Saif Ur Rehman

Orcid: 0000-0002-5810-6479

According to our database1, Saif Ur Rehman authored at least 28 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Probabilistic Support Prediction: Fast Frequent Itemset Mining in Dense Data.
IEEE Access, 2024

2023
PP-SPA: Privacy Preserved Smartphone-Based Personal Assistant to Improve Routine Life Functioning of Cognitive Impaired Individuals.
Neural Process. Lett., February, 2023

A novel technique for detecting electricity theft in secure smart grids using CNN and XG-boost.
Intell. Syst. Appl., 2023

Aspect-Based Sentiment Analysis for Social Multimedia: A Hybrid Computational Framework.
Comput. Syst. Sci. Eng., 2023

An Intelligent Framework Based on Deep Learning for SMS and e-mail Spam Detection.
Appl. Comput. Intell. Soft Comput., 2023

Opinion Mining from Online Travel Reviews: An Exploratory Investigation on Pakistan Major Online Travel Services Using Natural Language Processing.
IEEE Access, 2023

Addressing Imbalance Problem for Multi Label Classification of Scholarly Articles.
IEEE Access, 2023

2022
PersonalisedComfort: a personalised thermal comfort model to predict thermal sensation votes for smart building residents.
Enterp. Inf. Syst., 2022

2021
Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures.
ACM Trans. Internet Techn., 2021

CANintelliIDS: Detecting In-Vehicle Intrusion Attacks on a Controller Area Network Using CNN and Attention-Based GRU.
IEEE Trans. Netw. Sci. Eng., 2021

Anomaly Detection in Automated Vehicles Using Multistage Attention-Based Convolutional Neural Network.
IEEE Trans. Intell. Transp. Syst., 2021

Betalogger: Smartphone Sensor-based Side-channel Attack Detection and Text Inference Using Language Modeling and Dense MultiLayer Neural Network.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2021

Correlation and congruence modulo based clustering technique and its application in energy classification.
Sustain. Comput. Informatics Syst., 2021

g-Sum: A Graph Summarization Approach for a Single Large Social Network.
EAI Endorsed Trans. Scalable Inf. Syst., 2021

A Graph Mining Approach for Ranking and Discovering the Interesting Frequent Subgraph Patterns.
Int. J. Comput. Intell. Syst., 2021

DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU).
Future Gener. Comput. Syst., 2021

DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network.
Future Gener. Comput. Syst., 2021

Training of SSD(Single Shot Detector) for Facial Detection using Nvidia Jetson Nano.
CoRR, 2021

2020
Online social network trend discovery using frequent subgraph mining.
Soc. Netw. Anal. Min., 2020

Exploring the influence of knowledge management process on corporate sustainable performance through green innovation.
J. Knowl. Manag., 2020

2019
Empirical model development for the estimation of clearness index usingmeteorological parameters.
Turkish J. Electr. Eng. Comput. Sci., 2019

2018
Optimized and Frequent Subgraphs: How Are They Related?
IEEE Access, 2018

An Efficient Ranking Scheme for Frequent Subgraph Patterns.
Proceedings of the 10th International Conference on Machine Learning and Computing, 2018

2014
DBSCAN: Past, present and future.
Proceedings of the Fifth International Conference on the Applications of Digital Information and Web Technologies, 2014

2012
An efficient new multi-language clone detection approach from large source code.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

Graph mining: A survey of graph mining techniques.
Proceedings of the Seventh International Conference on Digital Information Management, 2012

2010
An Incremental Density-Based Clustering Technique for Large Datasets.
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010

On enhancing the WEP security against brute-force and compromised keys.
Proceedings of the 2010 International Conference on Computer Information Systems and Industrial Management Applications, 2010


  Loading...