default search action
Zunera Jalil
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Ameer Hamza, Abdul Rehman Javed, Farkhund Iqbal, Amanullah Yasin, Gautam Srivastava, Dawid Polap, Thippa Reddy Gadekallu, Zunera Jalil:
Multimodal Religiously Hateful Social Media Memes Classification Based on Textual and Image Data. ACM Trans. Asian Low Resour. Lang. Inf. Process. 23(8): 114:1-114:19 (2024) - [j17]Farkhund Iqbal, Ahmed Abbasi, Abdul Rehman Javed, Ahmad S. Almadhor, Zunera Jalil, Sajid Anwar, Imad Rida:
Data Augmentation-based Novel Deep Learning Method for Deepfaked Images Detection. ACM Trans. Multim. Comput. Commun. Appl. 20(11): 339:1-339:15 (2024) - [j16]M. Adnan Alvi, Zunera Jalil:
RansomGuard: a framework for proactive detection and mitigation of cryptographic windows ransomware. J. Comput. Virol. Hacking Tech. 20(4): 867-884 (2024) - 2023
- [c7]Farkhund Iqbal, Ahmad Abbasi, Abdul Rehman Javed, Gautam Srivastava, Zunera Jalil, Thippa Reddy Gadekallu:
Identification and Categorization of Unusual Internet of Vehicles Events in Noisy Audio. VTC2023-Spring 2023: 1-6 - 2022
- [j15]Abdul Rehman Javed, Waqas Ahmed, Mamoun Alazab, Zunera Jalil, Kashif Kifayat, Thippa Reddy Gadekallu:
A Comprehensive Survey on Computer Forensics: State-of-the-Art, Tools, Techniques, Challenges, and Future Directions. IEEE Access 10: 11065-11089 (2022) - [j14]Ahmed Abbasi, Abdul Rehman Javed, Amanullah Yasin, Zunera Jalil, Natalia Kryvinska, Usman Tariq:
A Large-Scale Benchmark Dataset for Anomaly Detection and Rare Event Classification for Audio Forensics. IEEE Access 10: 38885-38894 (2022) - [j13]Ameer Hamza, Abdul Rehman Javed, Farkhund Iqbal, Natalia Kryvinska, Ahmad S. Almadhor, Zunera Jalil, Rouba Borghol:
Deepfake Audio Detection via MFCC Features Using Machine Learning. IEEE Access 10: 134018-134028 (2022) - [j12]Abdul Rehman Javed, Zunera Jalil, Syed Atif Moqurrab, Sidra Abbas, Xuan Liu:
Ensemble Adaboost classifier for accurate and fast detection of botnet attacks in connected vehicles. Trans. Emerg. Telecommun. Technol. 33(10) (2022) - [c6]Farkhund Iqbal, Ahmed Abbasi, Abdul Rehman Javed, Zunera Jalil, Jamal N. Al-Karaki:
Deepfake Audio Detection Via Feature Engineering And Machine Learning. CIKM Workshops 2022 - 2021
- [j11]Ahmad Abbasi, Abdul Rehman Javed, Chinmay Chakraborty, Jamel Nebhen, Wisha Zehra, Zunera Jalil:
ElStream: An Ensemble Learning Approach for Concept Drift Detection in Dynamic Social Big Data Stream Learning. IEEE Access 9: 66408-66419 (2021) - [j10]Maryam Al Hinai, Mohsin Ali, Abdul Rehman Javed, Fahad Ghabban, Liaqat Ali Khan, Zunera Jalil:
SeFACED: Semantic-Based Forensic Analysis and Classification of E-Mail Data Using Deep Learning. IEEE Access 9: 98398-98411 (2021) - [j9]Waqas Ahmed, Aamir Rasool, Abdul Rehman Javed, Neeraj Kumar, Thippa Reddy Gadekallu, Zunera Jalil, Natalia Kryvinska:
Security in Next Generation Mobile Payment Systems: A Comprehensive Survey. IEEE Access 9: 115932-115950 (2021) - [j8]Abdul Rehman Javed, Zunera Jalil, Wisha Zehra, Thippa Reddy Gadekallu, Doug Young Suh, Md. Jalil Piran:
A comprehensive survey on digital video forensics: Taxonomy, challenges, and future directions. Eng. Appl. Artif. Intell. 106: 104456 (2021) - [j7]Syed Ibrahim Imtiaz, Saif ur Rehman, Abdul Rehman Javed, Zunera Jalil, Xuan Liu, Waleed S. Alnumay:
DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network. Future Gener. Comput. Syst. 115: 844-856 (2021) - [j6]Saif ur Rehman, Mubashir Khaliq, Syed Ibrahim Imtiaz, Aamir Rasool, Muhammad Shafiq, Abdul Rehman Javed, Zunera Jalil, Ali Kashif Bashir:
DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU). Future Gener. Comput. Syst. 118: 453-466 (2021) - [j5]Aamir Rasool, Abdul Rehman Javed, Zunera Jalil:
SHA-AMD: sample-efficient hyper-tuned approach for detection and identification of Android malware family and category. Int. J. Ad Hoc Ubiquitous Comput. 38(1/2/3): 172-183 (2021) - [j4]Shafaq Abbas, Zunera Jalil, Abdul Rehman Javed, Iqra Batool, Mohammad Zubair Khan, Abdulfattah Noorwali, Thippa Reddy Gadekallu, Aqsa Akbar:
BCD-WERT: a novel approach for breast cancer detection using whale optimization based efficient features and extremely randomized tree algorithm. PeerJ Comput. Sci. 7: e390 (2021) - [j3]Abdul Basit, Maham Zafar, Xuan Liu, Abdul Rehman Javed, Zunera Jalil, Kashif Kifayat:
A comprehensive survey of AI-enabled phishing attacks detection techniques. Telecommun. Syst. 76(1): 139-154 (2021) - [c5]Maryam Al Hinai, Mohsan Ali, Abdul Rehman Javed, Gautam Srivastava, Thippa Reddy Gadekallu, Zunera Jalil:
Email Classification and Forensics Analysis using Machine Learning. SmartWorld/SCALCOM/UIC/ATC/IOP/SCI 2021: 630-635 - [i2]Waqas Ahmed, Amir Rasool, Jamel Nebhen, Neeraj Kumar, Faisal Shahzad, Abdul Rehman Javed, Thippa Reddy Gadekallu, Zunera Jalil:
Security in Next Generation Mobile Payment Systems: A Comprehensive Survey. CoRR abs/2105.12097 (2021) - 2020
- [j2]Celestine Iwendi, Zunera Jalil, Abdul Rehman Javed, G. Thippa Reddy, Rajesh Kaluri, Gautam Srivastava, Ohyun Jo:
KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks. IEEE Access 8: 72650-72660 (2020)
2010 – 2019
- 2019
- [j1]Aamer Hanif, Ahmed Faisal Siddiqi, Zunera Jalil:
Are Computer Experience and Anxiety Irrelevant? Towards a Simple Model for Adoption of E-Learning Systems. Int. J. Eng. Pedagog. 9(5): 112-125 (2019) - 2013
- [c4]Faisal Riaz, Zunera Jalil, Sehrab Bashir, M. Imran, Naeem Iqbal Ratyal, M. Sajid:
Efficient spectrum optimization and mobility in cognitive radio based inter-vehicle communcation system. FGCT 2013: 190-195 - 2010
- [i1]Zunera Jalil, Anwar M. Mirza, Maria Sabir:
Content based Zero-Watermarking Algorithm for Authentication of Text Documents. CoRR abs/1003.1796 (2010)
2000 – 2009
- 2009
- [c3]Zunera Jalil, Anwar M. Mirza:
An Invisible Text Watermarking Algorithm using Image Watermark. SCSS 2009: 147-152 - [c2]Hajira Jabeen, Zunera Jalil, Abdul Rauf Baig:
Opposition based initialization in particle swarm optimization (O-PSO). GECCO (Companion) 2009: 2047-2052 - 2008
- [c1]Zunera Jalil, Arshad Ali Shahid:
Is Non Technical Person a Better Software Project Manager? CSSE (2) 2008: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 20:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint