1. |
KAZIM ALI, MUHAMMAD SHAHID BHATTI, MOHAMMED A.ALGHAMDI, ATIF SAEED, ATIFA ATHAR, SULTAN H. ALMOTIRI, AND SAMINA AKRAM (2024), " Adversarial Robustness of Vision Transformers Versus Convolutional Neural Networks", IEEE Access, Vol: 12, ISSN: 2169-3536, DOI: 10.1109/ACCESS.2024.3435347, Impact Factor: 3.4
(External URL)
|
2. |
Mohammed A. Al Ghamdi, Muhammad Shahid Bhatti, Atif Saeed2, Zeeshan Gillani, Sultan H. Almotiri (2023), "A fusion of BERT, machine learning and manual approach for fake news detection", Multimedia Tools and Applications, pp: 1-18, ISSN: 1380-7501, DOI: 10.1007/s11042-023-16669-z
(External URL)
|
3. |
Kazim Ali and Adnan N. Qureshi and Muhammad Shahid Bhatti and Abid Sohail and Muhammad Hijji and Atif Saeed (2022), "De-Noising Brain MRI Images by Mixing Concatenation and Residual Learning (MCR)", Comput. Syst. Sci. Eng., pp: 1167-1186, Vol: 45, Issue: 2, ISSN: 0267-6192, DOI: https://doi.org/10.32604/csse.2023.032508, Impact Factor: 4.397
(External URL)
|
4. |
Kazim Ali1, Adnan N. Quershi, Ahmad Alauddin Bin Arifin, Muhammad Shahid Bhatti, Abid Sohail, Rohail Hassan (2021), "Deep Image Restoration Model: A Defense Method Against Adversarial Attacks", Computers, Materials & Continua, pp: 2209-2224, Vol: 71, Issue: 2, ISSN: 1546-2226, DOI: 10.32604/cmc.2022.020111, Impact Factor: 3.772
(External URL)
|
5. |
Muhammad Shahid Bhatti, Azmat Ullah, Rohaya Latip, Abid Sohail, Anum Riaz, Rohail Hassan (2021), "Benchmarking Performance of Document Level Classification and Topic Modeling", Computers, Materials & Continua, pp: 125-141, Vol: 71, Issue: 1, 2022, ISSN: 1546-2226, DOI: 10.32604/cmc.2022.020083 , Impact Factor: 3.772
(External URL)
|
6. |
Muhammad Shahid Bhatti, Saman Azhar, Abid Sohail, Mohammad Hijji, Hamna Ayemen, Areesha Ramzan (2021), "Multilingual Sentiment Mining System to Prognosticate Governance", Computers, Materials & Continua, pp: 389-406, Vol: 71, Issue: 1, ISSN: 1546-2226, DOI: 10.32604/cmc.2022.021384, Impact Factor: 3.772
(External URL)
|
7. |
Atif Saeed, Muhmmad Shahid, Khalid Masood (2020), "How Secure is your Cloud: Classification of Security Threats & Countermeasures Within Cloud Computing", International Journal of Computer Science & Network Security(IJCSNS), Vol: Vol: 20 No.5, Issue: May 2020
|
8. |
Muhammad Shahid Bhatti, Syed Asad Hussain , Abdul Qayyum, Abdul Karim Shahid, Muhammad Usman Akram, Sajid Ibrahim Hashmi (2018), "Using Sab-Iomha for an Alpha Channel based Image Forgery Detection", International Journal of Advanced Computer Science and Applications (IJACSA), pp: 376-384, Vol: 9, Issue: 8, Standard: 2156-5570
(External URL)
|
9. |
Imran Raza , S.Jabeen , S. R. Chaudhry , Syed Asad Hussain , A. Saeed , M. S. Bhatti and M. H. Raza (2015), "Optical Wireless Channel Characterization For Indoor
Visible Light Communications", Indian Journal of Science and Technology, pp: 1-9, Vol: Vol 8, Issue: 22, Standard: 0974-5645
(External URL)
|
10. |
Muhammad Usman Akram, Bilal Hassan, ShahidBhatti, Fahad Hassan, Jawad Bashir (2014), "A Study on RE Process Models for Offshore Software Development", J. Basic Appl. Sci. Res., pp: 114-119, Vol: 2014 4, Issue: 4, Standard: 2090-4304
(External URL)
|
11. |
Muhammad Shahid Bhatti, Muhammad Usman Akram, Muhammad Ajmal, Ayesha Sadiq, Saif Ullah and Muhammad Shakil (2014), "Information Extraction From Images", World Applied Sciences Journal, pp: 1273-1276, Vol: 29 (10): 1273-1276, 2014, Standard: 1818-4952, Impact Factor: 0.234
(External URL)
|
12. |
Muhammad Shahid Bhatti, Faqia Saeed, Muhammad Ajmal, Muhammad Tayyab, Qasim Naeem, Amin Safdar (2014), "Survey of Computer Vision Techniques for License Plate Detection", J. Basic Appl. Sci. Res., pp: 68-77, Vol: 4, Issue: 1, Standard: 2090-4304
(External URL)
|