default search action
Mudasir Ahmad Wani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Amine Sallah, El Arbi Abdellaoui Alaoui, Said Agoujil, Mudasir Ahmad Wani, Mohamed Hammad, Yassine Maleh, Ahmed A. Abd El-Latif:
Fine-Tuned Understanding: Enhancing Social Bot Detection With Transformer-Based Classification. IEEE Access 12: 118250-118269 (2024) - [j12]Mohamed Hammad, Mudasir Ahmad Wani, Kashish Ara Shakil, Hadil Shaiba, Ahmed A. Abd El-Latif:
Deep Cancelable Multibiometric Finger Vein and Fingerprint Authentication With Non-Negative Matrix Factorization. IEEE Access 12: 120638-120660 (2024) - [j11]Khadija Javed, Shengbing Ren, Muhammad Asim, Mudasir Ahmad Wani:
Cross-Project Defect Prediction Based on Domain Adaptation and LSTM Optimization. Algorithms 17(5): 175 (2024) - [j10]Mudasir Ahmad Wani, Mohammed Ahmed El-Affendi, Patrick Bours, Ali Shariq Imran, Amir Hussain, Ahmed A. Abd El-Latif:
CoDeS: A Deep Learning Framework for Identifying COVID-Caused Depression Symptoms. Cogn. Comput. 16(1): 305-325 (2024) - [j9]Mudasir Ahmad Wani, Mohammed Ahmed El-Affendi, Kashish Ara Shakil:
AI-Generated Spam Review Detection Framework with Deep Learning Algorithms and Natural Language Processing. Comput. 13(10): 264 (2024) - [j8]Tahir Hussain, Lasheng Yu, Muhammad Asim, Afaq Ahmed, Mudasir Ahmad Wani:
Enhancing E-Learning Adaptability with Automated Learning Style Identification and Sentiment Analysis: A Hybrid Deep Learning Approach for Smart Education. Inf. 15(5): 277 (2024) - [j7]Mudasir Ahmad Wani, Mohammed Ahmed El-Affendi, Kashish Ara Shakil, Ibrahem Mohammed Abuhaimed, Anand Nayyar, Amir Hussain, Ahmed A. Abd El-Latif:
Toxic Fake News Detection and Classification for Combating COVID-19 Misinformation. IEEE Trans. Comput. Soc. Syst. 11(4): 5101-5118 (2024) - 2023
- [j6]Xianhua Song, Guang-Long Chen, Ahmed A. Abd El-Latif, Mudasir Ahmad Wani, Bassem Abd-El-Atty:
Quantum Geometric Transformation Based on QIRHSI Quantum Color images. IEEE Access 11: 21883-21899 (2023) - [j5]Ali Shariq Imran, Henrik Hodnefjeld, Zenun Kastrati, Noureen Fatima, Sher Muhammad Daudpota, Mudasir Ahmad Wani:
Classifying European Court of Human Rights Cases Using Transformer-Based Techniques. IEEE Access 11: 55664-55676 (2023) - [j4]Mudasir Ahmad Wani, Mohammed Ahmed El-Affendi, Kashish Ara Shakil, Ali Shariq Imran, Ahmed A. Abd El-Latif:
Depression Screening in Humans With AI and Deep Learning Techniques. IEEE Trans. Comput. Soc. Syst. 10(4): 2074-2089 (2023) - 2022
- [j3]Mudasir Ahmad Wani, Suraiya Jabin:
Mutual clustering coefficient-based suspicious-link detection approach for online social networks. J. King Saud Univ. Comput. Inf. Sci. 34(2): 218-231 (2022) - 2021
- [j2]Abdul Ghafoor, Ali Shariq Imran, Sher Muhammad Daudpota, Zenun Kastrati, Abdullah, Rakhi Batra, Mudasir Ahmad Wani:
The Impact of Translating Resource-Rich Datasets to Low-Resource Languages Through Multi-Lingual Text Processing. IEEE Access 9: 124478-124490 (2021) - [c3]Mudasir Ahmad Wani, Nancy Agarwal, Patrick Bours:
Sexual-predator Detection System based on Social Behavior Biometric (SSB) Features. ACLING 2021: 116-127 - [c2]Nancy Agarwal, Tugçe Ünlü, Mudasir Ahmad Wani, Patrick Bours:
Predatory Conversation Detection Using Transfer Learning Approach. LOD 2021: 488-499
2010 – 2019
- 2019
- [c1]Mudasir Ahmad Wani, Nancy Agarwal, Suraiya Jabin, Syed Zeeshan Hussain:
Analyzing Real and Fake users in Facebook Network based on Emotions. COMSNETS 2019: 110-117 - 2018
- [j1]Mudasir Ahmad Wani, Nancy Agarwal, Suraiya Jabin, Syed Zeeshan Hussain:
User emotion analysis in conflicting versus non-conflicting regions using online social networks. Telematics Informatics 35(8): 2326-2336 (2018) - [i4]Mudasir Ahmad Wani, Nancy Agarwal, Suraiya Jabin, Syed Zeeshan Hussain:
Design and Implementation of iMacros-based Data Crawler for Behavioral Analysis of Facebook Users. CoRR abs/1802.09566 (2018) - [i3]Mudasir Ahmad Wani, Suraiya Jabin, Ghulam Yazdani, Nehaluddin Ahmad:
Sneak into Devil's Colony- A study of Fake Profiles in Online Social Networks and the Cyber Law. CoRR abs/1803.08810 (2018) - [i2]Mudasir Ahmad Wani, Suraiya Jabin:
Mutual Clustering Coefficient-based Suspicious-link Detection approach for Online Social Networks. CoRR abs/1805.00537 (2018) - 2017
- [i1]Mudasir Ahmad Wani, Suraiya Jabin:
A sneak into the Devil's Colony - Fake Profiles in Online Social Networks. CoRR abs/1705.09929 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint