default search action
Sadeeq Jan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j15]Muhammad Ismail, Hamza Qadir, Farrukh Aslam Khan, Sadeeq Jan, Zahid Wadud, Ali Kashif Bashir:
A novel routing protocol for underwater wireless sensor networks based on shifted energy efficiency and priority. Comput. Commun. 210: 147-162 (2023) - 2021
- [j14]Fazal Qudus Khan, Georgios Tsaramirsis, Naimat Ullah, Mohamed Nazmudeen, Sadeeq Jan, Awais Ahmad:
Smart algorithmic based web crawling and scraping with template autoupdate capabilities. Concurr. Comput. Pract. Exp. 33(22) (2021) - [j13]Syeda Warda Asher, Sadeeq Jan, George Tsaramirsis, Fazal Qudus Khan, Abdullah Khalil, Muhammad Obaidullah:
Reverse Engineering of Mobile Banking Applications. Comput. Syst. Sci. Eng. 38(3): 265-278 (2021) - [j12]Iftikhar Ahmad, Sami Ur Rehman, Imran Ullah Khan, Arfa Ali, Rahman Hussain, Sadeeq Jan, Zahid Wadud:
A Hybrid Approach for Automatic Aorta Segmentation in Abdominal 3D CT Scan Images. J. Medical Imaging Health Informatics 11(3): 712-719 (2021) - [j11]Sana Khattak, Sadeeq Jan, Iftikhar Ahmad, Zahid Wadud, Fazal Qudus Khan:
An effective security assessment approach for Internet banking services via deep analysis of multimedia data. Multim. Syst. 27(4): 733-751 (2021) - [j10]Muhammad Jamal Ahmed, Faisal Saeed, Anand Paul, Sadeeq Jan, HyunCheol Seo:
A new affinity matrix weighted k-nearest neighbors graph to improve spectral clustering accuracy. PeerJ Comput. Sci. 7: e692 (2021) - [j9]Sadeeq Jan, Eiad Yafi, Abdul Hafeez, Hamza Waheed Khatana, Sajid Hussain, Rohail Akhtar, Zahid Wadud:
Investigating Master-Slave Architecture for Underwater Wireless Sensor Network. Sensors 21(9): 3000 (2021) - [i1]Izzat Aldarraji, Ayad Kakei, Ayad Ghany Ismaeel, Georgios Tsaramirsis, Fazal Qudus Khan, Princy Randhawa, Muath Alrammal, Sadeeq Jan:
Takagi-Sugeno Fuzzy Modeling and Control for Effective Robotic Manipulator Motion. CoRR abs/2112.03006 (2021) - 2020
- [j8]Farhan Ullah, Bofeng Zhang, Rehan Ullah Khan, Tae-Sun Chung, Muhammad Attique, Khalil Khan, Salim El Khediri, Sadeeq Jan:
Deep Edu: A Deep Neural Collaborative Filtering for Educational Services Recommendation. IEEE Access 8: 110915-110928 (2020) - [j7]Uzma Afzal, Tariq Mahmood, Ayaz H. Khan, Sadeeq Jan, Raihan Ur Rasool, Ali Mustafa Qamar, Rehan Ullah Khan:
Feature Selection Optimization in Software Product Lines. IEEE Access 8: 160231-160250 (2020) - [j6]Imran Ullah Khan, Mazhar Islam, Muhammad Ismail, Abdul Baseer Qazi, Sadeeq Jan, Ihsan Ullah, Zahid Farid, Zahid Wadud:
Adaptive hop-by-hop cone vector-based forwarding protocol for underwater wireless sensor networks. Int. J. Distributed Sens. Networks 16(9): 155014772095830 (2020)
2010 – 2019
- 2019
- [j5]Sadeeq Jan, Annibale Panichella, Andrea Arcuri, Lionel C. Briand:
Search-based multi-vulnerability testing of XML injections in web applications. Empir. Softw. Eng. 24(6): 3696-3729 (2019) - [j4]Sadeeq Jan, Annibale Panichella, Andrea Arcuri, Lionel C. Briand:
Correction to: Search-based multi-vulnerability testing of XML injections in web applications. Empir. Softw. Eng. 24(6): 3730 (2019) - [j3]Syed Adeel Ali Shah, Ejaz Ahmed, Muhammad Ahsan Qureshi, Sadeeq Jan, Rafidah Md Noor:
An effective back-off selection technique for reliable beacon reception in VANETs. Int. J. Commun. Syst. 32(13) (2019) - [j2]Zahid Wadud, Khadem Ullah, Abdul Baseer Qazi, Sadeeq Jan, Farrukh Aslam Khan, Nasru Minallah:
An Efficient Routing Protocol Based on Stretched Holding Time Difference for Underwater Wireless Sensor Networks. Sensors 19(24): 5557 (2019) - [j1]Sadeeq Jan, Annibale Panichella, Andrea Arcuri, Lionel C. Briand:
Automatic Generation of Tests to Exploit XML Injection Vulnerabilities in Web Applications. IEEE Trans. Software Eng. 45(4): 335-362 (2019) - 2017
- [b1]Sadeeq Jan:
Automated and Effective Security Testing for XML-based Vulnerabilities. University of Luxembourg, 2017 - [c3]Sadeeq Jan, Cu D. Nguyen, Andrea Arcuri, Lionel C. Briand:
A Search-Based Testing Approach for XML Injection Vulnerabilities in Web Applications. ICST 2017: 356-366 - 2016
- [c2]Sadeeq Jan, Cu D. Nguyen, Lionel C. Briand:
Automated and effective testing of web services for XML injection attacks. ISSTA 2016: 12-23 - 2015
- [c1]Sadeeq Jan, Cu D. Nguyen, Lionel C. Briand:
Known XML Vulnerabilities Are Still a Threat to Popular Parsers and Open Source Systems. QRS 2015: 233-241
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint