Alert button
Picture for Muhammad Ali

Muhammad Ali

Alert button

Vision Transformers in Medical Computer Vision -- A Contemplative Retrospection

Add code
Bookmark button
Alert button
Mar 29, 2022
Arshi Parvaiz, Muhammad Anwaar Khalid, Rukhsana Zafar, Huma Ameer, Muhammad Ali, Muhammad Moazam Fraz

Figure 1 for Vision Transformers in Medical Computer Vision -- A Contemplative Retrospection
Figure 2 for Vision Transformers in Medical Computer Vision -- A Contemplative Retrospection
Figure 3 for Vision Transformers in Medical Computer Vision -- A Contemplative Retrospection
Figure 4 for Vision Transformers in Medical Computer Vision -- A Contemplative Retrospection
Viaarxiv icon

Survey on Self-supervised Representation Learning Using Image Transformations

Add code
Bookmark button
Alert button
Feb 17, 2022
Muhammad Ali, Sayed Hashim

Figure 1 for Survey on Self-supervised Representation Learning Using Image Transformations
Figure 2 for Survey on Self-supervised Representation Learning Using Image Transformations
Figure 3 for Survey on Self-supervised Representation Learning Using Image Transformations
Figure 4 for Survey on Self-supervised Representation Learning Using Image Transformations
Viaarxiv icon

TransformNet: Self-supervised representation learning through predicting geometric transformations

Add code
Bookmark button
Alert button
Feb 08, 2022
Sayed Hashim, Muhammad Ali

Figure 1 for TransformNet: Self-supervised representation learning through predicting geometric transformations
Figure 2 for TransformNet: Self-supervised representation learning through predicting geometric transformations
Figure 3 for TransformNet: Self-supervised representation learning through predicting geometric transformations
Figure 4 for TransformNet: Self-supervised representation learning through predicting geometric transformations
Viaarxiv icon

SubOmiEmbed: Self-supervised Representation Learning of Multi-omics Data for Cancer Type Classification

Add code
Bookmark button
Alert button
Feb 03, 2022
Sayed Hashim, Muhammad Ali, Karthik Nandakumar, Mohammad Yaqub

Figure 1 for SubOmiEmbed: Self-supervised Representation Learning of Multi-omics Data for Cancer Type Classification
Figure 2 for SubOmiEmbed: Self-supervised Representation Learning of Multi-omics Data for Cancer Type Classification
Figure 3 for SubOmiEmbed: Self-supervised Representation Learning of Multi-omics Data for Cancer Type Classification
Figure 4 for SubOmiEmbed: Self-supervised Representation Learning of Multi-omics Data for Cancer Type Classification
Viaarxiv icon

ARMAS: Active Reconstruction of Missing Audio Segments

Add code
Bookmark button
Alert button
Nov 23, 2021
Sachin Pokharel, Muhammad Ali, Zohra Cheddad, Abbas Cheddad

Figure 1 for ARMAS: Active Reconstruction of Missing Audio Segments
Figure 2 for ARMAS: Active Reconstruction of Missing Audio Segments
Figure 3 for ARMAS: Active Reconstruction of Missing Audio Segments
Figure 4 for ARMAS: Active Reconstruction of Missing Audio Segments
Viaarxiv icon

A proactive malicious software identification approach for digital forensic examiners

Add code
Bookmark button
Alert button
Sep 20, 2021
Muhammad Ali, Stavros Shiaeles, Nathan Clarke, Dimitrios Kontogeorgis

Figure 1 for A proactive malicious software identification approach for digital forensic examiners
Figure 2 for A proactive malicious software identification approach for digital forensic examiners
Figure 3 for A proactive malicious software identification approach for digital forensic examiners
Figure 4 for A proactive malicious software identification approach for digital forensic examiners
Viaarxiv icon

Malware Classification using Deep Learning based Feature Extraction and Wrapper based Feature Selection Technique

Add code
Bookmark button
Alert button
Nov 26, 2019
Muhammad Furqan Rafique, Muhammad Ali, Aqsa Saeed Qureshi, Asifullah Khan, Anwar Majid Mirza

Figure 1 for Malware Classification using Deep Learning based Feature Extraction and Wrapper based Feature Selection Technique
Figure 2 for Malware Classification using Deep Learning based Feature Extraction and Wrapper based Feature Selection Technique
Figure 3 for Malware Classification using Deep Learning based Feature Extraction and Wrapper based Feature Selection Technique
Figure 4 for Malware Classification using Deep Learning based Feature Extraction and Wrapper based Feature Selection Technique
Viaarxiv icon