default search action
Javed Ali Khan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j31]Nek Dil Khan, Javed Ali Khan, Jianqiang Li, Tahir Ullah, Qing Zhao:
Leveraging Large Language Model ChatGPT for enhanced understanding of end-user emotions in social media feedbacks. Expert Syst. Appl. 261: 125524 (2025) - 2024
- [j30]Arun Asif, Faheem Ahmed, Zeeshan, Javed Ali Khan, Eman Allogmani, Nora El-Rashidy, Sobia Manzoor, Muhammad Shahid Anwar:
Machine Learning Based Diagnostic Paradigm in Viral and Non-Viral Hepatocellular Carcinoma. IEEE Access 12: 37557-37571 (2024) - [j29]Nek Dil Khan, Javed Ali Khan, Jianqiang Li, Tahir Ullah, Ayed Alwadain, Affan Yasin, Qing Zhao:
How Do Crowd-Users Express Their Opinions Against Software Applications in Social Media? A Fine-Grained Classification Approach. IEEE Access 12: 98004-98028 (2024) - [j28]Muhammad Azeem Akbar, Arif Ali Khan, Sami Hyrynsalmi, Javed Ali Khan:
6G secure quantum communication: a success probability prediction model. Autom. Softw. Eng. 31(1): 31 (2024) - [j27]Eman Fatima, Hira Kanwal, Javed Ali Khan, Nek Dil Khan:
An exploratory and automated study of sarcasm detection and classification in app stores using fine-tuned deep learning classifiers. Autom. Softw. Eng. 31(2): 69 (2024) - [j26]Javed Ali Khan, Tahir Ullah, Arif Ali Khan, Affan Yasin, Muhammad Azeem Akbar, Khursheed Aurangzeb:
Can end-user feedback in social media be trusted for software evolution: Exploring and analyzing fake reviews. Concurr. Comput. Pract. Exp. 36(10) (2024) - [j25]Arif Ali Khan, Javed Ali Khan, Muhammad Azeem Akbar, Peng Zhou, Mahdi Fahmideh:
Insights into software development approaches: mining Q &A repositories. Empir. Softw. Eng. 29(1): 8 (2024) - [j24]Naeem Ullah, Muhammad Hassan, Javed Ali Khan, Muhammad Shahid Anwar, Khursheed Aurangzeb:
Enhancing explainability in brain tumor detection: A novel DeepEBTDNet model with LIME on MRI images. Int. J. Imaging Syst. Technol. 34(1) (2024) - [j23]Zohaib Ahmad Khan, Yuanqing Xia, Khursheed Aurangzeb, Fiza Khaliq, Mahmood Alam, Javed Ali Khan, Muhammad Shahid Anwar:
Emotion detection from handwriting and drawing samples using an attention-based transformer model. PeerJ Comput. Sci. 10: e1887 (2024) - [j22]Asif Ali, Yuanqing Xia, Qamar Navid, Zohaib Ahmad Khan, Javed Ali Khan, Eman Abdullah Aldakheel, Doaa Sami Khafaga:
Mobile-UI-Repair: a deep learning based UI smell detection technique for mobile user interface. PeerJ Comput. Sci. 10: e2028 (2024) - [j21]Nek Dil Khan, Javed Ali Khan, Jianqiang Li, Tahir Ullah, Qing Zhao:
Mining software insights: uncovering the frequently occurring issues in low-rating software applications. PeerJ Comput. Sci. 10: e2115 (2024) - [j20]Hafsa Shareef Dar, Romana Aziz, Javed Ali Khan, Muhammad Ikram Ullah Lali, Nouf Abdullah Almujally:
Gamify4LexAmb: a gamification-based approach to address lexical ambiguity in natural language requirements. PeerJ Comput. Sci. 10: e2229 (2024) - [j19]Affan Yasin, Rubia Fatima, Javed Ali Khan, Lin Liu, Raian Ali, Jianmin Wang:
Counteracting sociocultural barriers in global software engineering using group activities. J. Softw. Evol. Process. 36(5) (2024) - [j18]Affan Yasin, Rubia Fatima, Jiangbin Zheng, Javed Ali Khan, Arif Ali Khan:
Gamifying requirements: An empirical analysis of game-based technique for novices. J. Softw. Evol. Process. 36(6) (2024) - [c6]Naeem Ullah, Javed Ali Khan, Ivanoe De Falco, Giovanna Sannino:
Bridging Clinical Gaps: Multi-Dataset Integration for Reliable Multi-Class Lung Disease Classification with DeepCRINet and Occlusion Sensitivity. ISCC 2024: 1-6 - 2023
- [j17]Zohaib Ahmad Khan, Yuanqing Xia, Shahzad Ali, Javed Ali Khan, Sameh S. Askar, Mohamed Abouhawwash, Nora El-Rashidy:
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evolution Model Based on Distributed Representations. IEEE Access 11: 98787-98804 (2023) - [j16]Hasna Arshad, Saima Shaheen, Javed Ali Khan, Muhammad Shahid Anwar, Khursheed Aurangzeb, Musaed A. Alhussein:
A novel hybrid requirement's prioritization approach based on critical software project factors. Cogn. Technol. Work. 25(2-3): 305-324 (2023) - [j15]Affan Yasin, Sheikh Badar ud din Tahir, Jaroslav Frnda, Rubia Fatima, Javed Ali Khan, Muhammad Shahid Anwar:
Anomaly Prediction over Human Crowded Scenes via Associate-Based Data Mining and K-Ary Tree Hashing. Int. J. Intell. Syst. 2023: 1-12 (2023) - [i2]Arif Ali Khan, Javed Ali Khan, Muhammad Azeem Akbar, Peng Zhou, Mahdi Fahmideh:
Insights into Software Development Approaches: Mining Q&A Repositories. CoRR abs/2305.01315 (2023) - 2022
- [j14]Fahim Muhammad Khan, Javed Ali Khan, Muhammad Assam, Ahmed S. Almasoud, Abdelzahir Abdelmaboud, Manar Ahmed Mohammed Hamza:
A Comparative Systematic Analysis of Stakeholder's Identification Methods in Requirements Elicitation. IEEE Access 10: 30982-31011 (2022) - [j13]Naeem Ullah, Javed Ali Khan, Lubna Alharbi, Asaf Raza, Wahab Khan, Ijaz Ahmad:
An Efficient Approach for Crops Pests Recognition and Classification Based on Novel DeepPestNet Deep Learning Model. IEEE Access 10: 73019-73032 (2022) - [j12]M. Irfan Marwat, Javed Ali Khan, Mohammad Dahman Alshehri, Muhammad Asghar Ali, Hizbullah, Haider Ali, Muhammad Assam:
Sentiment Analysis of Product Reviews to Identify Deceptive Rating Information in Social Media: A SentiDeceptive Approach. KSII Trans. Internet Inf. Syst. 16(3): 830-860 (2022) - [j11]Abdul Jabbar, Xi Li, Muhammad Assam, Javed Ali Khan, Marwa Ismael Obayya, Mimouna Abdullah Alkhonaini, Fahd N. Al-Wesabi, Muhammad Assad:
AFD-StackGAN: Automatic Mask Generation Network for Face De-Occlusion Using StackGAN. Sensors 22(5): 1747 (2022) - [j10]Sheikh Badar ud din Tahir, Abdul Basit Dogar, Rubia Fatima, Affan Yasin, Muhammad Shafiq, Javed Ali Khan, Muhammad Assam, Abdullah Mohamed, El-Awady Attia:
Stochastic Recognition of Human Physical Activities via Augmented Feature Descriptors and Random Forest Model. Sensors 22(17): 6632 (2022) - [j9]Naeem Ullah, Muhammad Sohail Khan, Javed Ali Khan, Ahyoung Choi, Muhammad Shahid Anwar:
A Robust End-to-End Deep Learning-Based Approach for Effective and Reliable BTD Using MR Images. Sensors 22(19): 7575 (2022) - [j8]Affan Yasin, Rubia Fatima, Lin Liu, Javed Ali Khan, Raian Ali, Jianmin Wang:
On the utilization of non-quality assessed literature in software engineering research. J. Softw. Evol. Process. 34(7) (2022) - [j7]Javed Ali Khan, Affan Yasin, Rubia Fatima, Danish Vasan, Arif Ali Khan, Abdul Wahid Khan:
Valuating requirements arguments in the online user's forum for requirements decision-making: The CrowdRE-VArg framework. Softw. Pract. Exp. 52(12): 2537-2573 (2022) - 2021
- [j6]Abudul Wahid Khan, Maseeh Ullah Khan, Javed Ali Khan, Arshad Ahmad, Khalil Khan, Muhammad Zamir, Wonjoon Kim, Muhammad Fazal Ijaz:
Analyzing and Evaluating Critical Challenges and Practices for Software Vendor Organizations to Secure Big Data on Cloud Computing: An AHP-Based Systematic Approach. IEEE Access 9: 107309-107332 (2021) - [j5]Abdul Wahid Khan, Maseeh Ullah Khan, Javed Ali Khan, Javed Khan, Wresham Gul:
Identification and prioritization of security challenges of big data on cloud computing based on SLR: A fuzzy-TOPSIS analysis approach. J. Softw. Evol. Process. 33(12) (2021) - [c5]Oliver Karras, Eduard C. Groen, Javed Ali Khan, Sören Auer:
Researcher or Crowd Member? Why not both! The Open Research Knowledge Graph for Applying and Communicating CrowdRE Research. RE Workshops 2021: 320-327 - [i1]Oliver Karras, Eduard C. Groen, Javed Ali Khan, Sören Auer:
Researcher or Crowd Member? Why not both! The Open Research Knowledge Graph for Applying and Communicating CrowdRE Research. CoRR abs/2108.05085 (2021) - 2020
- [j4]Javed Ali Khan, Lin Liu, Lijie Wen:
Requirements knowledge acquisition from online user forums. IET Softw. 14(3): 242-253 (2020) - [j3]Javed Ali Khan, Lin Liu, Lijie Wen, Raian Ali:
Conceptualising, extracting and analysing requirements arguments in users' forums: The CrowdRE-Arg framework. J. Softw. Evol. Process. 32(12) (2020)
2010 – 2019
- 2019
- [j2]Liaqat Ali, Atiqur Rahman, Aurangzeb Khan, Mingyi Zhou, Ashir Javeed, Javed Ali Khan:
An Automated Diagnostic System for Heart Disease Prediction Based on χ2 Statistical Model and Optimally Configured Deep Neural Network. IEEE Access 7: 34938-34945 (2019) - [j1]Liaqat Ali, Awais Niamat, Javed Ali Khan, Noorbakhsh Amiri Golilarz, Xiong Xingzhong, Adeeb Noor, Redhwan Nour, Syed Ahmad Chan Bukhari:
An Optimized Stacked Support Vector Machines Based Expert System for the Effective Prediction of Heart Failure. IEEE Access 7: 54007-54014 (2019) - [c4]Javed Ali Khan, Yuchen Xie, Lin Liu, Lijie Wen:
Analysis of Requirements-Related Arguments in User Forums. RE 2019: 63-74 - [c3]Javed Ali Khan:
Mining Requirements Arguments from user Forums. RE 2019: 440-445 - [c2]Javed Ali Khan, Lin Liu, Lijie Wen, Raian Ali:
Crowd Intelligence in Requirements Engineering: Current Status and Future Directions. REFSQ 2019: 245-261 - 2018
- [c1]Javed Ali Khan, Lin Liu, Yidi Jia, Lijie Wen:
Linguistic Analysis of Crowd Requirements: An Experimental Study. EmpiRE@RE 2018: 24-31
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint