection using whale optimization based efficient features and extremely randomized tree algorithm. PeerJ Comput. Sci. 7: e390 (2021) - Abdul Basit, Maham Zafar, Xuan Liu, Abdul Rehman Javed, Zunera Jalil, Kashif Kifayat:
A comprehensive survey of AI-enabled phishing attacks detection techniques. Telecommun. Syst. 76(1): 139-154 (2021) - Maryam Al Hinai, Mohsan Ali, Abdul Rehman Javed, Gautam Srivastava, Thippa Reddy Gadekallu, Zunera Jalil:
Email Classification and Forensics Analysis using Machine Learning. SmartWorld/SCALCOM/UIC/ATC/IOP/SCI 2021: 630-635 - Waqas Ahmed, Amir Rasool, Jamel Nebhen, Neeraj Kumar, Faisal Shahzad, Abdul Rehman Javed, Thippa Reddy Gadekallu, Zunera Jalil:
Security in Next Generation Mobile Payment Systems: A Comprehensive Survey. CoRR abs/2105.12097 (2021) - 2020
- Celestine Iwendi, Zunera Jalil, Abdul Rehman Javed, G. Thippa Reddy, Rajesh Kaluri, Gautam Srivastava, Ohyun Jo:
KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks. IEEE Access 8: 72650-72660 (2020) - 2019
- Aamer Hanif, Ahmed Faisal Siddiqi, Zunera Jalil:
Are Computer Experience and Anxiety Irrelevant? Towards a Simple Model for Adoption of E-Learning Systems. Int. J. Eng. Pedagog. 9(5): 112-125 (2019) - 2013
- Faisal Riaz, Zunera Jalil, Sehrab Bashir, M. Imran, Naeem Iqbal Ratyal, M. Sajid:
Efficient spectrum optimization and mobility in cognitive radio based inter-vehicle communcation system. FGCT 2013: 190-195 - 2010
- Zunera Jalil, Anwar M. Mirza, Maria Sabir:
Content based Zero-Watermarking Algorithm for Authentication of Text Documents. CoRR abs/1003.1796 (2010) - 2009
- Zunera Jalil, Anwar M. Mirza:
An Invisible Text Watermarking Algorithm using Image Watermark. SCSS 2009: 147-152 - Hajira Jabeen, Zunera Jalil, Abdul Rauf Baig:
Opposition based initialization in particle swarm optimization (O-PSO). GECCO (Companion) 2009: 2047-2052 - 2008
- Zunera Jalil, Arshad Ali Shahid:
Is Non Technical Person a Better Software Project Manager? CSSE (2) 2008: 1-5
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-18 16:29 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint