A comprehensive and systematic look up into deep learning based object detection techniques: A review VK Sharma, RN Mir Computer Science Review 38, 100301, 2020 | 205 | 2020 |
Forensic-chain: Blockchain based digital forensics chain of custody with PoC in Hyperledger Composer AH Lone, RN Mir Digital investigation 28, 44-55, 2019 | 184 | 2019 |
Applicability of mobile contact tracing in fighting pandemic (COVID-19): Issues, challenges and solutions AB Dar, AH Lone, S Zahoor, AA Khan, R Naaz Computer Science Review 38, 100307, 2020 | 178 | 2020 |
Resource management in pervasive Internet of Things: A survey S Zahoor, RN Mir Journal of King Saud University-Computer and Information Sciences 33 (8 …, 2021 | 120 | 2021 |
Applicability of Blockchain smart contracts in securing Internet and IoT: A systematic literature review AH Lone, R Naaz Computer Science Review 39, 100360, 2021 | 110 | 2021 |
A survey on the Internet of Things security: State-of-art, architecture, issues and countermeasures O Yousuf, RN Mir Information & Computer Security 27 (2), 292-323, 2019 | 82 | 2019 |
Automatic detection of COVID-19 from chest radiographs using deep learning MK Pandit, SA Banday, R Naaz, MA Chishti Radiography 27 (2), 483-489, 2021 | 77 | 2021 |
Forensic-chain: Ethereum blockchain based digital forensics chain of custody AH Lone, RN Mir Sci. Pract. Cyber Secur. J 1, 21-27, 2018 | 68 | 2018 |
An enhanced time efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm VK Sharma, RN Mir Journal of King Saud University-Computer and Information Sciences 34 (3 …, 2022 | 59 | 2022 |
Saliency guided faster-RCNN (SGFr-RCNN) model for object detection and recognition VK Sharma, RN Mir Journal of King Saud University-Computer and Information Sciences 34 (5 …, 2022 | 58 | 2022 |
A game theory-based strategic approach to ensure reliable data transmission with optimized network operations in futuristic mobile adhoc networks BUI Khan, F Anwar, RF Olanrewaju, BR Pampori, RN Mir Ieee Access 8, 124097-124109, 2020 | 47 | 2020 |
DDoS attack detection in Internet of Things using recurrent neural network O Yousuf, RN Mir Computers and Electrical Engineering 101, 108034, 2022 | 46 | 2022 |
Adaptive task scheduling in IoT using reinforcement learning MK Pandit, RN Mir, MA Chishti International Journal of Intelligent Computing and Cybernetics 13 (3), 261-282, 2020 | 37 | 2020 |
Clustering in wireless sensor networks-a survey S Kaur, RN Mir International Journal of Computer Network and Information Security 8 (6), 38, 2016 | 33 | 2016 |
Ethics aware object oriented smart city architecture S Sholla, R Naaz, MA Chishti China Communications 14 (5), 160-173, 2017 | 31 | 2017 |
Incorporating ethics in Internet of Things (IoT) enabled connected smart healthcare S Sholla, R Naaz, MA Chishti 2017 IEEE/ACM International Conference on Connected Health: Applications …, 2017 | 29 | 2017 |
Adoption of cloud computing in higher learning institutions: a systematic review NB Nordin, RN Mir, Z Noor Indian Journal of Science and Technology 10 (36), 1-19, 2017 | 27 | 2017 |
Demystifying cryptography behind blockchains and a vision for post-quantum blockchains AH Lone, R Naaz 2020 IEEE International Conference for Innovation in Technology (INOCON), 1-6, 2020 | 25 | 2020 |
Consensus protocols as a model of trust in blockchains AH Lone, RN Mir International Journal of Blockchains and Cryptocurrencies 1 (1), 7-21, 2019 | 22 | 2019 |
A fuzzy logic-based method for incorporating ethics in the internet of things S Sholla, RN Mir, MA Chishti International Journal of Ambient Computing and Intelligence (IJACI) 12 (3 …, 2021 | 21 | 2021 |