An innovative approach to investigate various software testing techniques and strategies SR Jan, STU Shah, ZU Johar, Y Shah, F Khan Int. J. Sci. Res. Sci. Eng. Technol 2 (2), 682-689, 2016 | 189 | 2016 |
Cloud-assisted IoT-based smart respiratory monitoring system for asthma patients STU Shah, F Badshah, F Dad, N Amin, MA Jan Applications of intelligent technologies in healthcare, 77-86, 2019 | 59 | 2019 |
Internet of things-based healthcare: recent advances and challenges STU Shah, H Yar, I Khan, M Ikram, H Khan Applications of Intelligent Technologies in Healthcare, 153-162, 2019 | 32 | 2019 |
A secure ensemble learning-based fog-cloud approach for cyberattack detection in IoMT F Khan, MA Jan, R Alturki, MD Alshehri, ST Shah, A ur Rehman IEEE Transactions on Industrial Informatics, 2023 | 30 | 2023 |
Optimal path selection using dijkstra’s algorithm in cluster-based LEACH protocol F Dad, N Amin, F Badshah, ZU Rahman, STU Shah, I Rahman Journal of Applied Environmental and Biological Sciences 7 (2), 194-198, 2017 | 20 | 2017 |
Trustworthy and reliable deep-learning-based cyberattack detection in industrial iot F Khan, R Alturki, MA Rahman, S Mastorakis, I Razzak, ST Shah IEEE transactions on industrial informatics 19 (1), 1030-1038, 2022 | 17 | 2022 |
DDFL: a deep dual function learning-based model for recommender systems STU Shah, J Li, Z Guo, G Li, Q Zhou International Conference on Database Systems for Advanced Applications, 590-606, 2020 | 16 | 2020 |
Communication between multiple processes on same device using TCP/IP suite F Badshah, STU Shah, SR Jan, IU Rahman 2017 International Conference on Communication, Computing and Digital …, 2017 | 12 | 2017 |
Khan. F.," SR Jan, STU Shah, ZU Johar, Y Shah An Innovative Approach to Investigate Various Software Testing Techniques …, 0 | 6 | |
Explainable Detection of Fake News on Social Media Using Pyramidal Co-Attention Network F Khan, R Alturki, G Srivastava, F Gazzawe, STU Shah, S Mastorakis IEEE Transactions on Computational Social Systems, 2022 | 2 | 2022 |