Follow
Gul Jabeen
Gul Jabeen
Faculty Member at Karakoram International University, Gilgit, Pakistan, PhD Candidate at Tsinghua
Verified email at kiu.edu.pk - Homepage
Title
Cited by
Cited by
Year
Machine-learning algorithms for mapping debris-covered glaciers: the Hunza Basin case study
AA Khan, A Jamil, D Hussain, M Taj, G Jabeen, MK Malik
Ieee Access 8, 12725-12734, 2020
492020
Surface remeshing: A systematic literature review of methods and research directions
D Khan, A Plopski, Y Fujimoto, M Kanbara, G Jabeen, YJ Zhang, X Zhang, ...
IEEE transactions on visualization and computer graphics 28 (3), 1680-1713, 2020
352020
A low-cost interactive writing board for primary education using distinct augmented reality markers
D Khan, I Rehman, S Ullah, W Ahmad, Z Cheng, G Jabeen, H Kato
Sustainability 11 (20), 5720, 2019
192019
An improved software reliability prediction model by using high precision error iterative analysis method
G Jabeen, P Luo, W Afzal
Software Testing, Verification and Reliability 29 (6-7), e1710, 2019
182019
Do commercial banks benefited from the belt and road initiative? A three-stage DEA-tobit-NN analysis
AA Shah, DD Wu, V Korotkov, G Jabeen
IEEE Access 7, 37936-37949, 2019
182019
Fingertip gestures recognition using leap motion and camera for interaction with virtual environment
IU Rehman, S Ullah, D Khan, S Khalid, A Alam, G Jabeen, I Rabbi, ...
Electronics 9 (12), 1986, 2020
172020
Machine learning techniques for software vulnerability prediction: a comparative study
G Jabeen, S Rahim, W Afzal, D Khan, AA Khan, Z Hussain, T Bibi
Applied Intelligence 52 (15), 17614-17635, 2022
152022
Similarity measures of Pythagorean fuzzy sets with applications to pattern recognition and multicriteria decision making with Pythagorean TOPSIS
Z Hussain, S Abbas, S Hussain, Z Ali, G Jabeen
Journal of mechanics of continua and mathematical sciences 16 (6), 64-86, 2021
132021
DroidMD: an efficient and scalable android malware detection approach at source code level
J Akram, M Mumtaz, G Jabeen, P Luo
International Journal of Information and Computer Security 15 (2-3), 299-321, 2021
132021
A unified measurement solution of software trustworthiness based on social-to-software framework
X Yang, G Jabeen, P Luo, XL Zhu, MH Liu
Journal of Computer Science and Technology 33, 603-620, 2018
132018
An Integrated Software Vulnerability Discovery Model based on Artificial Neural Network
AAS Gul Jabeen, Luo Ping, Junaid Akram
The 31st International Conference on Software Engineering and Knowledge …, 2019
7*2019
The concept model of software trustworthiness based on trust-theory of sociology
X Yang, P Luo, G Jabeen
Acta Electronica Sinica 47 (11), 2344-2353, 2019
62019
School level ICT policy plan for rural areas of developing countries: Case study is Gilgit Baltistan Pakistan
S Rahim, G Sahar, G Jabeen, I Ali, SMA Shah
2016 Sixth International Conference on Innovative Computing Technology …, 2016
62016
Tuned schema merging (tusme)
G Jabeen, N Masood
2011 5th International Conference on Software, Knowledge Information …, 2011
62011
Mobile phone technologies in coping with the challenges and opportunities of CPEC by the Youth of Rural Mountainous Areas of Gilgit-Baltistan, Pakistan
S Rahim, SB Qutoshi, G Sahar, G Jabeen, I Ali
Mobile Information Systems 2020, 1-9, 2020
52020
A unified measurable software trustworthy model based on vulnerability loss speed index
G Jabeen, L Ping
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
52019
Social Threats Modelling with i*.
L Liu, E Yu, G Jabeen
iStar, 97-102, 2016
52016
Vulnerability severity prediction model for software based on Markov chain
G Jabeen, X Yang, P Luo
International Journal of Information and Computer Security 15 (2-3), 109-140, 2021
42021
Application of Grey-Markov Chain Model in Software Reliability Prediction
GJXYPLS Rahim
Journal of Computers 14 (027), 2019
42019
Hybrid software reliability prediction model based on residual errors
G Jabeen, X Yang, L Ping, S Rahim, G Sahar, AA Shah
2017 8th IEEE International Conference on Software Engineering and Service …, 2017
42017
The system can't perform the operation now. Try again later.
Articles 1–20