Name
Papers
Collaborators
SAJID ANWAR
39
113
Citations 
PageRank 
Referers 
184
19.96
620
Referees 
References 
762
411
Search Limit
100762
Title
Citations
PageRank
Year
A deep learning system for health care IoT and smartphone malware detection00.342022
Android malware detection through generative adversarial networks20.382022
On finding optimum commuting path in a road network: A computational approach for smart city traveling00.342022
NLP-SEA 2021 Workshop Summary.00.342022
Integrity Verification And Behavioral Classification Of A Large Dataset Applications Pertaining Smartosvia Blockchain And Generative Models00.342021
COVID-19 Patient Count Prediction Using LSTM10.372021
Conceptualization Of Smartphone Usage And Feature Preferences Among Various Demographics00.342020
Static malware detection and attribution in android byte-code through an end-to-end deep system10.352020
Power Allocation Scheme for Secret KeyGeneration in Wireless Communication00.342020
An Automated Permission Selection Framework for Android Platform00.342020
Countering Malicious URLs in Internet of Things Using a Knowledge-Based Approach and a Simulated Expert.00.342020
Just-in-time customer churn prediction in the telecommunication sector30.382020
Compromised user credentials detection in a digital enterprise using behavioral analytics.00.342019
Special Issue on Knowledge Discovery in Big Data (KDBD).00.342019
The journal of knowledge engineering special issue on WorldCist'17 - fifth world conference on information systems and technologies.00.342019
Efficient motion estimation using two-bit transform and modified multilevel successive elimination00.342019
Big Data Visualization in Cardiology—A Systematic Review and Future Directions00.342019
Cross-company customer churn prediction in telecommunication: A comparison of data transformation methods10.352019
Multiple Moving Vehicle Speed Estimation Using Blob Analysis.00.342019
Features Weight Estimation Using a Genetic Algorithm for Customer Churn Prediction in the Telecom Sector.00.342019
A prudent based approach for compromised user credentials detection10.362018
Just-in-time Customer Churn Prediction: With and Without Data Transformation10.342018
Customer churn prediction in the telecommunication sector using a rough set approach.150.532017
Compromised User Credentials Detection Using Temporal Features: A Prudent Based Approach10.382017
Compact Deep Convolutional Neural Networks With Coarse Pruning.100.542016
Comparing Oversampling Techniques to Handle the Class Imbalance Problem: A Customer Churn Prediction Case Study.30.382016
Structured Pruning of Deep Convolutional Neural Networks822.792015
A Prudent Based Approach for Customer Churn Prediction.40.392015
A Comparison of Two Oversampling Techniques (SMOTE vs MTDF) for Handling Class Imbalance Problem: A Case Study of Customer Churn Prediction30.402015
Site selection for food distribution using rough set approach and TOPSIS method30.372015
Posted price selling and online auctions.00.342015
Fixed Point Optimization Of Deep Convolutional Neural Networks For Object Recognition383.212015
Customer Churn Prediction in Telecommunication Industry: With and without Counter-Example70.712014
Behavioral Attestation for Web Services using access policies00.342013
Semantic Based Ontology Driven Feature Interaction Detection & Modeling.00.342013
Project scheduling conflict identification and resolution using genetic algorithms (GA)00.342012
Automated GUI Test Coverage Analysis Using GA50.512010
Evolutionary Based Automated Coverage Analysis For Gui Testing30.452010
Maximizing GUI Test Coverage Through Particle Swarm Optimization00.342010