Predicting next word using RNN and LSTM cells: Stastical language modeling AF Ganai, F Khursheed 2019 fifth international conference on image information processing (ICIIP …, 2019 | 46 | 2019 |
Performance evaluation of machine learning models for distributed denial of service attack detection using improved feature selection and hyper‐parameter optimization techniques B Habib, F Khursheed Concurrency and Computation: Practice and Experience 34 (26), e7299, 2022 | 15 | 2022 |
A novel image tamper detection approach by blending forensic tools and optimized CNN: Sealion customized firefly algorithm M Ahmad, F Khursheed Multimedia Tools and Applications 81 (2), 2577-2601, 2022 | 13 | 2022 |
Digital image forgery detection approaches: a review M Ahmad, F Khursheed Applications of Artificial Intelligence in Engineering: Proceedings of First …, 2021 | 13 | 2021 |
Experimental analysis of DDoS attack and it's detection in Eucalyptus private cloud platform AH Dar, B Habib, F Khurshid, MT Banday 2016 International Conference on Advances in Computing, Communications and …, 2016 | 13 | 2016 |
AR model based human identification using ear biometrics F Khursheed, AH Mir International Journal of Signal Processing, Image Processing and Pattern …, 2014 | 13 | 2014 |
Deep and dense convolutional neural network for multi category classification of magnification specific and magnification independent breast cancer histopathological images MA Jawad, F Khursheed Biomedical Signal Processing and Control 78, 103935, 2022 | 12 | 2022 |
DDoS mitigation in eucalyptus cloud platform using snort and packet filtering—IP-tables B Habib, F Khurshid, AH Dar, Z Shah 2019 4th International Conference on Information Systems and Computer …, 2019 | 10 | 2019 |
A novel holistic unconstrained handwritten urdu recognition system using convolutional neural networks AF Ganai, F Khursheed International Journal on Document Analysis and Recognition (IJDAR) 25 (4 …, 2022 | 7 | 2022 |
Fuzzy logic-based data hiding F Khursheed, AH Mir Proceeding of Cyber Security, Cyber Crime, and Cyber Forensics, Department …, 2009 | 7 | 2009 |
Detection and localization of image tampering in digital images with fused features M Ahmad, F Khursheed Concurrency and Computation: Practice and Experience 34 (23), e7191, 2022 | 6 | 2022 |
Multi-unit iris biometric fusion using gray level co-occurrence matrix features SA Banday, AH Mir, F Khursheed 2013 International Conference on Advanced Electronic Systems (ICAES), 225-229, 2013 | 6 | 2013 |
A review of approaches to energy aware multi-hop routing for lifetime enhancement in wireless sensor networks MA Jawad, F Khurshid Proceedings of the international e-conference on intelligent systems and …, 2021 | 5 | 2021 |
Performance analysis of enhanced secure socket layer protocol RK Jha, F Khurshid 2014 International Conference on Communication and Network Technologies, 319-323, 2014 | 5 | 2014 |
Time series model based personal verification using ear biometrics F Khursheed, AH Mir 2013 4th international conference on computer and communication technology …, 2013 | 5 | 2013 |
Histo-fusion: a novel domain specific learning to identify invasive ductal carcinoma (IDC) from histopathological images MA Jawad, F Khursheed Multimedia Tools and Applications 82 (25), 39371-39392, 2023 | 4 | 2023 |
Computationally efficient holistic approach for handwritten urdu recognition using lrcn model AF Ganai, F Khursheed International Journal of Intelligent Systems and Applications in Engineering …, 2023 | 3 | 2023 |
Computationally efficient recognition of unconstrained handwritten Urdu script using BERT with vision transformers AF Ganai, F Khursheed Neural Computing and Applications 35 (34), 24161-24177, 2023 | 2 | 2023 |
Adaptive-Greedy Exploration for Finite Systems SA Bashir, F Khursheed, I Abdoulahi Gedrag Organ. Rev 34, 417-431, 2021 | 2 | 2021 |
Performance Analysis of Enhanced Secure Socket Layer Protocol F Khurshid, RK Jha 2014 International Conference on Communication and Network Technologies (ICCNT), 2014 | 2 | 2014 |