Follow
Dr. Ali Arshad
Dr. Ali Arshad
NASTP Institute of Information Technology, Lahore
Verified email at niit.edu.pk
Title
Cited by
Cited by
Year
A comparison of pooling methods for convolutional neural networks
A Zafar, M Aamir, N Mohd Nawi, A Arshad, S Riaz, A Alruban, AK Dutta, ...
Applied Sciences 12 (17), 8643, 2022
1022022
Semi-supervised deep fuzzy C-mean clustering for imbalanced multi-class classification
A Arshad, S Riaz, L Jiao
IEEE Access 7, 28100-28112, 2019
472019
Semi-supervised deep fuzzy c-mean clustering for software fault prediction
A Arshad, S Riaz, L Jiao, A Murthy
IEEE Access 6, 25675-25685, 2018
422018
Intercept the cloud network from brute force and DDoS attacks via intrusion detection and prevention system
M Nadeem, A Arshad, S Riaz, SS Band, A Mosavi
IEEE Access 9, 152300-152309, 2021
372021
Rough noise-filtered easy ensemble for software fault prediction
S Riaz, A Arshad, L Jiao
Ieee Access 6, 46886-46899, 2018
192018
A semi-supervised CNN with fuzzy rough C-mean for image classification
S Riaz, A Arshad, L Jiao
IEEE Access 7, 49641-49652, 2019
182019
The empirical study of semi-supervised deep fuzzy c-mean clustering for software fault prediction
A Arshad, S Riaz, L Jiao, A Murthy
IEEE Access 6, 47047-47061, 2018
152018
Fuzzy rough C-mean based unsupervised CNN clustering for large-scale image data
S Riaz, A Arshad, L Jiao
Applied Sciences 8 (10), 1869, 2018
132018
A semi-supervised deep fuzzy C-mean clustering for two classes classification
A Arshad, S Riaz, L Jiao, A Murthy
2017 IEEE 3rd Information Technology and Mechatronics Engineering Conference …, 2017
112017
Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks
SSBAM Muhammad Nadeem, Ali Arshad, Saman Riaz, Syeda Wajiha Zahra
Computers, Materials and Continua 74 (2), 2625-2640, 2022
7*2022
‘Rough-KNN noise-filtered convolutional neural network for image classification
S Riaz, A Arshad, L Jiao
Proc. 3rd Int. Conf. Inf. Technol. Intell. Transp. Syst.(ITITS) 314, 265-275, 2019
72019
A Survey on Software Cost Estimation in the Pakistani Software Industry
A Arshad
IJCER, International Journal of Computer and Electronics Research 3, 13-19, 2014
72014
An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms
MAMSA Muhammad Nadeem, Ali Arshad, Saman Riaz, Syeda Wajiha Zahra, Ashit ...
Computers, Materials and Continua 74 (2), 4059-4079, 2022
6*2022
Preventing the Cloud Networks through Semi-Supervised Clustering from Both Sides Attacks
AKDSA Muhammad Nadeem, Ali Arshad, Saman Riaz, Syeda Wajiha Zahra
Applied Sciences 12 (15), 1-19, 2022
6*2022
Transforming Hand Drawn Wireframes into Front-End Code with Deep Learning
AM Saman Riaz, Ali Arshad, Shahab S. Band
CMC-Computers, Materials & Continua 72 (No.3), 4303-4321, 2022
6*2022
Security at software architecture level: a systematic mapping study
A Arshad, M Usman
15th Annual Conference on Evaluation & Assessment in Software Engineering …, 2011
62011
Two-Layer Security Algorithms to Prevent Attacks on Data in Cyberspace
M Nadeem, A Arshad, S Riaz, SW Zahra, AK Dutta, A Alruban, B Almutairi, ...
Applied Sciences 12 (19), 9736, 2022
42022
A secure architecture to protect the network from replay attacks during client-to-client data transmission
M Nadeem, A Arshad, S Riaz, SW Zahra, AK Dutta, S Almotairi
Applied Sciences 12 (16), 8143, 2022
42022
A Critical Review of Software Size and Effort Estimation
A Arshad
IJCER, International Journal of Computer and Electronics Research 3, 96-99, 2014
4*2014
An efficient hybrid approach for optimization using simulated annealing and grasshopper algorithm for IoT applications
F Sajjad, M Rashid, A Zafar, K Zafar, B Fida, A Arshad, S Riaz, AK Dutta, ...
Discover Internet of Things 3 (1), 7, 2023
32023
The system can't perform the operation now. Try again later.
Articles 1–20