Follow
Babar Shah
Babar Shah
Associate Professor, College of Technological Innovation, Zayed Universiity
Verified email at zu.ac.ae - Homepage
Title
Cited by
Cited by
Year
Security and privacy challenges in smart cities
T Braun, BCM Fung, F Iqbal, B Shah
Sustainable cities and society 39, 499-507, 2018
3512018
Customer churn prediction in telecommunication industry using data certainty
A Amin, F Al-Obeidat, B Shah, A Adnan, J Loo, S Anwar
Journal of Business Research 94, 290-301, 2019
2432019
Security analysis of IoT protocols: A focus in CoAP
RA Rahman, B Shah
2016 3rd MEC international conference on big data and smart city (ICBDSC), 1-7, 2016
1812016
Cross-company customer churn prediction in telecommunication: A comparison of data transformation methods
A Amin, B Shah, AM Khattak, FJL Moreira, G Ali, A Rocha, S Anwar
International Journal of Information Management 46, 304-319, 2019
902019
A secure fog‐based platform for SCADA‐based IoT critical infrastructure
T Baker, M Asim, Á MacDermott, F Iqbal, F Kamoun, B Shah, O Alfandi, ...
Software: Practice and Experience 50 (5), 503-518, 2020
792020
Deep learning-based segmentation and classification of leaf images for detection of tomato plant disease
M Shoaib, B Shah, I Ullah, F Ali, SH Park
Frontiers in Plant Science 13, 1031748, 2022
752022
Wireless sensor networks for big data systems
BS Kim, KI Kim, B Shah, F Chow, KH Kim
Sensors 19 (7), 1565, 2019
702019
A novel text mining approach for mental health prediction using Bi-LSTM and BERT model
K Zeberga, M Attique, B Shah, F Ali, YZ Jembre, TS Chung
Computational intelligence and neuroscience 2022, 2022
622022
An advanced deep learning models-based plant disease detection: A review of recent research
M Shoaib, B Shah, S Ei-Sappagh, A Ali, A Ullah, F Alenezi, T Gechev, ...
Frontiers in Plant Science 14, 1158933, 2023
572023
A novel binary chaotic genetic algorithm for feature selection and its utility in affective computing and healthcare
M Tahir, A Tubaishat, F Al-Obeidat, B Shah, Z Halim, M Waqas
Neural Computing and Applications, 1-22, 2022
542022
Android malware detection through generative adversarial networks
M Amin, B Shah, A Sharif, T Ali, KI Kim, S Anwar
Transactions on Emerging Telecommunications Technologies 33 (2), e3675, 2022
502022
Gene encoder: a feature selection technique through unsupervised deep learning-based clustering for large gene expression data
Uzma, F Al-Obeidat, A Tubaishat, B Shah, Z Halim
Neural Computing and Applications, 1-23, 2020
482020
Classification and analysis of android malware images using feature fusion technique
J Singh, D Thakur, T Gera, B Shah, T Abuhmed, F Ali
IEEE Access 9, 90102-90117, 2021
422021
A survey on three-dimensional wireless ad hoc and sensor networks
B Shah, KI Kim
International Journal of Distributed Sensor Networks 10 (7), 616014, 2014
422014
Fuzzy logic-based guaranteed lifetime protocol for real-time wireless sensor networks
B Shah, F Iqbal, A Abbas, KI Kim
Sensors 15 (8), 20373-20391, 2015
392015
Just-in-time customer churn prediction in the telecommunication sector
A Amin, F Al-Obeidat, B Shah, MA Tae, C Khan, HUR Durrani, S Anwar
The Journal of Supercomputing 76, 3924-3948, 2020
382020
Enhancing the teaching and learning process using video streaming servers and forecasting techniques
R Hasan, S Palaniappan, S Mahmood, B Shah, A Abbas, KU Sarker
Sustainability 11 (7), 2049, 2019
372019
COVID-19 patient count prediction using LSTM
M Iqbal, F Al-Obeidat, F Maqbool, S Razzaq, S Anwar, A Tubaishat, ...
IEEE Transactions on Computational Social Systems 8 (4), 974-981, 2021
342021
Guaranteed lifetime protocol for IoT based wireless sensor networks with multiple constraints
B Shah, A Abbas, G Ali, F Iqbal, AM Khattak, O Alfandi, KI Kim
Ad Hoc Networks 104, 102158, 2020
312020
Analyzing students’ performance using multi-criteria classification
F Al-Obeidat, A Tubaishat, A Dillon, B Shah
Cluster Computing 21, 623-632, 2018
312018
The system can't perform the operation now. Try again later.
Articles 1–20