A systematic mapping study on cloud-based mobile application testing BI Yaâ, N Salleh, A Nordin, NB Idris, H Abas, AA Alwan Journal of Information and Communication Technology 18 (4), 485-527, 2019 | 15 | 2019 |
Software requirements patterns and meta model: A Strategy for enhancing Requirements Reuse (RR) BI Ya'u, A Nordin, N Salleh 2016 6th International Conference on Information and Communication …, 2016 | 15 | 2016 |
Investigation of Requirements Reuse (RR) challenges and existing RR approaches BI Ya’u, A Nordin, N Salleh Advanced Science Letters 23 (5), 4101-4105, 2017 | 11 | 2017 |
Transfer learning approach for malware images classification on android devices using deep convolutional neural network Z Bala, FU Zambuk, BY Imam, AY Gital, F Shittu, M Aliyu, ... Procedia Computer Science 212, 429-440, 2022 | 7 | 2022 |
Requirements patterns structure for specifying and reusing software product line requirements BI Ya'u, A Nordin, N Salleh 2018 International Conference on Information and Communication Technology …, 2018 | 7 | 2018 |
Meta-modeling constructs for requirements reuse (RR): software requirements patterns, variability and traceability BI Ya’u, A Nordin, N Salleh Malaysian Journal of Computing (MJoC) 3 (2), 119-137, 2018 | 7 | 2018 |
Towards understanding the influence of personality and team behaviors on requirements engineering activities AN Norsaremah Salleh, Badamasi Imam Ya'u International Journal of Electrical and Computer Engineering (IJECE) 13 (3 …, 2023 | 4* | 2023 |
An Optimized Deep Learning Method for Software Defect Prediction Using Whale optimization Algorithm (WOA): A Review AA Aihong, BI Ya'u, U Ali, A Ahmad ATBU Journal of Science, Technology and Education 11 (3), 159-174, 2023 | 3 | 2023 |
Crackdet: an improved deep learning framework base on multi-scale convolutional architecture for detecting road cracks IY Idris, BI Ya'u, U Ali ATBU Journal of Science, Technology and Education 11 (2), 116-124, 2023 | 3 | 2023 |
Sentiment analysis of sarcasm detection in social media AGM Sunusi Kabir Alaramma , Adamu Adamu Habu , Badamasi Imamu Ya’u Gadau Journal of Pure and Allied Sciences 2 (1), 76-82, 2023 | 3 | 2023 |
Deeper Architecture for Brain Age Prediction Based on MRI Images Using Transfer Learning Technique NM Wormi, BI Ya'u, S Boukari, MA Musa, F Shittu, MA Lawal Procedia Computer Science 212, 441-453, 2022 | 3 | 2022 |
Analysis of expert’s opinion on requirements patterns for software product families framework using GQM method BI Ya’u, A Nordin, N Salleh Computational Science and Technology: 6th ICCST 2019, Kota Kinabalu …, 2020 | 3 | 2020 |
Component-Based: The Right Candidate for Restructuring the Nature of Software Development in Organizations BI Ya’u International Journal of Engineering and Computer Science 4 (8), 8, 2015 | 3 | 2015 |
Credit Card Fraud Detection Using Deep Learning Based on Auto-LSTM Algorithms: A Comprehensive Review US Musa, KI Musa, BI Ya'u, A Ahmad ATBU Journal of Science, Technology and Education 12 (1), 548-563, 2024 | 2 | 2024 |
An Improved Model for Electricity Load and Price Prediction Using Hybrid Deep Learning Algorithms: A Comprehensive Review DD Gital, AY Gital, BI Ya’u, A Ahmed, MA Lawal ATBU Journal of Science, Technology and Education 11 (3), 103-118, 2023 | 2 | 2023 |
A Review on Prediction of Covid-19 Cases using Machine Learning for Effective Public Health Management S Yusuf, BI Ya'u, KM Ibrahim, MA Bizi, AM Ahmed, L Garba ATBU Journal of Science, Technology and Education 11 (2), 202-215, 2023 | 2 | 2023 |
An Adversarial Examples against Deep Learning-Based Network Intrusion Detection System: A Review IH Ahmad Abubakar Yunusa, Fatima Umar Zambuk, Badamasi Imam Ya’u, Hamza Hussaini JOURNAL OF SCIENCE TECHNOLOGY AND EDUCATION 11 (2), 189-204, 2023 | 2* | 2023 |
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Security (IPsec) on IPv4 and IPv6 Enabled Communication M NuraYusuf, BIY u International Journal of Computational Engineering Research (IJCER) 6 (02 …, 2016 | 1* | 2016 |
An improved zero-resource black-box framework for detecting hallucinations in 100 billion+ parameter generative pre-trained large language models J Blaise, FU Zambuk, BI Ya'u Sixth International Conference on Image, Video Processing, and Artificial …, 2024 | | 2024 |
An Advanced DDOS Attack Detection Model with an Ensembled SVM and Baruta Selection Technique AA Ajiya, FU Zambuk, BI Ya'u, M Abdullahi, H Dan-azumi Bima Journal of Science and Technology 8 (2B), 204-210, 2024 | | 2024 |