An unsupervised deep learning ensemble model for anomaly detection in static attributed social networks W Khan, M Haroon International Journal of Cognitive Computing in Engineering 3, 153-160, 2022 | 36 | 2022 |
Web document information extraction using class attribute approach DOI:10.1109/ICCCT.2013.6749596; Corpus ID: 10358647 S Srivastava, M Haroon, A Bajaj 2013 4th International Conference on Computer and Communication Technology …, 2013 | 27 | 2013 |
Research on significant factors affecting adoption of blockchain technology for enterprise distributed applications based on integrated MCDM FCEM-MULTIMOORA-FG method ZA Siddiqui, M Haroon Engineering Applications of Artificial Intelligence 118, 105699, 2023 | 25 | 2023 |
An efficient framework for anomaly detection in attributed social networks W Khan, M Haroon International Journal of information technology 14 (6), 3069-3076, 2022 | 25 | 2022 |
Fournier gangrene: pictorial review S Wongwaisayawan, S Krishna, M Haroon, Y Nisha, A Sheikh Abdominal Radiology 45, 3838-3848, 2020 | 24 | 2020 |
Different technique of load balancing in distributed system: A review paper R Khan, M Haroon, MS Husain 2015 Global Conference on Communication Technologies (GCCT), 371-375, 2015 | 19 | 2015 |
An exhaustive review on state-of-the-art techniques for anomaly detection on attributed networks W Khan Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12 (10 …, 2021 | 18 | 2021 |
An enriched information security framework from various attacks in the IoT MS Husain, DM Haroon International Journal of Innovative Research in Computer Science …, 2020 | 17 | 2020 |
Interest attentive dynamic load balancing in distributed systems M Haroon, M Husain 2015 2nd International Conference on Computing for Sustainable Global …, 2015 | 17 | 2015 |
Analysis of a dynamic load balancing in multiprocessor system M Haroon, M Husain International Journal of Computer Science engineering and Information …, 2013 | 14 | 2013 |
DVAEGMM: Dual variational autoencoder with gaussian mixture model for anomaly detection on attributed networks W Khan, M Haroon, AN Khan, MK Hasan, A Khan, UA Mokhtar, S Islam IEEE Access 10, 91160-91176, 2022 | 13 | 2022 |
A Review of Information Security from Consumer’s Perspective Especially in Online Transactions MS Husain International Journal of Engineering and Management Research 10 (https://doi …, 2020 | 13 | 2020 |
A comparative study of trends in security in cloud computing AM Khan, S Ahmad, M Haroon 2015 Fifth International Conference on Communication Systems and Network …, 2015 | 11 | 2015 |
Application of artificial intelligence and machine learning in blockchain technology ZA Siddiqui, M Haroon Artificial Intelligence and Machine Learning for EDGE Computing, 169-185, 2022 | 10 | 2022 |
Utility of quantitative T2‐mapping compared to conventional and advanced diffusion weighted imaging techniques for multiparametric prostate MRI in men with hip prosthesis P Sathiadoss, N Schieda, M Haroon, H Osman, S Alrasheed, TA Flood, ... Journal of magnetic resonance imaging 55 (1), 265-274, 2022 | 10 | 2022 |
Fully automated detection of prostate transition zone tumors on T2‐weighted and apparent diffusion coefficient (ADC) map MR images using U‐Net ensemble T Wong, N Schieda, P Sathiadoss, M Haroon, J Abreu‐Gomez, E Ukwatta Medical Physics 48 (11), 6889-6900, 2021 | 10 | 2021 |
Security in digital healthcare system MM Tripathi, M Haroon, Z Khan, MS Husain Pervasive Healthcare: A Compendium of Critical Factors for Success, 217-231, 2022 | 9 | 2022 |
Application of machine learning in forensic science M Haroon, MM Tripathi, F Ahmad Critical Concepts, Standards, and Techniques in Cyber Forensics, 228-239, 2020 | 9 | 2020 |
Epidemiological study of tuberculosis T Ahmad, S Ahmad, MZ Haroon, A Khan, S Salman, N Khan, F Gul Eur. Acad. Res 1 (8), 1854-1860, 2013 | 9 | 2013 |
Comparative study of various crowd detection and classification methods for safety control system N Khan, M Haroon Available at SSRN 4146666, 2022 | 8 | 2022 |