default search action
Bilal Khan
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Bilal Khan 0001 — East China Normal University, School of Mathematical Sciences and Shanghai Key Laboratory of PMMP, China (and 1 more)
- Bilal Khan 0002 — University of Nebraska-Lincoln, Department of Sociology, Lincoln, NE, USA (and 1 more)
- Bilal Khan 0003 — City University of Science and Information Technology, Department of Computer Science, Peshawar, Pakistan (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c46]Ahatsham Hayat, Bilal Khan, Mohammad Hasan:
Improving Transfer Learning for Early Forecasting of Academic Performance by Contextualizing Language Models. BEA 2024: 137-148 - [c45]Jennifer Kim Jin, Khalil Dajani, Mira Kim, Soo Dong Kim, Bilal Khan, Daniel Hyun Jin:
Reinforcement Learning Architecture for Facial Skin Treatment Recommender. SERA 2024: 47-54 - 2023
- [j29]Neelofar Shaukat, Md. Rabiul Islam, Md Moktadir Rahman, Bilal Khan, Basharat Ullah, Sahibzada Muhammad Ali, Afef Fekih:
Decentralized, Democratized, and Decarbonized Future Electric Power Distribution Grids: A Survey on the Paradigm Shift From the Conventional Power System to Micro Grid Structures. IEEE Access 11: 60957-60987 (2023) - [j28]Aqib Raqeeb, Fahim Shah, Zaheer Alam, Subhashree Choudhury, Bilal Khan, R. Palanisamy:
Data-Driven Bearing Fault Diagnosis for Induction Motor. J. Electr. Comput. Eng. 2023: 7173989:1-7173989:12 (2023) - [j27]Bilal Khan, Aamer Nadeem:
Evaluating the effectiveness of decomposed Halstead Metrics in software fault prediction. PeerJ Comput. Sci. 9: e1647 (2023) - [j26]Bilal Khan, Saifullah Shafiq, Ali T. Al-Awami:
Artificial-Neural-Network-Based Autonomous Demand Response Controller for Thermostatically Controlled Loads. IEEE Syst. J. 17(3): 5014-5022 (2023) - [c44]Kaushik Mahida, Daniel Hyun Jin, Bilal Khan, Wasiq Khan, Khalil Dajani, Jennifer Kim Jin:
A Deep Learning Approach for Liver Segmentation and Lesion Detection in Medical Images Using U-Net Segmentation Model. DeSE 2023: 116-121 - [i2]George E. Dahl, Frank Schneider, Zachary Nado, Naman Agarwal, Chandramouli Shama Sastry, Philipp Hennig, Sourabh Medapati, Runa Eschenhagen, Priya Kasimbeg, Daniel Suo, Juhan Bae, Justin Gilmer, Abel L. Peirson, Bilal Khan, Rohan Anil, Mike Rabbat, Shankar Krishnan, Daniel Snider, Ehsan Amid, Kongtao Chen, Chris J. Maddison, Rakshith Vasudev, Michal Badura, Ankush Garg, Peter Mattson:
Benchmarking Neural Network Training Algorithms. CoRR abs/2306.07179 (2023) - 2022
- [j25]Muhammad Shahroz Gul Qureshi, Bilal Khan, Muhammad Arshad:
ML-Based Model for Risk Prediction in Software Requirements. Int. J. Technol. Diffusion 13(1): 1-17 (2022) - [c43]Danish Ali, Francesco Epifania, Naeem Ahmed, Bilal Khan, Luca Marconi, Ricardo A. Matamoros A.:
A Modified CNN for Age and Gender Prediction (short paper). AIABI@AI*IA 2022 - [c42]Arif Ali Khan, Sher Badshah, Peng Liang, Muhammad Waseem, Bilal Khan, Aakash Ahmad, Mahdi Fahmideh, Mahmood Niazi, Muhammad Azeem Akbar:
Ethics of AI: A Systematic Literature Review of Principles and Challenges. EASE 2022: 383-392 - [c41]Benjamin Alexander, Yunfei Hou, Bilal Khan, Jennifer Kim Jin:
Learn Programming In Virtual Reality? A Case Study of Computer Science Students. EDUCON 2022: 270-275 - 2021
- [j24]Sher Badshah, Arif Ali Khan, Shahid Hussain, Bilal Khan:
What users really think about the usability of smartphone applications: diversity based empirical investigation. Multim. Tools Appl. 80(6): 9177-9207 (2021) - [j23]Sana Rehman, Bilal Khan, Jawad Arif, Zahid Ullah, Abdullah J. Aljuhani, Ahmad Alhindi, Sahibzada Muhammad Ali:
Bi-Directional Mutual Energy Trade between Smart Grid and Energy Districts Using Renewable Energy Credits. Sensors 21(9): 3088 (2021) - [j22]Muhammad Jawad, Muhammad Bilal Qureshi, Muhammad Usman Shahid Khan, Sahibzada Muhammad Ali, Chaudhry Arshad Mehmood, Bilal Khan, Xiaoyu Wang, Samee U. Khan:
A Robust Optimization Technique for Energy Cost Minimization of Cloud Data Centers. IEEE Trans. Cloud Comput. 9(2): 447-460 (2021) - [c40]Shabib Shahid, Saifullah Shafiq, Bilal Khan, Muhammad Omair Butt, Ali Taleb Al-Awami:
Optimal Charging/Discharging Control Service for Electric Vehicles: A Case Study at University Campus. ISIE 2021: 1-6 - [c39]Muhammad Yasir Javed, Nuutti Tervo, Rehman Akbar, Bilal Khan, Marko E. Leinonen, Aarno Pärssinen:
Improving Analog Zero-Forcing Null Depth with N-bit Vector Modulators in Multi-beam Phased Array Systems. VTC Spring 2021: 1-5 - [i1]Arif Ali Khan, Sher Badshah, Peng Liang, Bilal Khan, Muhammad Waseem, Mahmood Niazi, Muhammad Azeem Akbar:
Ethics of AI: A Systematic Literature Review of Principles and Challenges. CoRR abs/2109.07906 (2021) - 2020
- [j21]Muhammad Asfand Yar Rustam, Bilal Khan, Sahibzada Muhammad Ali, Muhammad Bilal Qureshi, Chaudhary Arshad Mehmood, Muhammad Usman Shahid Khan, Raheel Nawaz:
An Adaptive Distributed Averaging Integral Control Scheme for Micro-Grids With Renewable Intermittency and Varying Operating Cost. IEEE Access 8: 455-464 (2020) - [j20]Faisal Mehmood, Bilal Khan, Sahibzada Muhammad Ali, Muhammad Bilal Qureshi, C. Diver, Raheel Nawaz:
Multi-Renewable Energy Agent Based Control for Economic Dispatch and Frequency Regulation of Autonomous Renewable Grid. IEEE Access 8: 89534-89545 (2020) - [j19]Khalid Salman Khan, Sahibzada Muhammad Ali, Zahid Ullah, Irfan Sami, Bilal Khan, Chaudhry Arshad Mehmood, Umar Farid, Jawad Saleem, Jong-Suk Ro:
Statistical Energy Information and Analysis of Pakistan Economic Corridor Based on Strengths, Availabilities, and Future Roadmap. IEEE Access 8: 169701-169739 (2020) - [j18]Waqar Ahmed, Hammad Ansari, Bilal Khan, Zahid Ullah, Sahibzada Muhammad Ali, Chaudhry Arshad Mehmood, Muhammad Bilal Qureshi, Iqrar Hussain, Muhammad Jawad, Muhammad Usman Shahid Khan, Amjad Ullah, Raheel Nawaz:
Machine Learning Based Energy Management Model for Smart Grid and Renewable Energy Districts. IEEE Access 8: 185059-185078 (2020) - [j17]Sehar Umbreen, Danish Shehzad, Numan Shafi, Bilal Khan, Usman Habib:
An Energy-Efficient Mobility-Based Cluster Head Selection for Lifetime Enhancement of Wireless Sensor Networks. IEEE Access 8: 207779-207793 (2020) - [c38]Sher Badshah, Arif Ali Khan, Bilal Khan:
Towards Process Improvement in DevOps: A Systematic Literature Review. EASE 2020: 427-433 - [c37]Bilal Khan, Danish Iqbal, Sher Badshah:
Cross-Project Software Fault Prediction Using Data Leveraging Technique to Improve Software Quality. EASE 2020: 434-438
2010 – 2019
- 2019
- [c36]Sumaira Mustafa, Khubaib Amjad Alam, Bilal Khan, Muhammad Habib Ullah, Pariwish Touseef:
Fair Coexistence of LTE and WiFi-802.11 in Unlicensed Spectrum: A Systematic Literature Review. ICFNDS 2019: 37:1-37:10 - [c35]Bilal Khan, Nuutti Tervo, Aarno Pärssinen, Markku J. Juntti:
Average Linearization of Phased Array Transmitters Under Random Amplitude and Phase Variations. ISWCS 2019: 553-557 - [c34]Bilal Khan, Nuutti Tervo, Aarno Pärssinen, Markku J. Juntti:
Statistical Linearization of Phased Arrays Using Power Adaptive Power Amplifier Model. PIMRC 2019: 1-5 - 2018
- [j16]Tehmina Kalsum, Syed Muhammad Anwar, Muhammad Majid, Bilal Khan, Sahibzada Muhammad Ali:
Emotion recognition from facial expressions using hybrid feature descriptors. IET Image Process. 12(6): 1004-1012 (2018) - [j15]Muhammad Burhan, Rana Asif Rehman, Bilal Khan, Byung-Seo Kim:
IoT Elements, Layered Architectures and Security Issues: A Comprehensive Survey. Sensors 18(9): 2796 (2018) - [c33]Sidra Kanwal, Bilal Khan, Sahibzada Muhammad Ali, Chaudhary Arshad Mehmood, Muhammad Qasim Rauf:
Support Vector Machine and Gaussian Process Regression Based Modeling for Photovoltaic Power Prediction. FIT 2018: 117-122 - [c32]Irfan Allahi, Bilal Khan, Aamir Sohail Nagra, Rabbia Idrees, Shahid Masud:
Performance Evaluation of IEEE 1588 Protocol Using Raspberry Pi over WLAN. ICCS 2018: 315-320 - [c31]Irfan Allahi, Rabbia Idrees, Bilal Khan, Shahid Masud:
Performance evaluation of IEEE 1588 protocol with modified LibPTP in OMNet++. SysCon 2018: 1-5 - 2017
- [j14]Hasnain Arshad, Aamir Habib, Ali Mustafa, Bilal Khan, Saad Zahid:
Pairing and Scheduling for Large Array MIMO Using Regularized Channel Inversion Receivers Over Nakagami-m Fading. Wirel. Pers. Commun. 96(4): 6397-6424 (2017) - [c30]Iqrar Hussain, Zahid Ullah, Sahibzada Muhammad Ali, Bilal Khan, M. F. Qureshi, Chaudhry Arshad Mehmood:
Energy Management Model for Energy District Prosumers and Utility: A Case Study of Texas State. FIT 2017: 282-287 - 2016
- [j13]Adnan Mehmood Bhatti, Muhammad Majid, Syed Muhammad Anwar, Bilal Khan:
Human emotion recognition and analysis in response to audio music using brain signals. Comput. Hum. Behav. 65: 267-275 (2016) - [c29]Neelofar Shaukat, Bilal Khan, Chaudhary Arshad Mehmood, Sahibzada Muhammad Ali:
Takagi-Sugeno Fuzzy Logic Based Speed Control of Induction Motor. FIT 2016: 280-285 - [c28]Babar Azeem, Faisal Rehman, Chaudhary Arshad Mehmood, Sahibzada Muhammad Ali, Bilal Khan, Sarmad Saeed:
Exact Feedback Linearization (EFL) and De-Couple Control of Doubly Fed Induction Generator Based Wind Turbine. FIT 2016: 330-335 - [c27]Faisal Rehman, Babar Azeem, Chaudhary Arshad Mehmood, Sahibzada Muhammad Ali, Bilal Khan, Fahad Rehman:
Control of Grid Interfaced Doubly Fed Induction Generator (DFIG) Using Adaptive SMC Improved with LVRT Enhancement. FIT 2016: 336-341 - 2015
- [c26]Jeremy D. Seideman, Bilal Khan, Antonio Cesar Vargas:
Malware Biodiversity Using Static Analysis. FNSS 2015: 139-155 - 2014
- [c25]Jeremy D. Seideman, Bilal Khan, Antonio Cesar Vargas:
Identifying malware genera using the Jensen-Shannon distance between system call traces. MALWARE 2014: 1-7 - [c24]Bilal Khan, Jong-Suk Ahn:
Modeling the effect of interferences among N collocated heterogeneous wireless networks. WiOpt 2014: 167-172 - 2013
- [j12]Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan, Abdullah M. AlKelabi, Abdulaziz Alajaji:
Cyber security using arabic captcha scheme. Int. Arab J. Inf. Technol. 10(1): 76-84 (2013) - [j11]Bilal Khan, J. Anthony Rossiter:
Alternative parameterisation within predictive control: a systematic selection. Int. J. Control 86(8): 1397-1409 (2013) - 2012
- [j10]Zeki Bilgin, Bilal Khan:
Dynamic power budget distribution schemes that optimise connection lifetimes in MANETs. Int. J. Auton. Adapt. Commun. Syst. 5(4): 360-385 (2012) - [c23]Yuebing Jiang, Timothy Perez, Marios S. Pattichis, Bilal Khan:
A configurable system for role-specific video imaging during laparoscopic surgery. BIBE 2012: 738-743 - 2011
- [j9]Fenghua Tian, Haijing Niu, Bilal Khan, George Alexandrakis, Khosrow Behbehani, Hanli Liu:
Enhanced Functional Brain Imaging by Using Adaptive Filtering and a Depth Compensation Algorithm in Diffuse Optical Tomography. IEEE Trans. Medical Imaging 30(6): 1239-1251 (2011) - [c22]Guillermo Valencia-Palomo, J. Anthony Rossiter, Colin N. Jones, Ravi Gondhalekar, Bilal Khan:
Alternative parameterisations for predictive control: How and why? ACC 2011: 5175-5180 - [c21]Bilal Khan, J. Anthony Rossiter:
Triple mode MPC or laguerre MPC: A comparison. ACC 2011: 5189-5194 - [c20]Omer Demir, Bilal Khan:
Finding DDoS attack sources: Searchlight localization algorithm for network tomography. IWCMC 2011: 418-423 - [c19]Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan:
Information Security Awareness Campaign: An Alternate Approach. ISA 2011: 1-10 - 2010
- [c18]Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan, Abdullah M. AlKelabi, Abdulaziz Alajaji:
Using Arabic CAPTCHA for Cyber Security. FGIT-SecTech/DRBC 2010: 8-17 - [c17]Zeki Bilgin, Bilal Khan:
A Dynamic Route Optimization Mechanism for AODV in MANETs. ICC 2010: 1-5 - [c16]Zeki Bilgin, Bilal Khan:
Having one's cake and eating it too: Better routes and lower control traffic for AODV. Med-Hoc-Net 2010: 1-8 - [c15]Bilal Khan, Muhammad Khurram Khan, Maqsood Mahmud, Khaled Alghathbar:
Security Analysis of Firewall Rule Sets in Computer Networks. SECURWARE 2010: 51-56
2000 – 2009
- 2009
- [c14]Jaroslaw Paduch, Jamie Levy, Bilal Khan:
Using a secure permutational covert channel to detect local and wide area interposition attacks. IWCMC 2009: 79-83 - [c13]Carol Dottin, Bilal Khan:
Scheduling cooperative emergency response: or how the meek shall overcome the greedy. IWCMC 2009: 598-602 - [c12]Zeki Bilgin, Bilal Khan:
Balancing power: tradeoffs between connection lifetime and control traffic in MANETS. IWCMC 2009: 883-887 - 2008
- [c11]Bilal Khan, Shaleeza Sohail:
Using ES Based Automated Software Clustering Approach to Achieve Consistent Decompositions. APSEC 2008: 429-436 - [c10]Jamie Levy, Jaroslaw Paduch, Bilal Khan:
Superimposing permutational covert channels onto reliable stream protocols. MALWARE 2008: 49-56 - 2007
- [c9]Joel O. Sandin, Bilal Khan:
Petrifying Worm Cultures: Scalable Detection and Immunization in Untrusted Environments. ICC 2007: 1423-1428 - 2006
- [c8]Delaram Kahrobaei, Bilal Khan:
A Non-Commutative Generalization of ElGamal Key Exchange using Polycyclic Groups. GLOBECOM 2006 - 2005
- [j8]Kiran R. Bhutani, Bilal Khan:
Distance Between Graphs Using Graph Labelings. Ars Comb. 77 (2005) - 2004
- [c7]Bilal Khan, Dardo D. Kleiner, David Talmadge, Abdella Battou:
The effect of wavelength advertisement on the performance of an optical routing protocol. GLOBECOM 2004: 1985-1988 - 2003
- [j7]Kiran R. Bhutani, Bilal Khan:
Optimal distribution of a hierarchy of network management agents. Inf. Sci. 149(4): 235-248 (2003) - 2002
- [j6]Abdella Battou, Spencer Marsh, Bilal Khan, Sean Mountcastle, David Talmadge, Daniel C. Lee:
SEAN for Modeling and Simulating ATM Signaling. Simul. 78(4): 231-238 (2002) - [j5]Abdella Battou, Bilal Khan, Daniel C. Lee, Spencer Marsh, Sean Mountcastle, David Talmadge:
CASiNO: component architecture for simulating network objects. Softw. Pract. Exp. 32(11): 1099-1128 (2002) - [c6]Kiran R. Bhutani, Bilal Khan:
Minimizing Communication Costs in Hierarchical Multi-Agent Systems. JCIS 2002: 1435-1442 - [c5]Kiran R. Bhutani, Bilal Khan, B. Roy:
Minimizing Computational Load and Communication Costs in Multi-agent Systems. IASTED PDCS 2002: 363-368 - 2001
- [c4]Bilal Khan, Dardo D. Kleiner, David Talmadge:
OPTIPRISM: a distributed hierarchical network management system for all-optical networks. GLOBECOM 2001: 1531-1535 - [c3]Bilal Khan, Dardo D. Kleiner, David Talmadge:
Towards an Agent-Based Distributed Hierarchical Network Management System for All-Optical Networks. MATA 2001: 103-113 - 2000
- [j4]Kiran R. Bhutani, Abdella Battou, Bilal Khan:
Two Approaches for Aggregation of Peer Group Topology in Hierarchical PNNI Networks. Intell. Autom. Soft Comput. 6(2): 125-134 (2000) - [c2]Sean Mountcastle, David Talmadge, Bilal Khan, Spencer Marsh, Abdella Battou, Daniel C. Lee:
Introducing SEAN: Signaling Entity for ATM networks. GLOBECOM 2000: 532-537
1990 – 1999
- 1999
- [j3]Abdella Battou, Bilal Khan, Sean Mountcastle:
PNNI and the Optimal Design of High-speed ATM Networks. Informatica (Slovenia) 23(3) (1999) - [j2]Abdella Battou, Bilal Khan, Sean Mountcastle:
PNNI And The Optimal Design Of High-Speed ATM Networks. Informatica (Slovenia) 23(4) (1999) - 1998
- [j1]Baruch Awerbuch, Yi Du, Bilal Khan, Yuval Shavitt:
Routing through networks with hierarchical topology aggregation. J. High Speed Networks 7(1): 57-73 (1998) - [c1]Baruch Awerbuch, Yi Du, Bilal Khan, Yuval Shavitt:
Routing through networks with hierarchical topology aggregation. ISCC 1998: 406-412
Coauthor Index
aka: Chaudhry Arshad Mehmood
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-13 21:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint