Follow
Mohd Haroon
Title
Cited by
Cited by
Year
An unsupervised deep learning ensemble model for anomaly detection in static attributed social networks
W Khan, M Haroon
International Journal of Cognitive Computing in Engineering 3, 153-160, 2022
342022
Web document information extraction using class attribute approach DOI:10.1109/ICCCT.2013.6749596; Corpus ID: 10358647
S Srivastava, M Haroon, A Bajaj
2013 4th International Conference on Computer and Communication Technology …, 2013
272013
Research on significant factors affecting adoption of blockchain technology for enterprise distributed applications based on integrated MCDM FCEM-MULTIMOORA-FG method
ZA Siddiqui, M Haroon
Engineering Applications of Artificial Intelligence 118, 105699, 2023
252023
An efficient framework for anomaly detection in attributed social networks
W Khan, M Haroon
International Journal of information technology 14 (6), 3069-3076, 2022
252022
Fournier gangrene: pictorial review
S Wongwaisayawan, S Krishna, M Haroon, Y Nisha, A Sheikh
Abdominal Radiology 45, 3838-3848, 2020
242020
Different technique of load balancing in distributed system: A review paper
R Khan, M Haroon, MS Husain
2015 Global Conference on Communication Technologies (GCCT), 371-375, 2015
192015
An exhaustive review on state-of-the-art techniques for anomaly detection on attributed networks
W Khan
Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12 (10 …, 2021
182021
An enriched information security framework from various attacks in the IoT
MS Husain, DM Haroon
International Journal of Innovative Research in Computer Science …, 2020
172020
Interest attentive dynamic load balancing in distributed systems
M Haroon, M Husain
2015 2nd International Conference on Computing for Sustainable Global …, 2015
172015
Analysis of a dynamic load balancing in multiprocessor system
M Haroon, M Husain
International Journal of Computer Science engineering and Information …, 2013
142013
A Review of Information Security from Consumer’s Perspective Especially in Online Transactions
MS Husain
International Journal of Engineering and Management Research 10 (https://doi …, 2020
132020
DVAEGMM: Dual variational autoencoder with gaussian mixture model for anomaly detection on attributed networks
W Khan, M Haroon, AN Khan, MK Hasan, A Khan, UA Mokhtar, S Islam
IEEE Access 10, 91160-91176, 2022
122022
A comparative study of trends in security in cloud computing
AM Khan, S Ahmad, M Haroon
2015 Fifth International Conference on Communication Systems and Network …, 2015
112015
Application of artificial intelligence and machine learning in blockchain technology
ZA Siddiqui, M Haroon
Artificial Intelligence and Machine Learning for EDGE Computing, 169-185, 2022
102022
Utility of quantitative T2‐mapping compared to conventional and advanced diffusion weighted imaging techniques for multiparametric prostate MRI in men with hip prosthesis
P Sathiadoss, N Schieda, M Haroon, H Osman, S Alrasheed, TA Flood, ...
Journal of magnetic resonance imaging 55 (1), 265-274, 2022
102022
Fully automated detection of prostate transition zone tumors on T2‐weighted and apparent diffusion coefficient (ADC) map MR images using U‐Net ensemble
T Wong, N Schieda, P Sathiadoss, M Haroon, J Abreu‐Gomez, E Ukwatta
Medical Physics 48 (11), 6889-6900, 2021
102021
Security in digital healthcare system
MM Tripathi, M Haroon, Z Khan, MS Husain
Pervasive Healthcare: A Compendium of Critical Factors for Success, 217-231, 2022
92022
Application of machine learning in forensic science
M Haroon, MM Tripathi, F Ahmad
Critical Concepts, Standards, and Techniques in Cyber Forensics, 228-239, 2020
92020
Epidemiological study of tuberculosis
T Ahmad, S Ahmad, MZ Haroon, A Khan, S Salman, N Khan, F Gul
Eur. Acad. Res 1 (8), 1854-1860, 2013
92013
Comparative study of various crowd detection and classification methods for safety control system
N Khan, M Haroon
Available at SSRN 4146666, 2022
82022
The system can't perform the operation now. Try again later.
Articles 1–20