New copper complexes inducing bimodal death through apoptosis and autophagy in A549 cancer cells NS Gul, TM Khan, M Chen, KB Huang, C Hou, MI Choudhary, H Liang, ... Journal of Inorganic Biochemistry 213, 111260, 2020 | 39 | 2020 |
In vitro and in vivo anti-tumor activity of two gold (III) complexes with isoquinoline derivatives as ligands TM Khan, NS Gul, X Lu, JH Wei, YC Liu, H Sun, H Liang, C Orvig, ... European Journal of Medicinal Chemistry 163, 333-343, 2019 | 34 | 2019 |
History based forward and feedback mechanism in cooperative spectrum sensing including malicious users in cognitive radio network N Gul, IM Qureshi, A Omar, A Elahi, S Khan PloS one 12 (8), e0183387, 2017 | 34 | 2017 |
Defense against malicious users in cooperative spectrum sensing using genetic algorithm N Gul, IM Qureshi, A Elahi, I Rasool International Journal of Antennas and Propagation 2018, 1-11, 2018 | 33 | 2018 |
A genetic algorithm-based soft decision fusion scheme in cognitive iot networks with malicious users MS Khan, N Gul, J Kim, IM Qureshi, SM Kim Wireless Communications and Mobile Computing 2020, 1-10, 2020 | 32 | 2020 |
Support vector machine-based classification of malicious users in cognitive radio networks MS Khan, L Khan, N Gul, M Amir, J Kim, SM Kim Wireless Communications and Mobile Computing 2020, 1-11, 2020 | 31 | 2020 |
Rhodium (III) complexes with isoquinoline derivatives as potential anticancer agents: in vitro and in vivo activity studies TM Khan, NS Gul, X Lu, R Kumar, MI Choudhary, H Liang, ZF Chen Dalton Transactions 48 (30), 11469-11479, 2019 | 30 | 2019 |
A combination of double sided neighbor distance and genetic algorithm in cooperative spectrum sensing against malicious users N Gul, A Naveed, A Elahi, T SaleemKhattak, IM Qureshi 2017 14th International Bhurban Conference on Applied Sciences and …, 2017 | 23 | 2017 |
One-to-many relationship based kullback leibler divergence against malicious users in cooperative spectrum sensing N Gul, IM Qureshi, S Akbar, M Kamran, I Rasool Wireless Communications and Mobile Computing 2018, 2018 | 20 | 2018 |
Secured soft combination schemes against malicious-users in cooperative spectrum sensing N Gul, IM Qureshi, A Naveed, A Elahi, I Rasool Wireless Personal Communications 108, 389-408, 2019 | 17 | 2019 |
Boosted trees algorithm as reliable spectrum sensing scheme in the presence of malicious users N Gul, MS Khan, SM Kim, J Kim, A Elahi, Z Khalil Electronics 9 (6), 1038, 2020 | 15 | 2020 |
Interference reduction in cognitive radio networks using genetic and firefly algorithms A Elahi, IM Qureshi, M Atif, N Gul 2017 International Conference on Communication, Computing and Digital …, 2017 | 13 | 2017 |
Removal of organic pollutants through hydroxyl radical-based advanced oxidation processes ZUH Khan, NS Gul, S Sabahat, J Sun, K Tahir, NS Shah, N Muhammad, ... Ecotoxicology and Environmental Safety 267, 115564, 2023 | 12 | 2023 |
Differential evolution based reliable cooperative spectrum sensing in the presence of malicious users N Gul, IM Qureshi, MS Khan, A Elahi, S Akbar Wireless Personal Communications 114, 123-147, 2020 | 11 | 2020 |
Robust spectrum sensing via double-sided neighbor distance based on genetic algorithm in cognitive radio networks N Gul, MS Khan, J Kim, SM Kim Mobile Information Systems 2020, 1-10, 2020 | 11 | 2020 |
Simulation and performance evaluations of the new GPS L5 and L1 signals T Saleem, M Usman, A Elahi, N Gul Wireless Communications and Mobile Computing 2017, 2017 | 10 | 2017 |
An Intelligent Blockchain-based Secure Link Failure Recovery Framework for Software-defined Internet-of-Things J Ali, G Shan, N Gul, B Roh Journal of Grid Computing 21 (4), 57, 2023 | 8 | 2023 |
Differential evolution based machine learning scheme for secure cooperative spectrum sensing system N Gul, SM Kim, S Ahmed, MS Khan, J Kim Electronics 10 (14), 1687, 2021 | 8 | 2021 |
A comparative analysis of different outlier detection techniques in cognitive radio networks with malicious users A Ahmed, MS Khan, N Gul, I Uddin, SM Kim, J Kim Wireless Communications and Mobile Computing 2020, 1-18, 2020 | 8 | 2020 |
Particle swarm optimization in the presence of malicious users in cognitive IoT networks with data N Gul, MS Khan, SM Kim, M St-Hilaire, I Ullah, J Kim Scientific Programming 2020, 1-11, 2020 | 8 | 2020 |