default search action
Muhammad Usman Ashraf
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Muhammad Usman Ashraf, Khalid Ali Almarhabi:
An Advanced Dummy Position-Based Privacy Provisioning Framework for TTP-Based LBS System. IEEE Access 12: 23252-23264 (2024) - [j22]Sajida Perveen, Abdullah Alourani, Muhammad Shahbaz, Muhammad Usman Ashraf, Isma Hamid:
A Framework for Early Detection of Acute Lymphoblastic Leukemia and Its Subtypes From Peripheral Blood Smear Images Using Deep Ensemble Learning Technique. IEEE Access 12: 29252-29268 (2024) - 2023
- [j21]Gohar Mumtaz, Sheeraz Akram, Muhammad Waseem Iqbal, Muhammad Usman Ashraf, Khalid Ali Almarhabi, Ahmed Mohammed Alghamdi, Adel A. Bahaddad:
Classification and Prediction of Significant Cyber Incidents (SCI) Using Data Mining and Machine Learning (DM-ML). IEEE Access 11: 94486-94496 (2023) - [j20]Imran Khan, Anwar Ghani, Syed Muhammd Saqlain, Muhammad Usman Ashraf, Abdulrahman Alzahrani, DoHyeun Kim:
Secure Medical Data Against Unauthorized Access Using Decoy Technology in Distributed Edge Computing Networks. IEEE Access 11: 144560-144573 (2023) - [j19]Muhammad Akram, Muhammad Waseem Iqbal, Muhammad Usman Ashraf, Erssa Arif, Khalid Alsubhi, Hani Moaiteq Aljahdali:
Optimization of Interactive Videos Empowered the Experience of Learning Management System. Comput. Syst. Sci. Eng. 46(1): 1021-1038 (2023) - 2022
- [j18]Mamoona Mumtaz, Naveed Ahmad, Muhammad Usman Ashraf, Ahmed Alshaflut, Abdullah Alourani, Hafiz Junaid Anjum:
Modeling Iteration's Perspectives in Software Engineering. IEEE Access 10: 19333-19347 (2022) - [j17]Hina Tufail, Muhammad Usman Ashraf, Khalid Alsubhi, Hani Moaiteq Aljahdali:
The Effect of Fake Reviews on e-Commerce During and After Covid-19 Pandemic: SKL-Based Fake Reviews Detection. IEEE Access 10: 25555-25564 (2022) - [j16]Madiha Bukhsh, Muhammad Saqib Ali, Muhammad Usman Ashraf, Khalid Alsubhi, Weiqiu Chen:
An Interpretation of Long Short-Term Memory Recurrent Neural Network for Approximating Roots of Polynomials. IEEE Access 10: 28194-28205 (2022) - [j15]Mamoona Mumtaz, Naveed Ahmad, Muhammad Usman Ashraf, Ahmed Mohammed Alghamdi, Adel A. Bahaddad, Khalid Ali Almarhabi:
Iteration Causes, Impact, and Timing in Software Development Lifecycle: An SLR. IEEE Access 10: 65355-65375 (2022) - [j14]Ijaz Khalid, Tariq Shah, Khalid Ali Almarhabi, Dawood Shah, Muhammad Asif, Muhammad Usman Ashraf:
The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field. IEEE Access 10: 127939-127955 (2022) - 2021
- [j13]Irum Hirra, Mubashir Ahmad, Ayaz Hussain, Muhammad Usman Ashraf, Iftikhar Ahmed Saeed, Syed Furqan Qadri, Ahmed Mohammed Alghamdi, Ahmed S. Alfakeeh:
Breast Cancer Classification From Histopathological Images Using Patch-Based Deep Learning Modeling. IEEE Access 9: 24273-24287 (2021) - [j12]Saqib Fayyaz, Muhammad Kashif Sattar, Muhammad Waseem, Muhammad Usman Ashraf, Aftab Ahmad, Hafiz Ashiq Hussain, Khalid Alsubhi:
Solution of Combined Economic Emission Dispatch Problem Using Improved and Chaotic Population-Based Polar Bear Optimization Algorithm. IEEE Access 9: 56152-56167 (2021) - [j11]Muhammad Asif, Sibgha Mairaj, Zafar Saeed, Muhammad Usman Ashraf, Kamal Mansur Jambi, Rana Muhammad Zulqarnain:
A Novel Image Encryption Technique Based on Mobius Transformation. Comput. Intell. Neurosci. 2021: 1912859:1-1912859:14 (2021) - [j10]Khlood Shinan, Khalid Alsubhi, Ahmed Alzahrani, Muhammad Usman Ashraf:
Machine Learning-Based Botnet Detection in Software-Defined Network: A Systematic Review. Symmetry 13(5): 866 (2021) - 2020
- [j9]Khalid Alsubhi, Muhammad Usman Ashraf, Iqra Ilyas:
HBLP: A Privacy Protection Framework for TIP Attributes in NTTP-Based LBS Systems. IEEE Access 8: 67718-67734 (2020) - [j8]Saman Tariq, Naveed Ahmad, Muhammad Usman Ashraf, Ahmed Mohammed Alghamdi, Ahmed S. Alfakeeh:
Measuring the Impact of Scope Changes on Project Plan Using EVM. IEEE Access 8: 154589-154613 (2020) - [j7]Muhammad Usman Ashraf, Fathy Alboraei Eassa, Aiiad Ahmad Albeshri, Abdullah M. Algarni:
Empirical investigation: performance and power-consumption based dual-level model for exascale computing systems. IET Softw. 14(4): 319-327 (2020) - [j6]Khalid Alsubhi, Zuhaib Imtiaz, Ayesha Raana, Muhammad Usman Ashraf, Babur Hayat:
MEACC: an energy-efficient framework for smart devices using cloud computing systems. Frontiers Inf. Technol. Electron. Eng. 21(6): 917-930 (2020)
2010 – 2019
- 2019
- [j5]Syed Muhammad Saqlain Shah, Muhammad Sher, Faiz Ali Shah, Imran Khan, Muhammad Usman Ashraf, Muhammad Awais, Anwar Ghani:
Fisher score and Matthews correlation coefficient-based feature subset selection for heart disease diagnosis using support vector machines. Knowl. Inf. Syst. 58(1): 139-167 (2019) - [c2]Khalid Alsubhi, Fawaz Alsolami, Abdullah M. Algarni, E. Albassam, Maher Khemakhem, Fathy Alburaei Eassa, Kamal Mansur Jambi, Muhammad Usman Ashraf:
A Tool for Translating Sequential Source Code to Parallel Code Written in C++ and OpenACC. AICCSA 2019: 1-8 - 2018
- [j4]Muhammad Usman Ashraf, Fathy Alburaei Eassa, Aiiad Ahmad Albeshri, Abdullah M. Algarni:
Performance and Power Efficient Massive Parallel Computational Model for HPC Heterogeneous Exascale Systems. IEEE Access 6: 23095-23107 (2018) - 2017
- [j3]Azeem Irshad, Muhammad Sher, Muhammad Usman Ashraf, Bander A. Alzahrani, Fan Wu, Qi Xie, Saru Kumari:
An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo's Scheme. Wirel. Pers. Commun. 95(3): 3185-3208 (2017) - 2016
- [j2]Imran Khan, Muhammad Sher, Javed I. Khan, Syed Muhammd Saqlain, Anwar Ghani, Syed Husnain Abbas Naqvi, Muhammad Usman Ashraf:
Conversion of Legal Text to a Logical Rules Set from Medical Law Using the Medical Relational Model and the World Rule Model for a Medical Decision Support System. Informatics 3(1): 2 (2016) - [j1]Shehzad Ashraf Chaudhry, Imran Khan, Azeem Irshad, Muhammad Usman Ashraf, Muhammad Khurram Khan, Hafiz Farooq Ahmad:
A provably secure anonymous authentication scheme for Session Initiation Protocol. Secur. Commun. Networks 9(18): 5016-5027 (2016) - 2013
- [c1]Muhammad Usman Ashraf, Naveed Ahmed Khan:
Software Engineering Challenges for Ubiquitous Computing in Various Applications. FIT 2013: 78-82
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint