Security and privacy challenges in smart cities T Braun, BCM Fung, F Iqbal, B Shah Sustainable cities and society 39, 499-507, 2018 | 278 | 2018 |
Customer churn prediction in telecommunication industry using data certainty A Amin, F Al-Obeidat, B Shah, A Adnan, J Loo, S Anwar Journal of Business Research 94, 290-301, 2019 | 180 | 2019 |
Security analysis of IoT protocols: A focus in CoAP RA Rahman, B Shah 2016 3rd MEC international conference on big data and smart city (ICBDSC), 1-7, 2016 | 165 | 2016 |
Cross-company customer churn prediction in telecommunication: A comparison of data transformation methods A Amin, B Shah, AM Khattak, FJL Moreira, G Ali, A Rocha, S Anwar International Journal of Information Management 46, 304-319, 2019 | 71 | 2019 |
A secure fog‐based platform for SCADA‐based IoT critical infrastructure T Baker, M Asim, Á MacDermott, F Iqbal, F Kamoun, B Shah, O Alfandi, ... Software: Practice and Experience 50 (5), 503-518, 2020 | 63 | 2020 |
Wireless sensor networks for big data systems BS Kim, KI Kim, B Shah, F Chow, KH Kim Sensors 19 (7), 1565, 2019 | 58 | 2019 |
A survey on three-dimensional wireless ad hoc and sensor networks B Shah, KI Kim International Journal of Distributed Sensor Networks 10 (7), 616014, 2014 | 40 | 2014 |
A novel binary chaotic genetic algorithm for feature selection and its utility in affective computing and healthcare M Tahir, A Tubaishat, F Al-Obeidat, B Shah, Z Halim, M Waqas Neural Computing and Applications, 1-22, 2020 | 39 | 2020 |
Gene encoder: a feature selection technique through unsupervised deep learning-based clustering for large gene expression data F Al-Obeidat, A Tubaishat, B Shah, Z Halim Neural Computing and Applications, 1-23, 2022 | 35 | 2022 |
Android malware detection through generative adversarial networks M Amin, B Shah, A Sharif, T Ali, KI Kim, S Anwar Transactions on Emerging Telecommunications Technologies 33 (2), e3675, 2022 | 35 | 2022 |
Fuzzy logic-based guaranteed lifetime protocol for real-time wireless sensor networks B Shah, F Iqbal, A Abbas, KI Kim Sensors 15 (8), 20373-20391, 2015 | 35 | 2015 |
Just-in-time customer churn prediction in the telecommunication sector A Amin, F Al-Obeidat, B Shah, MA Tae, C Khan, HUR Durrani, S Anwar The Journal of Supercomputing 76, 3924-3948, 2020 | 31 | 2020 |
Enhancing the teaching and learning process using video streaming servers and forecasting techniques R Hasan, S Palaniappan, S Mahmood, B Shah, A Abbas, KU Sarker Sustainability 11 (7), 2049, 2019 | 30 | 2019 |
NRG Oncology RTOG 0415: A randomized phase 3 noninferiority study comparing 2 fractionation schedules in patients with low-risk prostate cancer WR Lee, JJ Dignam, M Amin, D Bruner, D Low, GP Swanson, AB Shah, ... International Journal of Radiation Oncology, Biology, Physics 94 (1), 3-4, 2016 | 29 | 2016 |
Classification and analysis of android malware images using feature fusion technique J Singh, D Thakur, T Gera, B Shah, T Abuhmed, F Ali IEEE Access 9, 90102-90117, 2021 | 28 | 2021 |
Guaranteed lifetime protocol for IoT based wireless sensor networks with multiple constraints B Shah, A Abbas, G Ali, F Iqbal, AM Khattak, O Alfandi, KI Kim Ad Hoc Networks 104, 102158, 2020 | 26 | 2020 |
Just-in-time customer churn prediction: With and without data transformation A Amin, B Shah, AM Khattak, T Baker, S Anwar 2018 IEEE congress on evolutionary computation (CEC), 1-6, 2018 | 26 | 2018 |
Analyzing students’ performance using multi-criteria classification F Al-Obeidat, A Tubaishat, A Dillon, B Shah Cluster Computing 21, 623-632, 2018 | 25 | 2018 |
Towards enhanced searching architecture for unstructured peer-to-peer over mobile ad hoc networks B Shah, KI Kim Wireless personal communications 77, 1167-1189, 2014 | 22 | 2014 |
Covid-19 patient count prediction using LSTM M Iqbal, F Al-Obeidat, F Maqbool, S Razzaq, S Anwar, A Tubaishat, ... IEEE Transactions on Computational Social Systems 8 (4), 974-981, 2021 | 19 | 2021 |