Associate Professor, Neijiang Normal University
Verified email at njtc.edu.cn - Homepage
Cited by
Cited by
Cyber security threats detection in internet of things using deep learning approach
F Ullah, H Naeem, S Jabbar, S Khalid, MA Latif, F Al-Turjman, L Mostarda
IEEE Access 7, 124379-124389, 2019
IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture
D Vasan, M Alazab, S Wassan, H Naeem, B Safaei, Q Zheng
Computer Networks 171, 107138, 2020
USPF: underwater shrewd packet flooding mechanism through surrogate holding time
S Ashraf, M Gao, Z Mingchen, T Ahmed, A Raza, H Naeem
Wireless Communications and Mobile Computing 2020, 2020
Underwater resurrection routing synergy using astucious energy pods
S Ashraf, A Raza, Z Aslam, H Naeem, T Ahmed
Journal of Robotics and Control (JRC) 1 (5), 173-184, 2020
Design of shrewd underwater routing synergy using porous energy shells
S Ashraf, T Ahmed, A Raza, H Naeem
Smart Cities 3 (1), 74-92, 2020
Identification of malicious code variants based on image visualization
H Naeem, B Guo, MR Naeem, F Ullah, H Aldabbas, MS Javed
Computers & Electrical Engineering 76, 225-237, 2019
Malware detection in industrial internet of things based on hybrid image visualization and deep learning model
H Naeem, F Ullah, MR Naeem, S Khalid, D Vasan, S Jabbar, S Saeed
Ad Hoc Networks 105, 102154, 2020
A light-weight malware static visual analysis for IoT infrastructure
H Naeem, B Guo, MR Naeem
2018 International Conference on Artificial Intelligence and Big Data …, 2018
A framework for automatic building detection from low-contrast satellite images
M Aamir, YF Pu, Z Rahman, M Tahir, H Naeem, Q Dai
Symmetry 11 (1), 3, 2019
A new approach for image detection based on refined Bag of Words algorithm
H Naeem, G Bing, MR Naeem, M Aamir, MS Javed
Optik 140, 823-832, 2017
A Cross-Platform Malware Variant Classification based on Image Representation.
H Naeem, B Guo, F Ullah, MR Naeem
KSII Transactions on Internet & Information Systems 13 (7), 2019
A Hybrid Proposed Framework for Object Detection and Classification.
M Aamir, YF Pu, Z Rahman, WA Abro, H Naeem, F Ullah, AM Badr
Journal of Information Processing Systems 14 (5), 2018
Detection of clone scammers in Android markets using IoT‐based edge computing
F Ullah, H Naeem, MR Naeem, S Jabbar, S Khalid, F Al‐Turjman, ...
Transactions on Emerging Telecommunications Technologies, e3791, 2019
Detection of malicious activities in internet of things environment based on binary visualization and machine intelligence
H Naeem
Wireless Personal Communications 108 (4), 2609-2629, 2019
Wireshark window authentication based packet captureing scheme to pervent DDoS related security issues in cloud network nodes
W Ali, J Sang, H Naeem, R Naeem, A Raza
2015 6th IEEE International Conference on Software Engineering and Service …, 2015
Scalable mutation testing using predictive analysis of deep learning model
MR Naeem, T Lin, H Naeem, F Ullah, S Saeed
IEEE Access 7, 158264-158283, 2019
A hybrid approach for object proposal generation
M Aamir, YF Pu, WA Abro, H Naeem, Z Rahman
International Conference on Sensing and Imaging, 251-259, 2017
A multi-level process mining framework for correlating and clustering of biomedical activities using event logs
MR Naeem, H Naeem, M Aamir, W Ali, WA Abro
International Journal of Advanced Computer Science and Applications 8 (3 …, 2017
Underwater Pragmatic Routing Approach Through Packet Reverberation Mechanism
S Ashraf, M Gao, Z Chen, H Naeem, A Ahmad, T Ahmed
IEEE Access 8, 163091-163114, 2020
Corrigendum to “USPF: Underwater Shrewd Packet Flooding Mechanism through Surrogate Holding Time”
S Ashraf, M Gao, Z Chen, T Ahmed, A Raza, H Naeem
Wireless Communications and Mobile Computing 2021, 2021
The system can't perform the operation now. Try again later.
Articles 1–20