Follow
Dr. Sadaqat Rehman
Title
Cited by
Cited by
Year
An experimental analysis of attack classification using machine learning in IoT networks
A Churcher, R Ullah, J Ahmad, S Ur Rehman, F Masood, M Gogate, ...
Sensors 21 (2), 446, 2021
1652021
A lightweight chaos-based medical image encryption scheme using random shuffling and XOR operations
F Masood, M Driss, W Boulila, J Ahmad, SU Rehman, SU Jan, A Qayyum, ...
Wireless personal communications 127 (2), 1405-1432, 2022
1052022
A hybrid deep CNN model for abnormal arrhythmia detection based on cardiac ECG signal
A Ullah, S Rehman, S Tu, RM Mehmood, Fawad, M Ehatisham-ul-Haq
Sensors 21 (3), 951, 2021
992021
Security in fog computing: A novel technique to tackle an impersonation attack
S Tu, M Waqas, SU Rehman, M Aamir, OU Rehman, Z Jianbiao, ...
IEEE Access 6, 74993-75001, 2018
842018
The role of artificial intelligence and machine learning in wireless networks security: Principle, practice and challenges
M Waqas, S Tu, Z Halim, SU Rehman, G Abbas, ZH Abbas
Artificial Intelligence Review 55 (7), 5215-5261, 2022
752022
Reinforcement learning assisted impersonation attack detection in device-to-device communications
S Tu, M Waqas, SU Rehman, T Mir, G Abbas, ZH Abbas, Z Halim, I Ahmad
IEEE Transactions on Vehicular Technology 70 (2), 1474-1479, 2021
692021
Image captioning with object detection and localization
Z Yang, YJ Zhang, S Rehman, Y Huang
Image and Graphics: 9th International Conference, ICIG 2017, Shanghai, China …, 2017
572017
Unsupervised pre-trained filter learning approach for efficient convolution neural network
S ur Rehman, S Tu, M Waqas, Y Huang, O ur Rehman, B Ahmad, ...
Neurocomputing 365, 171-190, 2019
552019
Optimization of CNN through novel training strategy for visual classification problems
SU Rehman, S Tu, OU Rehman, Y Huang, CMS Magurawalage, ...
Entropy 20 (4), 290, 2018
512018
Face recognition: A novel un-supervised convolutional neural network method
SU Rehman, S Tu, Y Huang, Z Yang
2016 IEEE International Conference of Online Analysis and Computing Science …, 2016
502016
Comparison based analysis of different cryptographic and encryption techniques using message authentication code (mac) in wireless sensor networks (wsn)
SU Rehman, M Bilal, B Ahmad, KM Yahya, A Ullah, OU Rehman
arXiv preprint arXiv:1203.3103, 2012
462012
Implementation and use of disease diagnosis systems for electronic medical records based on machine learning: A complete review
J Latif, C Xiao, S Tu, SU Rehman, A Imran, A Bilal
IEEE Access 8, 150489-150513, 2020
442020
A quantum particle swarm optimizer with enhanced strategy for global optimization of electromagnetic devices
OU Rehman, S Yang, S Khan, SU Rehman
IEEE Transactions on Magnetics 55 (8), 1-4, 2019
402019
A new color image encryption technique using DNA computing and Chaos-based substitution box
F Masood, J Masood, L Zhang, SS Jamal, W Boulila, SU Rehman, ...
Soft Computing, 1-17, 2022
392022
ODGNet: a deep learning model for automated optic disc localization and glaucoma classification using fundus images
J Latif, S Tu, C Xiao, S Ur Rehman, A Imran, Y Latif
SN Applied Sciences 4 (4), 98, 2022
362022
A benchmark dataset and learning high-level semantic embeddings of multimedia for cross-media retrieval
SU Rehman, S Tu, Y Huang, OU Rehman
IEEE Access 6, 67176-67188, 2018
362018
Social phenomena and fog computing networks: A novel perspective for future networks
S Tu, M Waqas, SU Rehman, T Mir, Z Halim, I Ahmad
IEEE Transactions on Computational Social Systems 9 (1), 32-44, 2021
352021
A novel quantum inspired particle swarm optimization algorithm for electromagnetic applications
S Tu, OU Rehman, SU Rehman, S Ullah, M Waqas, R Zhu
IEEE Access 8, 21909-21916, 2020
352020
Authentication of Vehicles and Road Side Units in Intelligent Transportation System.
M Waqas, S Tu, SU Rehman, Z Halim, S Anwar, G Abbas, ZH Abbas, ...
Computers, Materials & Continua, 2020
282020
Critical review of authentication mechanisms in cloud computing
S Ziyad, S Rehman
International Journal of Computer Science Issues (IJCSI) 11 (3), 145, 2014
282014
The system can't perform the operation now. Try again later.
Articles 1–20