default search action
Yasir Malik
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j2]K. Suresh Kumar, A. S. Radhamani, T. Ananth Kumar, Ahmad Jalili, Mehdi Gheisari, Yasir Malik, Hsing-Chung Chen, Ata Jahangir Moshayedi:
Sentiment Analysis of Short Texts Using SVMs and VSMs-Based Multiclass Semantic Classification. Appl. Artif. Intell. 38(1) (2024) - [j1]Omer Nguena Timo, Tianqi Xiao, Florent Avellaneda, Yasir Malik, Stefan D. Bruda:
Evaluating trustworthiness of decision tree learning algorithms based on equivalence checking. AI Ethics 4(1): 37-46 (2024) - 2020
- [i4]Tianqi Xiao, Omer Nguena Timo, Florent Avellaneda, Yasir Malik, Stefan D. Bruda:
An Approach to Evaluating Learning Algorithms for Decision Trees. CoRR abs/2010.13665 (2020)
2010 – 2019
- 2019
- [c20]Naiji Zhang, Fehmi Jaafar, Yasir Malik:
Low-Rate DoS Attack Detection Using PSD Based Entropy and Machine Learning. CSCloud/EdgeCom 2019: 59-62 - [c19]Yuyi Liu, Pavol Zavarsky, Yasir Malik:
Non-linguistic Features for Cyberbullying Detection on a Social Media Platform Using Machine Learning. CSS (1) 2019: 391-406 - [c18]Godwin Raju, Pavol Zavarsky, Adetokunbo Makanju, Yasir Malik:
Vulnerability assessment of machine learning based malware classification models. GECCO (Companion) 2019: 1615-1618 - [c17]Yasir Malik, Carlos Renato Salim Campos, Fehmi Jaafar:
Detecting Android Security Vulnerabilities Using Machine Learning and System Calls Analysis. QRS Companion 2019: 109-113 - 2018
- [c16]Shikhar Bhatnagar, Yasir Malik, Sergey Butakov:
Analysing Data Security Requirements of Android Mobile Banking Application. ISDDC 2018: 30-37 - [c15]Caesar Jude Clemente, Fehmi Jaafar, Yasir Malik:
Is Predicting Software Security Bugs Using Deep Learning Better Than the Traditional Machine Learning Algorithms? QRS 2018: 95-102 - [c14]Gurpreet Kaur, Yasir Malik, Hamman Samuel, Fehmi Jaafar:
Detecting Blind Cross-Site Scripting Attacks Using Machine Learning. SPML 2018: 22-25 - [c13]Damilola Murtala, Yasir Malik, Pavol Zavarsky:
Simulating link aggregation in private virtual lan using openflow for cloud environment. SpringSim (CNS) 2018: 11:1-11:7 - [c12]Hajredin Daku, Pavol Zavarsky, Yasir Malik:
Behavioral-Based Classification and Identification of Ransomware Variants Using Machine Learning. TrustCom/BigDataSE 2018: 1560-1564 - [e1]Issa Traoré, Isaac Woungang, Sherif Saad Ahmed, Yasir Malik:
Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments - Second International Conference, ISDDC 2018, Vancouver, BC, Canada, November 28-30, 2018, Proceedings. Lecture Notes in Computer Science 11317, Springer 2018, ISBN 978-3-030-03711-6 [contents] - 2016
- [c11]Munaza Razzaq, Mehmoona Gul, Zunaib Ali, Qurat-ul Ain, Yasir Malik:
An Advanced DSP Algorithm for Music-Less Audio Stream Generation. FIT 2016: 303-308 - 2015
- [i3]Yasir Malik:
Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors. CoRR abs/1502.01872 (2015) - 2013
- [c10]Yasir Malik, Stefan D. Bruda, Bessam Abdulrazak, Usman Tariq:
Reliable communication protocol for inter-vehicular network. ICDIM 2013: 170-174 - [c9]Bessam Abdulrazak, Yasir Malik, Farah Arab, Susan E. Reid:
PhonAge: Adapted SmartPhone for Aging Population. ICOST 2013: 27-35 - [c8]Yasir Malik, Bessam Abdulrazak:
Formal Modeling and Analysis of Context-Aware Medication Management System for Smart Houses. ICOST 2013: 218-223 - [c7]Farah Arab, Yasir Malik, Bessam Abdulrazak:
Evaluation of PhonAge: An Adapted Smartphone Interface for Elderly People. INTERACT (4) 2013: 547-554 - 2012
- [c6]Farzad Salehi, Stefan D. Bruda, Yasir Malik, Bessam Abdulrazak:
A Distributed Architecture for Remote Service Discovery in Pervasive Computing. ICSOFT 2012: 399-408 - [c5]Yasir Malik, Bessam Abdulrazak:
Towards Verifying Service Interoperability Requirements for Pervasive Computing Environments. PECCS 2012: 220-223 - [c4]Stefan D. Bruda, Farzad Salehi, Yasir Malik, Bessam Abdulrazak:
A Peer-to-Peer Architecture for Remote Service Discovery. ANT/MobiWIS 2012: 976-983 - [c3]Usman Tariq, Yasir Malik, Bessam Abdulrazak:
Defense and Monitoring Model for Distributed Denial of Service Attacks. ANT/MobiWIS 2012: 1052-1056 - [i2]Yasir Malik, Kishwer Abdul Khaliq, Bessam Abdulrazak, Usman Tariq:
Mobile node localization in cellular networks. CoRR abs/1201.2102 (2012) - 2011
- [c2]Usman Tariq, Yasir Malik, Bessam Abdulrazak, Manpyo Hong:
Collaborative Peer to Peer Defense Mechanism for DDoS Attacks. ANT/MobiWIS 2011: 157-164 - [i1]Usman Tariq, Yasir Malik, Manpyo Hong:
NACS: non-overlapping AP's caching scheme to reduce handoff in 802.11 wireless LAN. CoRR abs/1112.4775 (2011) - 2010
- [c1]Bessam Abdulrazak, Yasir Malik, Hen-I Yang:
A Taxonomy Driven Approach towards Evaluating Pervasive Computing System. ICOST 2010: 32-42
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint