default search action
Sajid Anwar
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Atta Ur Rahman, Feras N. Al-Obeidat, Abdallah Tubaishat, Babar Shah, Sajid Anwar, Zahid Halim:
Discovering the Correlation Between Phishing Susceptibility Causing Data Biases and Big Five Personality Traits Using C-GAN. IEEE Trans. Comput. Soc. Syst. 11(4): 4800-4808 (2024) - [j36]Ehsan Elahi, Sajid Anwar, Babar Shah, Zahid Halim, Abrar Ullah, Imad Rida, Muhammad Waqas:
Knowledge Graph Enhanced Contextualized Attention-Based Network for Responsible User-Specific Recommendation. ACM Trans. Intell. Syst. Technol. 15(4): 83:1-83:24 (2024) - [e2]Sungsoo Ahn, Seonah Lee, Sajid Anwar:
Proceedings of the 2nd International Workshop on Intelligent Software Engineering co-located with the 30th Asia-Pacific Software Engineering Conference (APSEC 2023), Seoul, South Korea, December 4, 2023. CEUR Workshop Proceedings 3655, CEUR-WS.org 2024 [contents] - 2023
- [j35]Adnan Amin, Awais Adnan, Sajid Anwar:
An adaptive learning approach for customer churn prediction in the telecommunication industry using evolutionary computation and Naïve Bayes. Appl. Soft Comput. 137: 110103 (2023) - [j34]Muhammad Amin, Feras N. Al-Obeidat, Abdallah Tubaishat, Babar Shah, Sajid Anwar, Tamleek Ali Tanveer:
Cyber security and beyond: Detecting malware and concept drift in AI-based sensor data streams using statistical techniques. Comput. Electr. Eng. 108: 108702 (2023) - [j33]Sajid Anwar, Álvaro Rocha:
Special issue on towards advancements in machine learning for exploiting large-scale and heterogeneous repositories. Neural Comput. Appl. 35(11): 7909-7911 (2023) - [j32]Fakhri Alam Khan, Kifayat Ullah, Atta Ur Rahman, Sajid Anwar:
Energy optimization in smart urban buildings using bio-inspired ant colony optimization. Soft Comput. 27(2): 973-989 (2023) - [c16]Abdallah Tubaishat, Sajid Anwar, Feras N. Al-Obeidat, Babar Shah, Muhammad Saad Razzaq:
Incorporating Feature Penalty in Reinforcement Learning for Ludo Game. CiSt 2023: 524-530 - [e1]Seonah Lee, Sajid Anwar:
Proceedings of the 1st International Workshop on Intelligent Software Engineering co-located with 29th Asia-Pacific Software Engineering Conference (APSEC 2022), Virtual Event, Japan, December 6-9, 2022. CEUR Workshop Proceedings 3362, CEUR-WS.org 2023 [contents] - 2022
- [j31]Muhammad Amin, Babar Shah, Aizaz Sharif, Tamleek Ali, Ki-Il Kim, Sajid Anwar:
Android malware detection through generative adversarial networks. Trans. Emerg. Telecommun. Technol. 33(2) (2022) - [j30]Zahid Halim, Aqsa Khan, Muhammad Sulaiman, Sajid Anwar, Muhammad Nawaz:
On finding optimum commuting path in a road network: A computational approach for smart city traveling. Trans. Emerg. Telecommun. Technol. 33(2) (2022) - [j29]Salman Ahmad, Shahab U. Ansari, Usman Haider, Kamran Javed, Jalees Ur Rahman, Sajid Anwar:
Confusion matrix-based modularity induction into pretrained CNN. Multim. Tools Appl. 81(16): 23311-23337 (2022) - [j28]Sajid Anwar, Álvaro Rocha:
Special issue on advanced deep learning methods for large scale repositories. Neural Comput. Appl. 34(11): 8291-8294 (2022) - [j27]Muhammad Amin, Duri Shehwar, Abrar Ullah, Teresa Guarda, Tamleek Ali Tanveer, Sajid Anwar:
A deep learning system for health care IoT and smartphone malware detection. Neural Comput. Appl. 34(14): 11283-11294 (2022) - [j26]Syed Fawad Hussain, Ifra Arif Butt, Muhammad Hanif, Sajid Anwar:
Clustering uncertain graphs using ant colony optimization (ACO). Neural Comput. Appl. 34(14): 11721-11738 (2022) - [j25]Sajid Anwar, Abdul Rauf, Muhammad Ramzan, Imran Razzak, Mehrdad Saadatmand:
NLP-SEA 2021 Workshop Summary. ACM SIGSOFT Softw. Eng. Notes 47(2): 15-16 (2022) - [j24]Muhammad Imran, Sangeen Khan, Helmut Hlavacs, Fakhri Alam Khan, Sajid Anwar:
Intrusion detection in networks using cuckoo search optimization. Soft Comput. 26(20): 10651-10663 (2022) - 2021
- [j23]Salman Jan, Shahrulniza Musa, Toqeer Ali Syed, Mohammad Nauman, Sajid Anwar, Tamleek Ali Tanveer, Babar Shah:
Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models. Expert Syst. J. Knowl. Eng. 38(4) (2021) - [j22]Sajid Anwar, Bilal Mehrban, Musawar Ali, Farhan Hussain, Zahid Halim:
A novel framework for generating handwritten datasets. Multim. Tools Appl. 80(6): 9657-9669 (2021) - [j21]Muhammad Iqbal, Feras N. Al-Obeidat, Fahad Maqbool, Muhammad Saad Razzaq, Sajid Anwar, Abdallah Tubaishat, Muhammad Shahrose Khan, Babar Shah:
COVID-19 Patient Count Prediction Using LSTM. IEEE Trans. Comput. Soc. Syst. 8(4): 974-981 (2021) - 2020
- [j20]Ahmar Rashid, Muhammad Amir Zeb, Amad Rashid, Sajid Anwar, Fernando Joaquim, Zahid Halim:
Conceptualization of smartphone usage and feature preferences among various demographics. Clust. Comput. 23(3): 1855-1873 (2020) - [j19]Muhammad Amin, Tamleek Ali Tanveer, Mohammad Tehseen, Murad Khan, Fakhri Alam Khan, Sajid Anwar:
Static malware detection and attribution in android byte-code through an end-to-end deep system. Future Gener. Comput. Syst. 102: 112-126 (2020) - [j18]Toqeer Ali Syed, Yasar Khan, Tamleek Ali, Safiullah Faizullah, Turki G. Alghamdi, Sajid Anwar:
An Automated Permission Selection Framework for Android Platform. J. Grid Comput. 18(3): 547-561 (2020) - [j17]Xiaoping Wang, Muhammad Waqas, Shanshan Tu, Sadaqat ur Rehman, Ridha Soua, Obaid Ur Rehman, Sajid Anwar, Wei Zhao:
Power maximisation technique for generating secret keys by exploiting physical layer security in wireless communication. IET Commun. 14(5): 872-879 (2020) - [j16]Sajid Anwar, Feras N. Al-Obeidat, Abdallah Tubaishat, Sadia Din, Awais Ahmad, Fakhri Alam Khan, Gwanggil Jeon, Jonathan Loo:
Countering Malicious URLs in Internet of Things Using a Knowledge-Based Approach and a Simulated Expert. IEEE Internet Things J. 7(5): 4497-4504 (2020) - [j15]Adnan Amin, Feras N. Al-Obeidat, Babar Shah, May Al Taei, Changez Khan, Hamood Ur Rehman Durrani, Sajid Anwar:
Just-in-time customer churn prediction in the telecommunication sector. J. Supercomput. 76(6): 3924-3948 (2020)
2010 – 2019
- 2019
- [j14]Shah Nazir, Muhammad Nawaz Khan, Sajid Anwar, Awais Adnan, Shahla Asadi, Sara Shahzad, Shaukat Ali:
Big Data Visualization in Cardiology - A Systematic Review and Future Directions. IEEE Access 7: 115945-115958 (2019) - [j13]Álvaro Rocha, Sajid Anwar:
The journal of knowledge engineering special issue on WorldCist'17 - fifth world conference on information systems and technologies. Expert Syst. J. Knowl. Eng. 36(3) (2019) - [j12]Saleh Shah, Babar Shah, Adnan Amin, Feras N. Al-Obeidat, Francis Chow, Fernando Moreira, Sajid Anwar:
Compromised user credentials detection in a digital enterprise using behavioral analytics. Future Gener. Comput. Syst. 93: 407-417 (2019) - [j11]Sajid Anwar, Álvaro Rocha:
Special Issue on Knowledge Discovery in Big Data (KDBD). J. Grid Comput. 17(2): 205-208 (2019) - [j10]Adnan Amin, Babar Shah, Asad Masood Khattak, Fernando Moreira, Gohar Ali, Álvaro Rocha, Sajid Anwar:
Cross-company customer churn prediction in telecommunication: A comparison of data transformation methods. Int. J. Inf. Manag. 46: 304-319 (2019) - [j9]Farhan Hussain, Mian Ilyas Ahmad, Sajid Anwar, Aimal Khan, Pyoung Won Kim:
Efficient motion estimation using two-bit transform and modified multilevel successive elimination. J. Ambient Intell. Humaniz. Comput. 10(10): 3947-3953 (2019) - [c15]Muhammad Khan, Muhammad Nawaz, Qazi Nida ur Rehman, Ghulam Masood, Awais Adnan, Sajid Anwar, John Cosmas:
Multiple Moving Vehicle Speed Estimation Using Blob Analysis. WorldCIST (2) 2019: 303-314 - [c14]Adnan Amin, Babar Shah, Ali Abbas, Sajid Anwar, Omar Alfandi, Fernando Moreira:
Features Weight Estimation Using a Genetic Algorithm for Customer Churn Prediction in the Telecom Sector. WorldCIST (2) 2019: 483-491 - 2018
- [j8]Adnan Amin, Babar Shah, Sajid Anwar, Feras N. Al-Obeidat, Asad Masood Khattak, Awais Adnan:
A prudent based approach for compromised user credentials detection. Clust. Comput. 21(1): 423-441 (2018) - [c13]Adnan Amin, Babar Shah, Asad Masood Khattak, Thar Baker, Hamood ur Rahman Durani, Sajid Anwar:
Just-in-time Customer Churn Prediction: With and Without Data Transformation. CEC 2018: 1-6 - [c12]Awais Adnan, Sajid Anwar, Tehseen Zia, Muhammad Saad Razzaq, Fahad Maqbool, Zia Ur Rehman:
Beyond Beall's Blacklist: Automatic Detection of Open Access Predatory Research Journals. HPCC/SmartCity/DSS 2018: 1692-1697 - 2017
- [j7]Adnan Amin, Sajid Anwar, Awais Adnan, Muhammad Nawaz, Khalid Alawfi, Amir Hussain, Kaizhu Huang:
Customer churn prediction in the telecommunication sector using a rough set approach. Neurocomputing 237: 242-254 (2017) - [j6]Sajid Anwar, Kyuyeon Hwang, Wonyong Sung:
Structured Pruning of Deep Convolutional Neural Networks. ACM J. Emerg. Technol. Comput. Syst. 13(3): 32:1-32:18 (2017) - [c11]Adnan Amin, Sajid Anwar, Babar Shah, Asad Masood Khattak:
Compromised User Credentials Detection Using Temporal Features: A Prudent Based Approach. ICCAE 2017: 104-110 - 2016
- [j5]Adnan Amin, Sajid Anwar, Awais Adnan, Muhammad Nawaz, Newton Howard, Junaid Qadir, Ahmad Y. A. Hawalah, Amir Hussain:
Comparing Oversampling Techniques to Handle the Class Imbalance Problem: A Customer Churn Prediction Case Study. IEEE Access 4: 7940-7957 (2016) - [c10]Sajid Anwar, Kyuyeon Hwang, Wonyong Sung:
Learning separable fixed-point kernels for deep convolutional neural networks. ICASSP 2016: 1065-1069 - [i2]Sajid Anwar, Wonyong Sung:
Compact Deep Convolutional Neural Networks With Coarse Pruning. CoRR abs/1610.09639 (2016) - 2015
- [j4]Sajid Anwar, Mingli Zheng:
Posted price selling and online auctions. Games Econ. Behav. 90: 81-92 (2015) - [j3]Changez Khan, Sajid Anwar, Shariq Bashir, Abdul Rauf, Adnan Amin:
Site selection for food distribution using rough set approach and TOPSIS method. J. Intell. Fuzzy Syst. 29(6): 2413-2419 (2015) - [c9]Adnan Amin, Faisal Rahim, Muhammad Ramzan, Sajid Anwar:
A Prudent Based Approach for Customer Churn Prediction. BDAS 2015: 320-332 - [c8]Sajid Anwar, Kyuyeon Hwang, Wonyong Sung:
Fixed point optimization of deep convolutional neural networks for object recognition. ICASSP 2015: 1131-1135 - [c7]Adnan Amin, Faisal Rahim, Imtiaz Ali, Changez Khan, Sajid Anwar:
A Comparison of Two Oversampling Techniques (SMOTE vs MTDF) for Handling Class Imbalance Problem: A Case Study of Customer Churn Prediction. WorldCIST (1) 2015: 215-225 - [p1]Adnan Amin, Saeed Shehzad, Changez Khan, Imtiaz Ali, Sajid Anwar:
Churn Prediction in Telecommunication Industry Using Rough Set Approach. New Trends in Computational Collective Intelligence 2015: 83-95 - [i1]Sajid Anwar, Kyuyeon Hwang, Wonyong Sung:
Structured Pruning of Deep Convolutional Neural Networks. CoRR abs/1512.08571 (2015) - 2014
- [c6]Adnan Amin, Changez Khan, Imtiaz Ali, Sajid Anwar:
Customer Churn Prediction in Telecommunication Industry: With and without Counter-Example. ENIC 2014: 134-137 - [c5]Adnan Amin, Changez Khan, Imtiaz Ali, Sajid Anwar:
Customer Churn Prediction in Telecommunication Industry: With and without Counter-Example. MICAI (2) 2014: 206-218 - 2013
- [j2]Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali, Muhammad Ali, Sajid Anwar, Quratulain Alam:
Behavioral Attestation for Web Services using access policies. Multim. Tools Appl. 66(2): 283-302 (2013) - [c4]Sadia Batool, Sajid Anwar, Muhammad Ramzan, Nawazish Naveed, Aftab Ahmed:
Semantic Based Ontology Driven Feature Interaction Detection & Modeling. ICISA 2013: 1-5 - 2012
- [j1]Muhammad Ramzan, M. Arfan Jaffar, Muhammad Amjad Iqbal, Sajid Anwar, Abdul Rauf, Arshad Ali Shahid:
Project scheduling conflict identification and resolution using genetic algorithms (GA). Telecommun. Syst. 51(2-3): 167-175 (2012) - 2010
- [c3]Abdul Rauf, Sajid Anwar, Naveed Kazim, Arshad Ali Shahid:
Evolutionary Based Automated Coverage Analysis for GUI Testing. IC3 (1) 2010: 456-466 - [c2]Abdul Rauf, Sajid Anwar, M. Arfan Jaffar, Arshad Ali Shahid:
Automated GUI Test Coverage Analysis Using GA. ITNG 2010: 1057-1062 - [c1]Abdul Rauf, Naveed Kazim, Sajid Anwar, Shafiq-Ur Rehman, Arshad Ali Shahid:
Maximizing GUI Test Coverage Through Particle Swarm Optimization. SEDE 2010: 51-56
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint