


default search action
Sohail Asghar
- > Home > Persons > Sohail Asghar
Publications
- 2026
[j54]Arshad Iqbal
, Sohail Asghar
, Manzoor Ilahi Tamimy:
A multilayered deep learning framework for cyber attack detection and mitigation in a heterogeneous IIoT ecosystem. J. Inf. Secur. Appl. 96: 104301 (2026)- 2025
[j52]Sarfraz Bibi
, Sohail Asghar
, Muhammad Zubair
:
Breaking Barriers in URDU WSD: The Transfer Learning Enriched MAKS Framework. ACM Trans. Asian Low Resour. Lang. Inf. Process. 24(8): 88:1-88:12 (2025)- 2024
[j51]Sarfraz Bibi
, Sohail Asghar
, Muhammad Zubair
:
Sense Unveiled: Enhancing Urdu Corpus for Nuanced Word Sense Disambiguation. IEEE Access 12: 126329-126343 (2024)
[j49]Kabeer Ahmed Bhatti
, Sohail Asghar
, Sheneela Naz:
Multi-objective fuzzy krill herd congestion control algorithm for WSN. Multim. Tools Appl. 83(1): 2093-2121 (2024)
[j48]Kabeer Ahmed Bhatti
, Sohail Asghar
, Imran Ali Qureshi
:
Self-adaptive bifold-objective rate optimization algorithm for Wireless Sensor Networks. Simul. Model. Pract. Theory 135: 102984 (2024)
[j47]Kabeer Ahmed Bhatti
, Sohail Asghar
, Bilal Rauf
, Imran Ali Qureshi
:
A multi-objective integrated PID controller combined with NSGA-III for minimizing congestion in WSNs. Wirel. Networks 30(3): 1423-1439 (2024)- 2023
[j46]Imran Ali Qureshi
, Sohail Asghar, Muhammad Asim Noor:
FuCWO: a novel fuzzy-based approach of contention window optimization for IEEE-802.15.6 WBANs. Appl. Intell. 53(10): 12132-12148 (2023)
[j45]Hasna Arshad, Sohail Asghar, Muhammad Asim Noor:
A framework for eGovernment project success: an exploratory study using systematic literature review and empirical investigation. Electron. Gov. an Int. J. 19(1): 22-54 (2023)
[j43]Imran Ali Qureshi
, Sohail Asghar:
A Systematic Review of the IEEE-802.11 Standard's Enhancements and Limitations. Wirel. Pers. Commun. 131(4): 2539-2572 (2023)- 2022
[j39]Sofia Kanwal, Sohail Asghar, Hazrat Ali
:
Feature selection enhancement and feature space visualization for speech-based emotion recognition. PeerJ Comput. Sci. 8: e1091 (2022)
[j38]Tehseen Abbasi, Yaser Hafeez, Sohail Asghar, Shariq Hussain
, Shunkun Yang, Sadia Ali:
Towards a component-based system model to improve the quality of highly configurable systems. PeerJ Comput. Sci. 8: e912 (2022)
[j37]Nouman Ahmad
, Sohail Asghar, Saira Andleeb Gillani:
Transfer learning-assisted multi-resolution breast cancer histopathological images classification. Vis. Comput. 38(8): 2751-2770 (2022)
[i1]Sofia Kanwal, Sohail Asghar, Hazrat Ali
:
Feature Selection Enhancement and Feature Space Visualization for Speech-Based Emotion Recognition. CoRR abs/2208.09269 (2022)- 2021
[j35]Sofia Kanwal
, Sohail Asghar
:
Speech Emotion Recognition Using Clustering Based GA-Optimized Feature Set. IEEE Access 9: 125830-125842 (2021)
[j31]Yaser Hafeez, Sohail Asghar, Bisma Arif, Sadia Ali:
Role of situational method engineering to improve visual information systems in agile distributed environment. Multim. Tools Appl. 80(6): 8881-8908 (2021)
[j30]Syed Atif Moqurrab
, Umair Ayub, Adeel Anjum
, Sohail Asghar
, Gautam Srivastava
:
An Accurate Deep Learning Model for Clinical Entity Recognition From Clinical Notes. IEEE J. Biomed. Health Informatics 25(10): 3804-3811 (2021)
[j29]Imran Ali Qureshi
, Sohail Asghar:
A genetic fuzzy contention window optimization approach for IEEE 802.11 WLANs. Wirel. Networks 27(4): 2323-2336 (2021)- 2020
[j28]Hasna Arshad
, Sohail Asghar
:
An Empirically-Derived Taxonomy of eGovernment Challenges. IEEE Access 8: 41128-41146 (2020)
[j26]Adnan Ishaq
, Sohail Asghar
, Saira Andleeb Gillani:
Aspect-Based Sentiment Analysis Using a Hybridized Approach Based on CNN and GA. IEEE Access 8: 135499-135512 (2020)
[j24]Sadia Ali, Yaser Hafeez, Sohail Asghar, Asif Nawaz
, Saqib Saeed
:
Aspect-based requirements mining technique to improve prioritisation process: multi-stakeholder perspective. IET Softw. 14(5): 482-492 (2020)
[j23]Saif ur Rehman
, Sohail Asghar:
Online social network trend discovery using frequent subgraph mining. Soc. Netw. Anal. Min. 10(1): 67 (2020)- 2019
[j22]Mirza Amaad Ul Haq Tahir
, Sohail Asghar, Awais Manzoor
, Muhammad Asim Noor:
A Classification Model For Class Imbalance Dataset Using Genetic Programming. IEEE Access 7: 71013-71037 (2019)
[j21]Moubeen Farooq Khan, Sohail Asghar, Manzoor Illahi Tamimi
, Muhammad Asim Noor:
Multi-Objective Transport System Based on Regression Analysis and Genetic Algorithm Using Transport Data. IEEE Access 7: 81121-81131 (2019)
[j19]Asif Nawaz
, Sohail Asghar, Syed Husnain Abbas Naqvi:
A segregational approach for determining aspect sentiments in social media analysis. J. Supercomput. 75(5): 2584-2602 (2019)- 2018
[j18]Saif ur Rehman
, Sohail Asghar, Simon James Fong
:
Optimized and Frequent Subgraphs: How Are They Related? IEEE Access 6: 37237-37249 (2018)
[j17]Sidra Ijaz
, Faheel A. Hashmi, Sohail Asghar, Masoom Alam:
Vector Based Genetic Algorithm to optimize predictive analysis in network security. Appl. Intell. 48(5): 1086-1096 (2018)
[j16]Asif Nawaz, Sohail Asghar, Muhammad Rizwan Rashid Rana:
Aspect based Construction of Software-Specific Words Similarity Database. Balt. J. Mod. Comput. 6(4) (2018)
[c26]Saif ur Rehman, Sohail Asghar, Simon Fong:
An Efficient Ranking Scheme for Frequent Subgraph Patterns. ICMLC 2018: 257-262- 2017
[j12]Hafiz Muhammad Faisal, Munir Ahmad, Sohail Asghar, Atta Rahman:
Intelligent quranic story builder. Int. J. Hybrid Intell. Syst. 14(1-2): 41-48 (2017)- 2016
[j10]Muhammad Usman, M. Usman, Sohail Asghar:
A fuzzy-based methodology for accurate classification and prediction in large datasets. J. Intell. Fuzzy Syst. 31(3): 1759-1768 (2016)- 2015
[c24]Shahid Abid, Sohail Asghar, Zhuang Yan, Simon Fong:
Hidden Markov Model Based Character Segmentation Factor Applied To Urdu Script. ICADIWT 2015: 39-51
[c23]Muhammad Zubair Hasan Ansari, Sohail Asghar, Zhuang Yan, Simon Fong:
A Data Modification Technique in PPDM Based on Ant Colony Optimization Approach. ICADIWT 2015: 139-149
[c22]Tayyeba Naseer, Sohail Asghar, Zhuang Yan, Simon Fong:
A Comparative Analysis of Pruning Methods for C4.5 and Fuzzy C4.5. ICADIWT 2015: 304-312- 2014
[c21]Saadia Sultana, Yasir Hafeez Motla, Sohail Asghar, Muhammad Jamal, Romana Azad:
A hybrid model by integrating agile practices for Pakistani software industry. CONIELECOMP 2014: 256-262
[c20]Khalid Iqbal, Xu-Cheng Yin
, Hong-Wei Hao, Sohail Asghar, Hazrat Ali
:
Bayesian network scores based text localization in scene images. IJCNN 2014: 2218-2225- 2012
[e1]Simon Fong, Pit Pichappan, Sabah Mohammed, Patrick Hung, Sohail Asghar:
Seventh International Conference on Digital Information Management, ICDIM 2012, Macau, Macao, August 22-24, 2012. IEEE 2012, ISBN 978-1-4673-2428-1 [contents]- 2011
[j5]Khalid Iqbal, Sohail Asghar, Abdulrehman Mirza:
Hiding Sensitive XML Association Rules With Supervised Learning Technique. Intell. Inf. Manag. 3(6): 219-229 (2011)
[j4]Mohsin Naqvi, Kashif Hussain, Sohail Asghar, Simon Fong:
Role of Segment Progressive Filter in Dynamic Data mining. J. Digit. Inf. Manag. 9(4): 171-175 (2011)
[c16]Khalid Iqbal, Sohail Asghar, Simon Fong:
A PPDM model using Bayesian Network for hiding sensitive XML Association Rules. ICDIM 2011: 30-35
[c15]Talha Anwar, Sohail Asghar, Simon Fong:
Bayesian based subgroup discovery. ICDIM 2011: 154-161
[c14]Sheneela Naz, Sohail Asghar, Simon Fong, Amir Qayyum:
Multi-way Association Clustering Analysis on Adaptive Real-Time Multicast Data. NDT 2011: 383-394- 2010
[c12]Ehsan Elahi
, Najmul Hassan, Sohail Asghar, Amir Qayyum:
Performance Modeling of Bandwidth Aggregation for TCP Connections. HPCC 2010: 689-694
[c11]Muhammad Usman, Sohail Asghar, Simon Fong
:
Data mining and automatic OLAP schema generation. ICDIM 2010: 35-43
[c10]Munir Ahmad, Sohail Asghar, Muhammad Abdul Qadir
, Tariq Ali:
Graph based query trimming algorithm for relational data semantic cache. MEDES 2010: 47-52- 2009
[c7]Muhammad Usman, Sohail Asghar, Simon Fong:
A Conceptual Model for Combining Enhanced OLAP and Data Mining Systems. NCM 2009: 1958-1963
[c6]Khalid Iqbal, Sohail Asghar:
Generating Hierarchical Association Rules with the Use of Bayesian Network. NSS 2009: 528-533- 2008
[c4]Sohail Asghar, Abdul Mateen:
Models for Automated Risk Mitigating Procedures and Tools Development. Enterprise Information Systems and Web Technologies 2008: 33-40

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-02-26 23:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID






