Shehzad Khalid

ORCID: 0000-0003-0899-7354
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Anomaly Detection Techniques and Applications
  • Advanced Text Analysis Techniques
  • Image Retrieval and Classification Techniques
  • Topic Modeling
  • IoT and Edge/Fog Computing
  • Time Series Analysis and Forecasting
  • Handwritten Text Recognition Techniques
  • EEG and Brain-Computer Interfaces
  • Retinal Imaging and Analysis
  • Text and Document Classification Technologies
  • Cutaneous Melanoma Detection and Management
  • Sentiment Analysis and Opinion Mining
  • Natural Language Processing Techniques
  • Video Surveillance and Tracking Methods
  • Advanced Image and Video Retrieval Techniques
  • Video Analysis and Summarization
  • Image Processing and 3D Reconstruction
  • Optical Coherence Tomography Applications
  • Digital Imaging for Blood Diseases
  • ECG Monitoring and Analysis
  • Energy Harvesting in Wireless Networks
  • AI in cancer detection
  • Radiomics and Machine Learning in Medical Imaging
  • Advanced Malware Detection Techniques
  • Vehicle License Plate Recognition

Bahria University
2016-2025

University of Peshawar
2022

St. George's University
2017-2020

Western University
2020

Jiangsu University of Science and Technology
2019

Seattle Foundation
2017

Seattle University
2017

Penn State Milton S. Hershey Medical Center
2017

University of Chile
2016

University of the Punjab
2016

Due to the monumental growth of Internet applications in last decade, need for security information network has increased manifolds. As a primary defense infrastructure, an intrusion detection system is expected adapt dynamically changing threat landscape. Many supervised and unsupervised techniques have been devised by researchers from discipline machine learning data mining achieve reliable anomalies. Deep area which applies neuron-like structure tasks. profoundly changed way we approach...

10.1109/access.2018.2863036 article EN cc-by-nc-nd IEEE Access 2018-01-01

The IoT (Internet of Things) connect systems, applications, data storage, and services that may be a new gateway for cyber-attacks as they continuously offer in the organization. Currently, software piracy malware attacks are high risks to compromise security IoT. These threats steal important information causes economic reputational damages. In this paper, we have proposed combined deep learning approach detect pirated malware-infected files across network. TensorFlow neural network is...

10.1109/access.2019.2937347 article EN cc-by IEEE Access 2019-01-01

Epilepsy is a very common neurological disease that has affected more than 65 million people worldwide. In 30 % of the cases, by this cannot be cured with medicines or surgery. However, predicting seizure before it actually occurs can help in its prevention; through therapeutic intervention. Studies have observed abnormal activity inside brain begins few minutes start seizure, which known as preictal state. Many researchers tried to find way for state but an effective prediction terms high...

10.1109/access.2020.2976866 article EN cc-by IEEE Access 2020-01-01

Interoperability remains a significant burden to the developers of Internet Things’ Systems. This is due fact that IoT devices are highly heterogeneous in terms underlying communication protocols, data formats, and technologies. Secondly lack worldwide acceptable standards, interoperability tools remain limited. In this paper, we proposed an based Semantic Model (IoT-SIM) provide among healthcare domain. Physicians communicate their patients with monitor current health status. Information...

10.1155/2017/9731806 article EN Wireless Communications and Mobile Computing 2017-01-01

With the evolution of fog computing, processing takes place locally in a virtual platform rather than centralized cloud server. Fog computing combined with is more efficient as alone does not serve purpose. Inefficient resource management and load balancing leads to degradation quality service well energy losses. Traffic overhead increased because all requests are sent main server causing delays which cannot be tolerated healthcare scenarios. To overcome this problem, authors consolidating...

10.1186/s13638-019-1395-3 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2019-04-08

Abstract There is huge amount of content produced online by amateur authors, covering a large variety topics. Sentiment analysis (SA) extracts and aggregates users’ sentiments towards target entity. Machine learning (ML) techniques are frequently used as the natural language data in abundance has definite patterns. ML adapt to domain specific solution at high accuracy depending upon feature set used. The lexicon-based techniques, using external dictionary, independent prevent overfitting but...

10.1186/s40294-016-0016-9 article EN cc-by Complex Adaptive Systems Modeling 2016-02-03

Context: Recently, research community of certain domain showing their eagerness towards the use social media networks to gain constructive knowledge in decision making and automation, such as aid perform software development activities, crypto-currencies usage, network detection recommendation so on. besides other domains eHealth, big data analytics has become hot topic predict patient mental illness involved either depression, schizophrenia, eating disorders, anxiety or addictive behaviors....

10.1109/access.2019.2953087 article EN cc-by IEEE Access 2019-01-01

In the current era, information security is on its top priority for all organizations. The individuals, government officials, and military with rapid development of Internet technologies like Things (IoT), big data, cloud computing facing data problems. As massive rate growth, it a challenging task researchers, that how to manage vast amount safely effectively while designing smart cities. It has been quite easy produce an illegal copy digital contents. verification content one major issues...

10.1109/access.2019.2916674 article EN cc-by-nc-nd IEEE Access 2019-01-01

Epilepsy is a common brain disorder that causes patients to face multiple seizures in single day. Around 65 million people are affected by epilepsy worldwide. Patients with focal can be treated surgery, whereas generalized epileptic managed medications. It has been noted more than 30% of cases, these medications fail control seizures, resulting accidents and limiting the patient’s life. Predicting such prior commencement an oncoming seizure critical so preventive medicines before it occurs....

10.3390/app12147251 article EN cc-by Applied Sciences 2022-07-19
Coming Soon ...