default search action
Saif Ur Rehman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j23]Muhammad Sadeequllah, Azhar Rauf, Saif Ur Rehman, Noha Alnazzawi:
Probabilistic Support Prediction: Fast Frequent Itemset Mining in Dense Data. IEEE Access 12: 39330-39350 (2024) - [j22]Syed Tahseen Haider, Wenping Ge, Jianqiang Li, Saif Ur Rehman, Azhar Imran, Mohamed Abdel Fattah Sharaf, Syed Muhammad Haider:
An Ensemble Machine Learning Framework for Cotton Crop Yield Prediction Using Weather Parameters: A Case Study of Pakistan. IEEE Access 12: 124045-124061 (2024) - [j21]Hamza Zaheer, Saif Ur Rehman, Maryam Bashir, Mian Aziz Ahmad, Faheem Ahmad:
A metaheuristic based filter-wrapper approach to feature selection for fake news detection. Multim. Tools Appl. 83(34): 80299-80328 (2024) - 2023
- [j20]Bushra Kanwal, Saif Ur Rehman, Azhar Imran, Rana Saud Shaukat, Jianqiang Li, Abdulkareem Alzahrani, Ans D. Alghamdi, Fawaz Khaled Alarfaj:
Opinion Mining from Online Travel Reviews: An Exploratory Investigation on Pakistan Major Online Travel Services Using Natural Language Processing. IEEE Access 11: 29934-29945 (2023) - [j19]Aiman Hafeez, Tariq Ali, Asif Nawaz, Saif Ur Rehman, Azhar Imran Mudassir, Abdulaziz A. Alsulami, Ali Alqahtani:
Addressing Imbalance Problem for Multi Label Classification of Scholarly Articles. IEEE Access 11: 74500-74516 (2023) - [j18]Umair Maqsood, Saif Ur Rehman, Tariq Ali, Khalid Mahmood, Tahani Alsaedi, Mahwish Kundi:
An Intelligent Framework Based on Deep Learning for SMS and e-mail Spam Detection. Appl. Comput. Intell. Soft Comput. 2023: 6648970:1-6648970:16 (2023) - [j17]Muhammad Rizwan Rashid Rana, Saif Ur Rehman, Asif Nawaz, Tariq Ali, Azhar Imran, Abdulkareem Alzahrani, Abdullah Almuhaimeed:
Aspect-Based Sentiment Analysis for Social Multimedia: A Hybrid Computational Framework. Comput. Syst. Sci. Eng. 46(2): 2415-2428 (2023) - [j16]Asif Nawaz, Tariq Ali, Ghulam Mustafa, Saif Ur Rehman, Muhammad Rizwan Rashid Rana:
A novel technique for detecting electricity theft in secure smart grids using CNN and XG-boost. Intell. Syst. Appl. 17: 200168 (2023) - [j15]Abdul Rehman Javed, Muhammad Usman Sarwar, Saif ur Rehman, Habib Ullah Khan, Yasser D. Al-Otaibi, Waleed S. Alnumay:
PP-SPA: Privacy Preserved Smartphone-Based Personal Assistant to Improve Routine Life Functioning of Cognitive Impaired Individuals. Neural Process. Lett. 55(1): 35-52 (2023) - 2022
- [j14]Saif Ur Rehman, Abdul Rehman Javed, Mohib Ullah Khan, Mubashar Nazar Awan, Adees Farukh, Aseel Hussien:
PersonalisedComfort: a personalised thermal comfort model to predict thermal sensation votes for smart building residents. Enterp. Inf. Syst. 16(7) (2022) - 2021
- [j13]Syed Ibrahim Imtiaz, Saif ur Rehman, Abdul Rehman Javed, Zunera Jalil, Xuan Liu, Waleed S. Alnumay:
DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network. Future Gener. Comput. Syst. 115: 844-856 (2021) - [j12]Saif ur Rehman, Mubashir Khaliq, Syed Ibrahim Imtiaz, Aamir Rasool, Muhammad Shafiq, Abdul Rehman Javed, Zunera Jalil, Ali Kashif Bashir:
DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU). Future Gener. Comput. Syst. 118: 453-466 (2021) - [j11]Saif ur Rehman, Kexing Liu, Tariq Ali, Asif Nawaz, Simon James Fong:
A Graph Mining Approach for Ranking and Discovering the Interesting Frequent Subgraph Patterns. Int. J. Comput. Intell. Syst. 14(1): 152 (2021) - [j10]Saif ur Rehman, Asif Nawaz, Tariq Ali, Naveed Amin:
g-Sum: A Graph Summarization Approach for a Single Large Social Network. EAI Endorsed Trans. Scalable Inf. Syst. 8(32): e2 (2021) - [j9]Muhammad Shaheen, Saif ur Rehman, Fahad Ghaffar:
Correlation and congruence modulo based clustering technique and its application in energy classification. Sustain. Comput. Informatics Syst. 30: 100561 (2021) - [j8]Abdul Rehman Javed, Saif Ur Rehman, Mohib Ullah Khan, Mamoun Alazab, Habib Ullah Khan:
Betalogger: Smartphone Sensor-based Side-channel Attack Detection and Text Inference Using Language Modeling and Dense MultiLayer Neural Network. ACM Trans. Asian Low Resour. Lang. Inf. Process. 20(5): 87:1-87:17 (2021) - [j7]Abdul Rehman Javed, Muhammad Usman, Saif Ur Rehman, Mohib Ullah Khan, Mohammad Sayad Haghighi:
Anomaly Detection in Automated Vehicles Using Multistage Attention-Based Convolutional Neural Network. IEEE Trans. Intell. Transp. Syst. 22(7): 4291-4300 (2021) - [j6]Abdul Rehman Javed, Saif ur Rehman, Mohib Ullah Khan, Mamoun Alazab, Thippa Reddy Gadekallu:
CANintelliIDS: Detecting In-Vehicle Intrusion Attacks on a Controller Area Network Using CNN and Attention-Based GRU. IEEE Trans. Netw. Sci. Eng. 8(2): 1456-1466 (2021) - [j5]Celestine Iwendi, Saif Ur Rehman, Abdul Rehman Javed, Suleman Khan, Gautam Srivastava:
Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures. ACM Trans. Internet Techn. 21(3): 73:1-73:22 (2021) - 2020
- [j4]Mohsin Shahzad, Ying Qu, Abaid Ullah Zafar, Saif Ur Rehman, Tahir Islam:
Exploring the influence of knowledge management process on corporate sustainable performance through green innovation. J. Knowl. Manag. 24(9): 2079-2106 (2020) - [j3]Saif ur Rehman, Sohail Asghar:
Online social network trend discovery using frequent subgraph mining. Soc. Netw. Anal. Min. 10(1): 67 (2020) - 2019
- [j2]Fakhar e Alam, Saif ur Rehman, Shafiqur Rehman, Muhammad Jahangir, Muhammad Shoaib, Imran Siddiqui, Intikhab Ulfat:
Empirical model development for the estimation of clearness index usingmeteorological parameters. Turkish J. Electr. Eng. Comput. Sci. 27(6): 4429-4441 (2019) - 2018
- [j1]Saif ur Rehman, Sohail Asghar, Simon James Fong:
Optimized and Frequent Subgraphs: How Are They Related? IEEE Access 6: 37237-37249 (2018)
Conference and Workshop Papers
- 2018
- [c6]Saif ur Rehman, Sohail Asghar, Simon Fong:
An Efficient Ranking Scheme for Frequent Subgraph Patterns. ICMLC 2018: 257-262 - 2014
- [c5]Kamran Khan, Saif ur Rehman, Kamran Aziz, Simon Fong, Sababady Sarasvady, Amrita Vishwa:
DBSCAN: Past, present and future. ICADIWT 2014: 232-238 - 2012
- [c4]Saif ur Rehman, Asmat Ullah Khan, Simon Fong:
Graph mining: A survey of graph mining techniques. ICDIM 2012: 88-92 - [c3]Saif ur Rehman, Kamran Khan, Simon Fong, Robert P. Biuk-Aghai:
An efficient new multi-language clone detection approach from large source code. SMC 2012: 937-940 - 2010
- [c2]Saif ur Rehman, Saeed Ullah, Sardar Ali:
On enhancing the WEP security against brute-force and compromised keys. CISIM 2010: 250-254 - [c1]Saif ur Rehman, Muhammed Naeem Ahmed Khan:
An Incremental Density-Based Clustering Technique for Large Datasets. CISIS 2010: 3-11
Informal and Other Publications
- 2021
- [i1]Saif Ur Rehman, Muhammad Rashid Razzaq, Muhammad Hadi Hussian:
Training of SSD(Single Shot Detector) for Facial Detection using Nvidia Jetson Nano. CoRR abs/2105.13906 (2021)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint