Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Abid Khan
@article{DBLP:journals/iot/GilaniAKSMS24, author = {Syeda Mahnoor Gilani and Adeel Anjum and Abid Khan and Madiha Haider Syed and Syed Atif Moqurrab and Gautam Srivastava}, title = {A robust Internet of Drones security surveillance communication network based on {IOTA}}, journal = {Internet Things}, volume = {25}, pages = {101066}, year = {2024}, url = {https://doi.org/10.1016/j.iot.2024.101066}, doi = {10.1016/J.IOT.2024.101066}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iot/GilaniAKSMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/BatoolAKIMJ24, author = {Hajira Batool and Adeel Anjum and Abid Khan and Stefano Izzo and Carlo Mazzocca and Gwanggil Jeon}, title = {A secure and privacy preserved infrastructure for VANETs based on federated learning with local differential privacy}, journal = {Inf. Sci.}, volume = {652}, pages = {119717}, year = {2024}, url = {https://doi.org/10.1016/j.ins.2023.119717}, doi = {10.1016/J.INS.2023.119717}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/BatoolAKIMJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/IftikharAKSJ23, author = {Zainab Iftikhar and Adeel Anjum and Abid Khan and Munam Ali Shah and Gwanggil Jeon}, title = {Privacy preservation in the internet of vehicles using local differential privacy and {IOTA} ledger}, journal = {Clust. Comput.}, volume = {26}, number = {6}, pages = {3361--3377}, year = {2023}, url = {https://doi.org/10.1007/s10586-023-04002-0}, doi = {10.1007/S10586-023-04002-0}, timestamp = {Sat, 28 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/IftikharAKSJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/IftikharAKSJ23a, author = {Zainab Iftikhar and Adeel Anjum and Abid Khan and Munam Ali Shah and Gwanggil Jeon}, title = {Correction: Privacy preservation in the internet of vehicles using local differential privacy and {IOTA} ledger}, journal = {Clust. Comput.}, volume = {26}, number = {6}, pages = {3379}, year = {2023}, url = {https://doi.org/10.1007/s10586-023-04051-5}, doi = {10.1007/S10586-023-04051-5}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/IftikharAKSJ23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ZafarRJUAK23, author = {Waseeq Ul Islam Zafar and Muhammad Atif Ur Rehman and Farhana Jabeen and Rehmat Ullah and Ghulam Abbas and Abid Khan}, title = {Decentralized Receiver-based Link Stability-aware Forwarding Scheme for NDN-based VANETs}, journal = {Comput. Networks}, volume = {236}, pages = {109996}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109996}, doi = {10.1016/J.COMNET.2023.109996}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ZafarRJUAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cssc/KhanBRUA23, author = {Abid Khan and Zahid Bashir and H. M. Kashif Rasheed and Mahmood Ulhassan and Rashid Ahmed}, title = {Construction of minimal circular nearly strongly balanced repeated measurements designs and their conversion}, journal = {Commun. Stat. Simul. Comput.}, volume = {52}, number = {12}, pages = {5749--5758}, year = {2023}, url = {https://doi.org/10.1080/03610918.2021.2016831}, doi = {10.1080/03610918.2021.2016831}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cssc/KhanBRUA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcan/YakubuKKJJ23, author = {Bello Musa Yakubu and Majid Iqbal Khan and Abid Khan and Farhana Jabeen and Gwanggil Jeon}, title = {Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home}, journal = {Digit. Commun. Networks}, volume = {9}, number = {2}, pages = {383--392}, year = {2023}, url = {https://doi.org/10.1016/j.dcan.2023.01.013}, doi = {10.1016/J.DCAN.2023.01.013}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcan/YakubuKKJJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcan/KanwalAAKJ23, author = {Tehsin Kanwal and Hasina Attaullah and Adeel Anjum and Abid Khan and Gwanggil Jeon}, title = {Fuzz-classification (\emph{p}, \emph{l})-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches}, journal = {Digit. Commun. Networks}, volume = {9}, number = {5}, pages = {1131--1140}, year = {2023}, url = {https://doi.org/10.1016/j.dcan.2022.09.025}, doi = {10.1016/J.DCAN.2022.09.025}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcan/KanwalAAKJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/SikandarMAKJ23, author = {Hira S. Sikandar and Saif Ur Rehman Malik and Adeel Anjum and Abid Khan and Gwanggil Jeon}, title = {Cohort-based kernel principal component analysis with Multi-path Service Routing in Federated Learning}, journal = {Future Gener. Comput. Syst.}, volume = {149}, pages = {518--530}, year = {2023}, url = {https://doi.org/10.1016/j.future.2023.07.037}, doi = {10.1016/J.FUTURE.2023.07.037}, timestamp = {Sat, 28 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/SikandarMAKJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/peerj-cs/FazalKASKR23, author = {Rabeeha Fazal and Razaullah Khan and Adeel Anjum and Madiha Haider Syed and Abid Khan and Semeen Rehman}, title = {Improved angelization technique against background knowledge attack for 1:M microdata}, journal = {PeerJ Comput. Sci.}, volume = {9}, pages = {e1255}, year = {2023}, url = {https://doi.org/10.7717/peerj-cs.1255}, doi = {10.7717/PEERJ-CS.1255}, timestamp = {Thu, 18 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/peerj-cs/FazalKASKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/quantum/GustafsonLKKKAORI23, author = {Erik J. Gustafson and Andy C. Y. Li and Abid Khan and Joonho Kim and Doga Murat Kurkcuoglu and M. Sohaib Alam and Peter P. Orth and Armin Rahmani and Thomas Iadecola}, title = {Preparing quantum many-body scar states on quantum computers}, journal = {Quantum}, volume = {7}, pages = {1171}, year = {2023}, url = {https://doi.org/10.22331/q-2023-11-07-1171}, doi = {10.22331/Q-2023-11-07-1171}, timestamp = {Thu, 28 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/quantum/GustafsonLKKKAORI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AhmedDHKK23, author = {Mansoor Ahmed and Amil Rohani Dar and Markus Helfert and Abid Khan and Jungsuk Kim}, title = {Data Provenance in Healthcare: Approaches, Challenges, and Future Directions}, journal = {Sensors}, volume = {23}, number = {14}, pages = {6495}, year = {2023}, url = {https://doi.org/10.3390/s23146495}, doi = {10.3390/S23146495}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/AhmedDHKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-07743, author = {Abid Khan and Chia{-}Hao Lee and Pinshane Y. Huang and Bryan K. Clark}, title = {Using CycleGANs to Generate Realistic {STEM} Images for Machine Learning}, journal = {CoRR}, volume = {abs/2301.07743}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.07743}, doi = {10.48550/ARXIV.2301.07743}, eprinttype = {arXiv}, eprint = {2301.07743}, timestamp = {Fri, 27 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-07743.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WaheedSMKMAS22, author = {Abdul Waheed and Munam Ali Shah and Syed Muhammad Mohsin and Abid Khan and Carsten Maple and Sheraz Aslam and Shahab Shamshirband}, title = {A Comprehensive Review of Computing Paradigms, Enabling Computation Offloading and Task Execution in Vehicular Networks}, journal = {{IEEE} Access}, volume = {10}, pages = {3580--3600}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2021.3138219}, doi = {10.1109/ACCESS.2021.3138219}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WaheedSMKMAS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/AliKAJ22, author = {Ahmad Ali and Abid Khan and Mansoor Ahmed and Gwanggil Jeon}, title = {{BCALS:} Blockchain-based secure log management system for cloud computing}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {33}, number = {4}, year = {2022}, url = {https://doi.org/10.1002/ett.4272}, doi = {10.1002/ETT.4272}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/AliKAJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/KhanTAMYKRM22, author = {Razaullah Khan and Xiaofeng Tao and Adeel Anjum and Saif Ur Rehman Malik and Shui Yu and Abid Khan and Waheed ur Rehman and Hassan Malik}, title = {({\(\tau\)}, m)-slicedBucket privacy model for sequential anonymization for improving privacy and utility}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {33}, number = {6}, year = {2022}, url = {https://doi.org/10.1002/ett.4130}, doi = {10.1002/ETT.4130}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/KhanTAMYKRM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/KanwalMAKRJ22, author = {Tehsin Kanwal and Syed Atif Moqurrab and Adeel Anjum and Abid Khan and Joel J. P. C. Rodrigues and Gwanggil Jeon}, title = {Formal verification and complexity analysis of confidentiality aware textual clinical documents framework}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {12}, pages = {10380--10399}, year = {2022}, url = {https://doi.org/10.1002/int.22533}, doi = {10.1002/INT.22533}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijis/KanwalMAKRJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HameedGAKK22, author = {Khizar Hameed and Saurabh Garg and Muhammad Bilal Amin and Byeong Kang and Abid Khan}, title = {A context-aware information-based clone node attack detection scheme in Internet of Things}, journal = {J. Netw. Comput. Appl.}, volume = {197}, pages = {103271}, year = {2022}, url = {https://doi.org/10.1016/j.jnca.2021.103271}, doi = {10.1016/J.JNCA.2021.103271}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/HameedGAKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcbb/ArifKAKGKY22, author = {Muhammad Arif and Muhammad Kabir and Saeed Ahmed and Abid Khan and Fang Ge and Adel Khelifi and Dong{-}Jun Yu}, title = {DeepCPPred: {A} Deep Learning Framework for the Discrimination of Cell-Penetrating Peptides and Their Uptake Efficiencies}, journal = {{IEEE} {ACM} Trans. Comput. Biol. Bioinform.}, volume = {19}, number = {5}, pages = {2749--2759}, year = {2022}, url = {https://doi.org/10.1109/TCBB.2021.3102133}, doi = {10.1109/TCBB.2021.3102133}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcbb/ArifKAKGKY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/KhanSMAJ22, author = {Abid Khan and Furqan Shahid and Carsten Maple and Awais Ahmad and Gwanggil Jeon}, title = {Toward Smart Manufacturing Using Spiral Digital Twin Framework and Twinchain}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {18}, number = {2}, pages = {1359--1366}, year = {2022}, url = {https://doi.org/10.1109/TII.2020.3047840}, doi = {10.1109/TII.2020.3047840}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/KhanSMAJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/MoqurrabAKAAJ22, author = {Syed Atif Moqurrab and Adeel Anjum and Abid Khan and Mansoor Ahmed and Awais Ahmad and Gwanggil Jeon}, title = {\emph{Deep-Confidentiality}: An IoT-Enabled Privacy-Preserving Framework for Unstructured Big Biomedical Data}, journal = {{ACM} Trans. Internet Techn.}, volume = {22}, number = {2}, pages = {42:1--42:21}, year = {2022}, url = {https://doi.org/10.1145/3421509}, doi = {10.1145/3421509}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toit/MoqurrabAKAAJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-00074, author = {M. Rahman and Abid Khan and Sayeed Anowar and Md. Al Imran and Richa Verma and Dinesh Kumar and Kazuma Kobayashi and Syed B. Alam}, title = {Leveraging Industry 4.0 - Deep Learning, Surrogate Model and Transfer Learning with Uncertainty Quantification Incorporated into Digital Twin for Nuclear System}, journal = {CoRR}, volume = {abs/2210.00074}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.00074}, doi = {10.48550/ARXIV.2210.00074}, eprinttype = {arXiv}, eprint = {2210.00074}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-00074.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/KhanKJAJ21, author = {Hayat Mohammad Khan and Abid Khan and Farhana Jabeen and Adeel Anjum and Gwanggil Jeon}, title = {Fog-enabled secure multiparty computation based aggregation scheme in smart grid}, journal = {Comput. Electr. Eng.}, volume = {94}, pages = {107358}, year = {2021}, url = {https://doi.org/10.1016/j.compeleceng.2021.107358}, doi = {10.1016/J.COMPELECENG.2021.107358}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/KhanKJAJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/KhanKASJ21, author = {Nasir Ali Khan and Abid Khan and Mansoor Ahmad and Munam Ali Shah and Gwanggil Jeon}, title = {{URL} filtering using big data analytics in 5G networks}, journal = {Comput. Electr. Eng.}, volume = {95}, pages = {107379}, year = {2021}, url = {https://doi.org/10.1016/j.compeleceng.2021.107379}, doi = {10.1016/J.COMPELECENG.2021.107379}, timestamp = {Tue, 26 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/KhanKASJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/NasirSAKJ21, author = {Adeena Nasir and Munam Ali Shah and Ummarah Ashraf and Abid Khan and Gwanggil Jeon}, title = {An intelligent framework to predict socioeconomic impacts of {COVID-19} and public sentiments}, journal = {Comput. Electr. Eng.}, volume = {96}, number = {Part}, pages = {107526}, year = {2021}, url = {https://doi.org/10.1016/j.compeleceng.2021.107526}, doi = {10.1016/J.COMPELECENG.2021.107526}, timestamp = {Wed, 26 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/NasirSAKJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cii/SuhailHKH21, author = {Sabah Suhail and Rasheed Hussain and Abid Khan and Choong Seon Hong}, title = {Corrigendum to "Orchestrating product provenance story: When {IOTA} ecosystem meets electronics supply chain space" [Comput. Ind. 123 (December) {(2020)} 103334]}, journal = {Comput. Ind.}, volume = {128}, pages = {103392}, year = {2021}, url = {https://doi.org/10.1016/j.compind.2020.103392}, doi = {10.1016/J.COMPIND.2020.103392}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cii/SuhailHKH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/KanwalAK21, author = {Tehsin Kanwal and Adeel Anjum and Abid Khan}, title = {Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities}, journal = {Clust. Comput.}, volume = {24}, number = {1}, pages = {293--317}, year = {2021}, url = {https://doi.org/10.1007/s10586-020-03106-1}, doi = {10.1007/S10586-020-03106-1}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/KanwalAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KanwalAMHKMA21, author = {Tehsin Kanwal and Adeel Anjum and Saif Ur Rehman Malik and Sajjad Haider and Abid Khan and Umar Manzoor and Alia Asheralieva}, title = {A robust privacy preserving approach for electronic health records using multiple dataset with multiple sensitive attributes}, journal = {Comput. Secur.}, volume = {105}, pages = {102224}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102224}, doi = {10.1016/J.COSE.2021.102224}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KanwalAMHKMA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/YakubuKJK21, author = {Bello Musa Yakubu and Majid I. Khan and Nadeem Javaid and Abid Khan}, title = {Blockchain-based secure multi-resource trading model for smart marketplace}, journal = {Computing}, volume = {103}, number = {3}, pages = {379--400}, year = {2021}, url = {https://doi.org/10.1007/s00607-020-00886-7}, doi = {10.1007/S00607-020-00886-7}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computing/YakubuKJK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/KanwalAMKK21, author = {Tehsin Kanwal and Adeel Anjum and Saif Ur Rehman Malik and Abid Khan and Muazzam Ali Khan Khattak}, title = {Privacy preservation of electronic health records with adversarial attacks identification in hybrid cloud}, journal = {Comput. Stand. Interfaces}, volume = {78}, pages = {103522}, year = {2021}, url = {https://doi.org/10.1016/j.csi.2021.103522}, doi = {10.1016/J.CSI.2021.103522}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/KanwalAMKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/UllahSKJ21, author = {Ikram Ullah and Munam Ali Shah and Abid Khan and Gwanggil Jeon}, title = {Privacy-preserving multilevel obfuscation scheme for vehicular network}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {32}, number = {2}, year = {2021}, url = {https://doi.org/10.1002/ett.4204}, doi = {10.1002/ETT.4204}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/UllahSKJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/KanwalAKAJ21, author = {Tehsin Kanwal and Adeel Anjum and Abid Khan and Alia Asheralieva and Gwanggil Jeon}, title = {A formal adversarial perspective: Secure and efficient electronic health records collection scheme for multi-records datasets}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {32}, number = {8}, year = {2021}, url = {https://doi.org/10.1002/ett.4180}, doi = {10.1002/ETT.4180}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ett/KanwalAKAJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/JabeenKHRK21, author = {Farhana Jabeen and Zia{-}ur{-}Rehman Khan and Zara Hamid and Zobia Rehman and Abid Khan}, title = {Adaptive and survivable trust management for Internet of Things systems}, journal = {{IET} Inf. Secur.}, volume = {15}, number = {5}, pages = {375--394}, year = {2021}, url = {https://doi.org/10.1049/ise2.12029}, doi = {10.1049/ISE2.12029}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/JabeenKHRK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/SuhailHKH21, author = {Sabah Suhail and Rasheed Hussain and Abid Khan and Choong Seon Hong}, title = {On the Role of Hash-Based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {1}, pages = {1--17}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3013019}, doi = {10.1109/JIOT.2020.3013019}, timestamp = {Sat, 09 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/SuhailHKH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/peerj-cs/AliAKAIH21, author = {Ahmad Ali and Mansoor Ahmed and Abid Khan and Adeel Anjum and Muhammad Ilyas and Markus Helfert}, title = {VisTAS: blockchain-based visible and trusted remote authentication system}, journal = {PeerJ Comput. Sci.}, volume = {7}, pages = {e516}, year = {2021}, url = {https://doi.org/10.7717/peerj-cs.516}, doi = {10.7717/PEERJ-CS.516}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/peerj-cs/AliAKAIH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/peerj-cs/AhmedAMKAT21, author = {Mansoor Ahmed and Kainat Ansar and Cal B. Muckley and Abid Khan and Adeel Anjum and Muhammad Talha}, title = {A semantic rule based digital fraud detection}, journal = {PeerJ Comput. Sci.}, volume = {7}, pages = {e649}, year = {2021}, url = {https://doi.org/10.7717/peerj-cs.649}, doi = {10.7717/PEERJ-CS.649}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/peerj-cs/AhmedAMKAT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/WaheedSKMU21, author = {Abdul Waheed and Munam Ali Shah and Abid Khan and Carsten Maple and Ikram Ullah}, title = {Hybrid Task Coordination Using Multi-Hop Communication in Volunteer Computing-Based VANETs}, journal = {Sensors}, volume = {21}, number = {8}, pages = {2718}, year = {2021}, url = {https://doi.org/10.3390/s21082718}, doi = {10.3390/S21082718}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/WaheedSKMU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/UllahSKMW21, author = {Ikram Ullah and Munam Ali Shah and Abid Khan and Carsten Maple and Abdul Waheed}, title = {Virtual Pseudonym-Changing and Dynamic Grouping Policy for Privacy Preservation in VANETs}, journal = {Sensors}, volume = {21}, number = {9}, pages = {3077}, year = {2021}, url = {https://doi.org/10.3390/s21093077}, doi = {10.3390/S21093077}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/UllahSKMW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ZafarKMAMA21, author = {Faheem Zafar and Abid Khan and Saif Ur Rehman Malik and Mansoor Ahmed and Carsten Maple and Adeel Anjum}, title = {MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus}, journal = {Sensors}, volume = {21}, number = {15}, pages = {5096}, year = {2021}, url = {https://doi.org/10.3390/s21155096}, doi = {10.3390/S21155096}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/ZafarKMAMA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/KhanDJP21, author = {Abid Khan and Sadia Din and Gwanggil Jeon and Francesco Piccialli}, title = {Lucy With Agents in the Sky: Trustworthiness of Cloud Storage for Industrial Internet of Things}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {17}, number = {2}, pages = {953--960}, year = {2021}, url = {https://doi.org/10.1109/TII.2020.2974493}, doi = {10.1109/TII.2020.2974493}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/KhanDJP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssci/UllahSK21, author = {Ikram Ullah and Munam Ali Shah and Abid Khan}, title = {Adaptive Grouping and Pseudonym Changing Policy for Protection of Vehicles Location Information in VANETs}, booktitle = {{IEEE} Symposium Series on Computational Intelligence, {SSCI} 2021, Orlando, FL, USA, December 5-7, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SSCI50451.2021.9659852}, doi = {10.1109/SSCI50451.2021.9659852}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssci/UllahSK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-15890, author = {Khizar Hameed and Saurabh Garg and Muhammad Bilal Amin and Byeong Kang and Abid Khan}, title = {A Context-Aware Information-Based Clone Node Attack Detection Scheme in Internet of Things}, journal = {CoRR}, volume = {abs/2106.15890}, year = {2021}, url = {https://arxiv.org/abs/2106.15890}, eprinttype = {arXiv}, eprint = {2106.15890}, timestamp = {Tue, 06 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-15890.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AmjidKS20, author = {Ayesha Amjid and Abid Khan and Munam Ali Shah}, title = {VANET-Based Volunteer Computing {(VBVC):} {A} Computational Paradigm for Future Autonomous Vehicles}, journal = {{IEEE} Access}, volume = {8}, pages = {71763--71774}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2974500}, doi = {10.1109/ACCESS.2020.2974500}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AmjidKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cam/KhanZ20, author = {Abid Khan and Yuanguo Zhu}, title = {New algorithms for parameter reduction of intuitionistic fuzzy soft sets}, journal = {Comput. Appl. Math.}, volume = {39}, number = {3}, year = {2020}, url = {https://doi.org/10.1007/s40314-020-01279-4}, doi = {10.1007/S40314-020-01279-4}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cam/KhanZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/ShahidKJ20, author = {Furqan Shahid and Abid Khan and Gwanggil Jeon}, title = {Post-quantum distributed ledger for internet of things}, journal = {Comput. Electr. Eng.}, volume = {83}, pages = {106581}, year = {2020}, url = {https://doi.org/10.1016/j.compeleceng.2020.106581}, doi = {10.1016/J.COMPELECENG.2020.106581}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/ShahidKJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cii/SuhailHKH20, author = {Sabah Suhail and Rasheed Hussain and Abid Khan and Choong Seon Hong}, title = {Orchestrating product provenance story: When {IOTA} ecosystem meets electronics supply chain space}, journal = {Comput. Ind.}, volume = {123}, pages = {103334}, year = {2020}, url = {https://doi.org/10.1016/j.compind.2020.103334}, doi = {10.1016/J.COMPIND.2020.103334}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cii/SuhailHKH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SuhailHAPKH20, author = {Sabah Suhail and Rasheed Hussain and Mohammad M. Abdellatif and Shashi Raj Pandey and Abid Khan and Choong Seon Hong}, title = {Provenance-enabled packet path tracing in the RPL-based internet of things}, journal = {Comput. Networks}, volume = {173}, pages = {107189}, year = {2020}, url = {https://doi.org/10.1016/j.comnet.2020.107189}, doi = {10.1016/J.COMNET.2020.107189}, timestamp = {Mon, 23 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/SuhailHAPKH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ShahidK20, author = {Furqan Shahid and Abid Khan}, title = {Smart Digital Signatures {(SDS):} {A} post-quantum digital signature scheme for distributed ledgers}, journal = {Future Gener. Comput. Syst.}, volume = {111}, pages = {241--253}, year = {2020}, url = {https://doi.org/10.1016/j.future.2020.04.042}, doi = {10.1016/J.FUTURE.2020.04.042}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/ShahidK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijpp/AhmedKAAH20, author = {Idrees Ahmed and Abid Khan and Adeel Anjum and Mansoor Ahmed and Muhammad Asif Habib}, title = {A Secure Provenance Scheme for Detecting Consecutive Colluding Users in Distributed Networks}, journal = {Int. J. Parallel Program.}, volume = {48}, number = {2}, pages = {344--366}, year = {2020}, url = {https://doi.org/10.1007/s10766-018-0601-y}, doi = {10.1007/S10766-018-0601-Y}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijpp/AhmedKAAH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/SaleemKMPMAJ20, author = {Ahsan Saleem and Abid Khan and Saif Ur Rehman Malik and Haris Pervaiz and Hassan Malik and Masoom Alam and Anish Jindal}, title = {{FESDA:} Fog-Enabled Secure Data Aggregation in Smart Grid IoT Network}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {7}, pages = {6132--6142}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2019.2957314}, doi = {10.1109/JIOT.2019.2957314}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/SaleemKMPMAJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ShahidKMC20, author = {Furqan Shahid and Abid Khan and Saif Ur Rehman Malik and Kim{-}Kwang Raymond Choo}, title = {{WOTS-S:} {A} Quantum Secure Compact Signature Scheme for Distributed Ledger}, journal = {Inf. Sci.}, volume = {539}, pages = {229--249}, year = {2020}, url = {https://doi.org/10.1016/j.ins.2020.05.024}, doi = {10.1016/J.INS.2020.05.024}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ShahidKMC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/BegAAAKBK20, author = {Saira Beg and Naveed Ahmad and Adeel Anjum and Mansoor Ahmad and Abid Khan and Faisal Baig and Ahmed Khan}, title = {S-box design based on optimize {LFT} parameter selection: a practical approach in recommendation system domain}, journal = {Multim. Tools Appl.}, volume = {79}, number = {17-18}, pages = {11667--11684}, year = {2020}, url = {https://doi.org/10.1007/s11042-019-08464-6}, doi = {10.1007/S11042-019-08464-6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/BegAAAKBK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/NazKAKDAJ20, author = {Farah Naz and Abid Khan and Mansoor Ahmed and Majid Iqbal Khan and Sadia Din and Awais Ahmad and Gwanggil Jeon}, title = {Watermarking as a service (WaaS) with anonymity}, journal = {Multim. Tools Appl.}, volume = {79}, number = {23-24}, pages = {16051--16075}, year = {2020}, url = {https://doi.org/10.1007/s11042-018-7074-2}, doi = {10.1007/S11042-018-7074-2}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/NazKAKDAJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/AslamA0K00A020, author = {Sidra Aslam and Mansoor Ahmed and Imran Ahmed and Abid Khan and Awais Ahmad and Muhammad Imran and Adeel Anjum and Shahid Hussain}, title = {{OBAC:} towards agent-based identification and classification of roles, objects, permissions {(ROP)} in distributed environment}, journal = {Multim. Tools Appl.}, volume = {79}, number = {45-46}, pages = {34363--34384}, year = {2020}, url = {https://doi.org/10.1007/s11042-020-08764-2}, doi = {10.1007/S11042-020-08764-2}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/AslamA0K00A020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/WaheedSKIKMK20, author = {Abdul Waheed and Munam Ali Shah and Abid Khan and Saif ul Islam and Suleman Khan and Carsten Maple and Muhammad Khurram Khan}, title = {Volunteer Computing in Connected Vehicles: Opportunities and Challenges}, journal = {{IEEE} Netw.}, volume = {34}, number = {5}, pages = {212--218}, year = {2020}, url = {https://doi.org/10.1109/MNET.011.1900603}, doi = {10.1109/MNET.011.1900603}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/WaheedSKIKMK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tem/ShafeeqZAK20, author = {Sehrish Shafeeq and Sherali Zeadally and Masoom Alam and Abid Khan}, title = {Curbing Address Reuse in the {IOTA} Distributed Ledger: {A} Cuckoo-Filter-Based Approach}, journal = {{IEEE} Trans. Engineering Management}, volume = {67}, number = {4}, pages = {1244--1255}, year = {2020}, url = {https://doi.org/10.1109/TEM.2019.2922710}, doi = {10.1109/TEM.2019.2922710}, timestamp = {Sat, 14 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tem/ShafeeqZAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/KhanTAHMKA20, author = {Razaullah Khan and Xiaofeng Tao and Adeel Anjum and Sajjad Haider and Saif Ur Rehman Malik and Abid Khan and Fatemeh Amiri}, title = {Privacy Preserving for Multiple Sensitive Attributes against Fingerprint Correlation Attack Satisfying c-Diversity}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2020}, pages = {8416823:1--8416823:18}, year = {2020}, url = {https://doi.org/10.1155/2020/8416823}, doi = {10.1155/2020/8416823}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/KhanTAHMKA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-10435, author = {Sabah Suhail and Rasheed Hussain and Abid Khan and Choong Seon Hong}, title = {On the Role of Hash-based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions}, journal = {CoRR}, volume = {abs/2004.10435}, year = {2020}, url = {https://arxiv.org/abs/2004.10435}, eprinttype = {arXiv}, eprint = {2004.10435}, timestamp = {Tue, 28 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-10435.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-08538, author = {Faheem Zafar and Abid Khan and Saif Ur Rehman Malik and Adeel Anjum and Mansoor Ahmed}, title = {MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus}, journal = {CoRR}, volume = {abs/2011.08538}, year = {2020}, url = {https://arxiv.org/abs/2011.08538}, eprinttype = {arXiv}, eprint = {2011.08538}, timestamp = {Wed, 18 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-08538.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AmeerSKSMIA19, author = {Saba Ameer and Munam Ali Shah and Abid Khan and Houbing Song and Carsten Maple and Saif ul Islam and Muhammad Nabeel Asghar}, title = {Comparative Analysis of Machine Learning Techniques for Predicting Air Quality in Smart Cities}, journal = {{IEEE} Access}, volume = {7}, pages = {128325--128338}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2925082}, doi = {10.1109/ACCESS.2019.2925082}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AmeerSKSMIA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KhanZ19, author = {Abid Khan and Yuanguo Zhu}, title = {A Novel Approach to Parameter Reduction of Fuzzy Soft Set}, journal = {{IEEE} Access}, volume = {7}, pages = {128956--128967}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2940484}, doi = {10.1109/ACCESS.2019.2940484}, timestamp = {Sat, 12 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KhanZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SarfrazAZK19, author = {Umair Sarfraz and Masoom Alam and Sherali Zeadally and Abid Khan}, title = {Privacy aware {IOTA} ledger: Decentralized mixing and unlinkable {IOTA} transactions}, journal = {Comput. Networks}, volume = {148}, pages = {361--372}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2018.11.019}, doi = {10.1016/J.COMNET.2018.11.019}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/SarfrazAZK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AhmedKAM19, author = {Idrees Ahmed and Abid Khan and Mansoor Ahmed and Saif Ur Rehman Malik}, title = {Order preserving secure provenance scheme for distributed networks}, journal = {Comput. Secur.}, volume = {82}, pages = {99--117}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2018.12.008}, doi = {10.1016/J.COSE.2018.12.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AhmedKAM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HaiderKAMKKM19, author = {Sajjad Haider and Tehsin Kanwal and Adeel Anjum and Saif Ur Rehman Malik and Ahmed Khan and Abid Khan and Umar Manzoor}, title = {An efficient privacy preserving protocol for dynamic continuous data collection}, journal = {Comput. Secur.}, volume = {86}, pages = {358--371}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2019.06.017}, doi = {10.1016/J.COSE.2019.06.017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HaiderKAMKKM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cssc/KhanASTG19, author = {Abid Khan and Rashid Ahmed and Farrukh Shehzad and Muhammad Hussain Tahir and Syed Shakir Ali Ghazali}, title = {Construction of circular partially balanced-Repeated measurement designs using cyclic shifts}, journal = {Commun. Stat. Simul. Comput.}, volume = {48}, number = {2}, pages = {506--515}, year = {2019}, url = {https://doi.org/10.1080/03610918.2017.1387661}, doi = {10.1080/03610918.2017.1387661}, timestamp = {Sat, 09 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cssc/KhanASTG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ShafeeqAK19, author = {Sehrish Shafeeq and Masoom Alam and Abid Khan}, title = {Privacy aware decentralized access control system}, journal = {Future Gener. Comput. Syst.}, volume = {101}, pages = {420--433}, year = {2019}, url = {https://doi.org/10.1016/j.future.2019.06.025}, doi = {10.1016/J.FUTURE.2019.06.025}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/ShafeeqAK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/KanwalJAMKAMSB19, author = {Tehsin Kanwal and Ather Abdul Jabbar and Adeel Anjum and Saif Ur Rehman Malik and Abid Khan and Naveed Ahmad and Umar Manzoor and Muhammad Naeem Shehzad and Muhammad A. Balubaid}, title = {Privacy-aware relationship semantics-based {XACML} access control model for electronic health records in hybrid cloud}, journal = {Int. J. Distributed Sens. Networks}, volume = {15}, number = {6}, year = {2019}, url = {https://doi.org/10.1177/1550147719846050}, doi = {10.1177/1550147719846050}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdsn/KanwalJAMKAMSB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/KanwalSAMCKAAK19, author = {Tehsin Kanwal and Sayed Ali Asjad Shaukat and Adeel Anjum and Saif Ur Rehman Malik and Kim{-}Kwang Raymond Choo and Abid Khan and Naveed Ahmad and Mansoor Ahmad and Samee U. Khan}, title = {Privacy-preserving model and generalization correlation attacks for 1: {M} data with multiple sensitive attributes}, journal = {Inf. Sci.}, volume = {488}, pages = {238--256}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2019.03.004}, doi = {10.1016/J.INS.2019.03.004}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/KanwalSAMCKAAK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/KhanZ19, author = {Abid Khan and Yuanguo Zhu}, title = {An improved algorithm for normal parameter reduction of soft set}, journal = {J. Intell. Fuzzy Syst.}, volume = {37}, number = {2}, pages = {2953--2968}, year = {2019}, url = {https://doi.org/10.3233/JIFS-190071}, doi = {10.3233/JIFS-190071}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jifs/KhanZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-04314, author = {Sabah Suhail and Choong Seon Hong and Abid Khan}, title = {Orchestrating Product Provenance Story: When {IOTA} {ECOSYSTEM} Meets The Electronics Supply Chain Space}, journal = {CoRR}, volume = {abs/1902.04314}, year = {2019}, url = {http://arxiv.org/abs/1902.04314}, eprinttype = {arXiv}, eprint = {1902.04314}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-04314.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YaseenAASKMASB18, author = {Saba Yaseen and Syed M. Ali Abbas and Adeel Anjum and Tanzila Saba and Abid Khan and Saif Ur Rehman Malik and Naveed Ahmad and Basit Shahzad and Ali Kashif Bashir}, title = {Improved Generalization for Secure Data Publishing}, journal = {{IEEE} Access}, volume = {6}, pages = {27156--27165}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2828398}, doi = {10.1109/ACCESS.2018.2828398}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YaseenAASKMASB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/ShafiqueKRBA18, author = {Usman Shafique and Abid Khan and Abdur Rehman and Faisal Bashir and Masoom Alam}, title = {Detection of rank attack in routing protocol for Low Power and Lossy Networks}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {73}, number = {7-8}, pages = {429--438}, year = {2018}, url = {https://doi.org/10.1007/s12243-018-0645-4}, doi = {10.1007/S12243-018-0645-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/ShafiqueKRBA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/HussainAKII18, author = {Altaf Hussain and Muhammad Aleem and Abid Khan and Muhammad Azhar Iqbal and Muhammad Arshad Islam}, title = {{RALBA:} a computation-aware load balancing scheduler for cloud computing}, journal = {Clust. Comput.}, volume = {21}, number = {3}, pages = {1667--1680}, year = {2018}, url = {https://doi.org/10.1007/s10586-018-2414-6}, doi = {10.1007/S10586-018-2414-6}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/HussainAKII18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AnjumMCKHKKAR18, author = {Adeel Anjum and Saif Ur Rehman Malik and Kim{-}Kwang Raymond Choo and Abid Khan and Asma Haroon and Sangeen Khan and Samee U. Khan and Naveed Ahmad and Basit Raza}, title = {An efficient privacy mechanism for electronic health records}, journal = {Comput. Secur.}, volume = {72}, pages = {196--211}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.09.014}, doi = {10.1016/J.COSE.2017.09.014}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AnjumMCKHKKAR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JamilKAAJJ18, author = {Fuzel Jamil and Abid Khan and Adeel Anjum and Mansoor Ahmed and Farhana Jabeen and Nadeem Javaid}, title = {Secure provenance using an authenticated data structure approach}, journal = {Comput. Secur.}, volume = {73}, pages = {34--56}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.10.005}, doi = {10.1016/J.COSE.2017.10.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JamilKAAJJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/HameedKAAR18, author = {Khizar Hameed and Abid Khan and Mansoor Ahmed and Goutham Reddy Alavalapati and M. Mazhar Rathore}, title = {Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks}, journal = {Future Gener. Comput. Syst.}, volume = {82}, pages = {274--289}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.12.009}, doi = {10.1016/J.FUTURE.2017.12.009}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/HameedKAAR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/AlamEKKJCB18, author = {Masoom Alam and Naina Emmanuel and Tanveer Khan and Abid Khan and Nadeem Javaid and Kim{-}Kwang Raymond Choo and Rajkumar Buyya}, title = {Secure policy execution using reusable garbled circuit in the cloud}, journal = {Future Gener. Comput. Syst.}, volume = {87}, pages = {488--501}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.12.067}, doi = {10.1016/J.FUTURE.2017.12.067}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/AlamEKKJCB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/EmmanuelKAKK18, author = {Naina Emmanuel and Abid Khan and Masoom Alam and Tanveer Khan and Muhammad Khurram Khan}, title = {Structures and data preserving homomorphic signatures}, journal = {J. Netw. Comput. Appl.}, volume = {102}, pages = {58--70}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2017.11.005}, doi = {10.1016/J.JNCA.2017.11.005}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/EmmanuelKAKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SaleemKSAK18, author = {Ahsan Saleem and Abid Khan and Furqan Shahid and Masoom Alam and Muhammad Khurram Khan}, title = {Recent advancements in garbled computing: How far have we come towards achieving secure, efficient and reusable garbled circuits}, journal = {J. Netw. Comput. Appl.}, volume = {108}, pages = {1--19}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2018.02.006}, doi = {10.1016/J.JNCA.2018.02.006}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/SaleemKSAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SheikhKAWH18, author = {Umber Sheikh and Abid Khan and Bilal Ahmed and Abdul Waheed and Abdul Hameed}, title = {Provenance Inference Techniques: Taxonomy, comparative analysis and design challenges}, journal = {J. Netw. Comput. Appl.}, volume = {110}, pages = {11--26}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2018.03.004}, doi = {10.1016/J.JNCA.2018.03.004}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/SheikhKAWH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/HussainAKIKDAJA18, author = {Mubashar Hussain and Mansoor Ahmed and Hasan Ali Khattak and Muhammad Imran and Abid Khan and Sadia Din and Awais Ahmad and Gwanggil Jeon and Goutham Reddy Alavalapati}, title = {Towards ontology-based multilingual {URL} filtering: a big data problem}, journal = {J. Supercomput.}, volume = {74}, number = {10}, pages = {5003--5021}, year = {2018}, url = {https://doi.org/10.1007/s11227-018-2338-1}, doi = {10.1007/S11227-018-2338-1}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tjs/HussainAKIKDAJA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/SuhailHLZKH18, author = {Sabah Suhail and Choong Seon Hong and M. Ali Lodhi and Faheem Zafar and Abid Khan and Faisal Bashir Hussain}, title = {Data trustworthiness in IoT}, booktitle = {2018 International Conference on Information Networking, {ICOIN} 2018, Chiang Mai, Thailand, January 10-12, 2018}, pages = {414--419}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICOIN.2018.8343151}, doi = {10.1109/ICOIN.2018.8343151}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icoin/SuhailHLZKH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isncc/AhmedKSH18, author = {Mansoor Ahmed and Abid Khan and Osama Saleem and Muhammad Haris}, title = {A Fault Tolerant Approach for Malicious {URL} Filtering}, booktitle = {2018 International Symposium on Networks, Computers and Communications, {ISNCC} 2018, Rome, Italy, June 19-21, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISNCC.2018.8530984}, doi = {10.1109/ISNCC.2018.8530984}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isncc/AhmedKSH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-06143, author = {Sabah Suhail and Mohammad M. Abdellatif and Shashi Raj Pandey and Abid Khan and Choong Seon Hong}, title = {Provenance-enabled Packet Path Tracing in the RPL-based Internet of Things}, journal = {CoRR}, volume = {abs/1811.06143}, year = {2018}, url = {http://arxiv.org/abs/1811.06143}, eprinttype = {arXiv}, eprint = {1811.06143}, timestamp = {Mon, 23 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-06143.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/JabeenHAGMKNG17, author = {Farhana Jabeen and Zara Hamid and Wadood Abdul and Sanaa Ghouzali and Saif Ur Rehman Malik and Abid Khan and Sarfraz Nawaz and Hina Ghafoor}, title = {Enhanced Architecture for Privacy Preserving Data Integration in a Medical Research Environment}, journal = {{IEEE} Access}, volume = {5}, pages = {13308--13326}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2707584}, doi = {10.1109/ACCESS.2017.2707584}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/JabeenHAGMKNG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AslamASARAK17, author = {Adeel Aslam and Naveed Ahmad and Tanzila Saba and Abdulaziz S. Almazyad and Amjad Rehman and Adeel Anjum and Abid Khan}, title = {Decision Support System for Risk Assessment and Management Strategies in Distributed Software Development}, journal = {{IEEE} Access}, volume = {5}, pages = {20349--20373}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2757605}, doi = {10.1109/ACCESS.2017.2757605}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AslamASARAK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/TahirKHAKJ17, author = {Mouzna Tahir and Abid Khan and Abdul Hameed and Masoom Alam and Muhammad Khurram Khan and Farhana Jabeen}, title = {Towards a set aggregation-based data integrity scheme for smart grids}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {72}, number = {9-10}, pages = {551--561}, year = {2017}, url = {https://doi.org/10.1007/s12243-017-0602-7}, doi = {10.1007/S12243-017-0602-7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/TahirKHAKJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/NazirAMACKZKK17, author = {Anam Nazir and Masoom Alam and Saif Ur Rehman Malik and Adnan Akhunzada and Muhammad Nadeem Cheema and Muhammad Khurram Khan and Yang Ziang and Tanveer Khan and Abid Khan}, title = {A high-level domain-specific language for {SIEM} (design, development and formal verification)}, journal = {Clust. Comput.}, volume = {20}, number = {3}, pages = {2423--2437}, year = {2017}, url = {https://doi.org/10.1007/s10586-017-0819-2}, doi = {10.1007/S10586-017-0819-2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/NazirAMACKZKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZafarKMAAKJAJ17, author = {Faheem Zafar and Abid Khan and Saif Ur Rehman Malik and Mansoor Ahmed and Adeel Anjum and Majid Iqbal Khan and Nadeem Javed and Masoom Alam and Fuzel Jamil}, title = {A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends}, journal = {Comput. Secur.}, volume = {65}, pages = {29--49}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2016.10.006}, doi = {10.1016/J.COSE.2016.10.006}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZafarKMAAKJAJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AnjumRGKMAASA17, author = {Adeel Anjum and Guillaume Raschia and Marc Gelgon and Abid Khan and Saif Ur Rehman Malik and Naveed Ahmad and Mansoor Ahmed and Sabah Suhail and Masoom Alam}, title = {{\(\tau\)}-safety: {A} privacy model for sequential publication with arbitrary updates}, journal = {Comput. Secur.}, volume = {66}, pages = {20--39}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2016.12.014}, doi = {10.1016/J.COSE.2016.12.014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AnjumRGKMAASA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/JavaidHAIKG17, author = {Nadeem Javaid and Sheraz Hussain and Ashfaq Ahmad and Muhammad Imran and Abid Khan and Mohsen Guizani}, title = {Region based cooperative routing in underwater wireless sensor networks}, journal = {J. Netw. Comput. Appl.}, volume = {92}, pages = {31--41}, year = {2017}, url = {https://doi.org/10.1016/j.jnca.2017.01.013}, doi = {10.1016/J.JNCA.2017.01.013}, timestamp = {Mon, 21 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/JavaidHAIKG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ZafarKSAHKJA17, author = {Faheem Zafar and Abid Khan and Sabah Suhail and Idrees Ahmed and Khizar Hameed and Hayat Mohammad Khan and Farhana Jabeen and Adeel Anjum}, title = {Trustworthy data: {A} survey, taxonomy and future trends of secure provenance schemes}, journal = {J. Netw. Comput. Appl.}, volume = {94}, pages = {50--68}, year = {2017}, url = {https://doi.org/10.1016/j.jnca.2017.06.003}, doi = {10.1016/J.JNCA.2017.06.003}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/ZafarKSAHKJA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AslamIKAAK17, author = {Sidra Aslam and Saif ul Islam and Abid Khan and Mansoor Ahmed and Adnan Akhunzada and Muhammad Khurram Khan}, title = {Information collection centric techniques for cloud resource management: Taxonomy, analysis and challenges}, journal = {J. Netw. Comput. Appl.}, volume = {100}, pages = {80--94}, year = {2017}, url = {https://doi.org/10.1016/j.jnca.2017.10.021}, doi = {10.1016/J.JNCA.2017.10.021}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/AslamIKAAK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/js/AkbarJAGKNI17, author = {Mariam Akbar and Nadeem Javaid and Wadood Abdul and Sanaa Ghouzali and Abid Khan and Iftikhar Azim Niaz and Manzoor Ilahi}, title = {Balanced Transmissions Based Trajectories of Mobile Sink in Homogeneous Wireless Sensor Networks}, journal = {J. Sensors}, volume = {2017}, pages = {4281597:1--4281597:16}, year = {2017}, url = {https://doi.org/10.1155/2017/4281597}, doi = {10.1155/2017/4281597}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/js/AkbarJAGKNI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/AlamMJKKAJAK17, author = {Masoom Alam and Saif Ur Rehman Malik and Qaisar Javed and Abid Khan and Shamaila Bisma Khan and Adeel Anjum and Nadeem Javed and Adnan Akhunzada and Muhammad Khurram Khan}, title = {Formal modeling and verification of security controls for multimedia systems in the cloud}, journal = {Multim. Tools Appl.}, volume = {76}, number = {21}, pages = {22845--22870}, year = {2017}, url = {https://doi.org/10.1007/s11042-017-4853-0}, doi = {10.1007/S11042-017-4853-0}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/AlamMJKKAJAK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/ChughtaiBRK17, author = {Muhammad Omer Chughtai and Nasreen Badruddin and Maaz Rehan and Abid Khan}, title = {Congestion Detection and Alleviation in Multihop Wireless Sensor Networks}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2017}, year = {2017}, url = {https://doi.org/10.1155/2017/9243019}, doi = {10.1155/2017/9243019}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/ChughtaiBRK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fnc/KhanYSTA17, author = {Abid Khan and Ayyaz Yaqoob and Kinza Sarwar and Mouzna Tahir and Mansoor Ahmed}, editor = {Elhadi M. Shakshuki and Ansar{-}Ul{-}Haque Yasar}, title = {Secure Logging as a Service Using Reversible Watermarking}, booktitle = {14th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2017) / 12th International Conference on Future Networks and Communications {(FNC} 2017) / Affiliated Workshops, July 24-26, 2017, Leuven, Belgium}, series = {Procedia Computer Science}, volume = {110}, pages = {336--343}, publisher = {Elsevier}, year = {2017}, url = {https://doi.org/10.1016/j.procs.2017.06.103}, doi = {10.1016/J.PROCS.2017.06.103}, timestamp = {Thu, 08 Jul 2021 16:04:01 +0200}, biburl = {https://dblp.org/rec/conf/fnc/KhanYSTA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isncc/AliAKIR17, author = {Ahmad Ali and Mansoor Ahmed and Abid Khan and Muhammad Ilyas and Muhammad Saad Razzaq}, title = {A trust management system model for cloud}, booktitle = {2017 International Symposium on Networks, Computers and Communications, {ISNCC} 2017, Marrakech, Morocco, May 16-18, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISNCC.2017.8072029}, doi = {10.1109/ISNCC.2017.8072029}, timestamp = {Sun, 31 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isncc/AliAKIR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZafarKAKJHAH16, author = {Faheem Zafar and Abid Khan and Mansoor Ahmed and Majid Iqbal Khan and Farhana Jabeen and Zara Hamid and Naveed Ahmed and Faisal Bashir Hussain}, title = {A Scalable Data Integrity Mechanism Based on Provable Data Possession and JARs}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {10}, number = {6}, pages = {2851--2873}, year = {2016}, url = {https://doi.org/10.3837/tiis.2016.06.022}, doi = {10.3837/TIIS.2016.06.022}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ZafarKAKJHAH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/KhanJNSAN16, author = {Abid Khan and Farhana Jabeen and Farah Naz and Sabah Suhail and Mansoor Ahmed and Sarfraz Nawaz}, title = {Buyer seller watermarking protocols issues and challenges - {A} survey}, journal = {J. Netw. Comput. Appl.}, volume = {75}, pages = {317--334}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.08.026}, doi = {10.1016/J.JNCA.2016.08.026}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/KhanJNSAN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/js/KhanLRKH16, author = {Meer M. Khan and M. Ali Lodhi and Abdul Rehman and Abid Khan and Faisal Bashir Hussain}, title = {Sink-to-Sink Coordination Framework Using {RPL:} Routing Protocol for Low Power and Lossy Networks}, journal = {J. Sensors}, volume = {2016}, pages = {2635429:1--2635429:11}, year = {2016}, url = {https://doi.org/10.1155/2016/2635429}, doi = {10.1155/2016/2635429}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/js/KhanLRKH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconac/WaheedSK16, author = {Abdul Waheed and Munam Ali Shah and Abid Khan}, editor = {Zhijie Xu and Jing Wang}, title = {Secure login protocols: An analysis on modern attacks and solutions}, booktitle = {22nd International Conference on Automation and Computing, {ICAC} 2016, Colchester, United Kingdom, September 7-8, 2016}, pages = {535--541}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/IConAC.2016.7604975}, doi = {10.1109/ICONAC.2016.7604975}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iconac/WaheedSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/HameedKAAKHJ16, author = {Khizar Hameed and Muhammad Saleem Khan and Idrees Ahmed and Zuhaib U. Ahmad and Abid Khan and Aun Haider and Nadeem Javaid}, title = {A Zero Watermarking Scheme for Data Integrity in Wireless Sensor Networks}, booktitle = {19th International Conference on Network-Based Information Systems, NBiS 2016, Ostrava, Czech Republic, September 7-9, 2016}, pages = {119--126}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/NBiS.2016.35}, doi = {10.1109/NBIS.2016.35}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nbis/HameedKAAKHJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/siot/SuhailHAZK16, author = {Sabah Suhail and Choong Seong Hong and Zuhaib Uddin Ahmad and Faheem Zafar and Abid Khan}, title = {Introducing Secure Provenance in IoT: Requirements and Challenges}, booktitle = {2016 International Workshop on Secure Internet of Things, SIoT 2016, Heraklion, Greece, September 26-30, 2016}, pages = {39--46}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SIoT.2016.011}, doi = {10.1109/SIOT.2016.011}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/siot/SuhailHAZK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KhanAKK16, author = {Muhammad Saleem Khan and Idrees Ahmed and Abid Khan and Majid Iqbal Khan}, title = {Adaptive Reputation Weights Assignment Scheme for MANETs}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {160--167}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0059}, doi = {10.1109/TRUSTCOM.2016.0059}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KhanAKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AhmedKKA16, author = {Idrees Ahmed and Abid Khan and Muhammad Saleem Khan and Mansoor Ahmed}, title = {Aggregated Signatures for Chaining: {A} Secure Provenance Scheme}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {2012--2017}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0307}, doi = {10.1109/TRUSTCOM.2016.0307}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AhmedKKA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bwcca/HaiderJAAKK13, author = {Arsalan Haider and Nadeem Javaid and N. Amjad and A. A. Awan and Abid Khan and Nasir Khan}, title = {{REECH-ME:} Regional Energy Efficient Cluster Heads Based on Maximum Energy Routing Protocol for WSNs}, booktitle = {2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications, Compiegne, France, October 28-30, 2013}, pages = {88--92}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/BWCCA.2013.23}, doi = {10.1109/BWCCA.2013.23}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bwcca/HaiderJAAKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HaiderJAAKK13, author = {Arsalan Haider and Nadeem Javaid and N. Amjad and A. A. Awan and Abid Khan and Nasir Khan}, title = {{REECH-ME:} Regional Energy Efficient Cluster Heads based on Maximum Energy Routing Protocol for WSNs}, journal = {CoRR}, volume = {abs/1307.7052}, year = {2013}, url = {http://arxiv.org/abs/1307.7052}, eprinttype = {arXiv}, eprint = {1307.7052}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/HaiderJAAKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AslamRSRKQQHKJ13, author = {Muhammad Aslam and Muhammad Babar Rasheed and Tauseef Shah and Azizur Rahim and Zahoor Ali Khan and U. Qasim and M. W. Qasim and Ahmad Hassan and Abid Khan and Nadeem Javaid}, title = {Energy optimization and Performance Analysis of Cluster Based Routing Protocols Extended from {LEACH} for WSNs}, journal = {CoRR}, volume = {abs/1309.4373}, year = {2013}, url = {http://arxiv.org/abs/1309.4373}, eprinttype = {arXiv}, eprint = {1309.4373}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AslamRSRKQQHKJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MahmoodJKQKQM13, author = {Danish Mahmood and Nadeem Javaid and Zahoor Ali Khan and U. Qasim and Abid Khan and S. Qurashi and A. M. Memon}, title = {Modeling and Evaluating Performance of Routing Operations in Reactive Routing Protocols}, journal = {CoRR}, volume = {abs/1309.4386}, year = {2013}, url = {http://arxiv.org/abs/1309.4386}, eprinttype = {arXiv}, eprint = {1309.4386}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MahmoodJKQKQM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MahmoodJQKKQM13, author = {Danish Mahmood and Nadeem Javaid and U. Qasim and Zahoor Ali Khan and Abid Khan and S. Qurashi and A. M. Memon}, title = {Modeling and Evaluating Performance of Routing Operations in Proactive Routing Protocols}, journal = {CoRR}, volume = {abs/1309.4389}, year = {2013}, url = {http://arxiv.org/abs/1309.4389}, eprinttype = {arXiv}, eprint = {1309.4389}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MahmoodJQKKQM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AhmedAATK10, author = {Mansoor Ahmed and Amin Anjomshoaa and Muhammad Asfand{-}e{-}yar and A Min Tjoa and Abid Khan}, title = {Towards an Ontology-Based Solution for Managing License Agreement Using Semantic Desktop}, booktitle = {{ARES} 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland}, pages = {309--314}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ARES.2010.104}, doi = {10.1109/ARES.2010.104}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/AhmedAATK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fit/KhanSAK09, author = {Ali Nawaz Khan and Xuejun Sha and Muhammad Waqas Anwar and Abid Khan}, editor = {Sajjad Ahmad Madani}, title = {Performance analysis of prioritized and non prioritized handoff call queuing schemes in mobile cellular networks}, booktitle = {{FIT} '09, 7th International Conference on Frontiers of Information Technology, Abbottabad, Pakistan, December 16-18, 2009}, pages = {11:1--11:6}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1838002.1838014}, doi = {10.1145/1838002.1838014}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fit/KhanSAK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fit/KhanNAAK09, author = {Abid Khan and Xiamu Niu and Waqas Anwar and Mansoor Ahmed and Ali Nawaz Khan}, editor = {Sajjad Ahmad Madani}, title = {Mobile agent watermarking {(MAW):} security properties and attacks revisited}, booktitle = {{FIT} '09, 7th International Conference on Frontiers of Information Technology, Abbottabad, Pakistan, December 16-18, 2009}, pages = {32:1--32:6}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1838002.1838038}, doi = {10.1145/1838002.1838038}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fit/KhanNAAK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fit/SharifKAAK09, author = {Usman Sharif and Abid Khan and Mansoor Ahmed and Muhammad Waqas Anwar and Ali Nawaz Khan}, editor = {Sajjad Ahmad Madani}, title = {{CLUSMA:} a mobile agent based clustering middleware for wireless sensor networks}, booktitle = {{FIT} '09, 7th International Conference on Frontiers of Information Technology, Abbottabad, Pakistan, December 16-18, 2009}, pages = {63:1--63:4}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1838002.1838074}, doi = {10.1145/1838002.1838074}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fit/SharifKAAK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/KhanANYA09, author = {Abid Khan and Qasim Arshad and Xiamu Niu and Yong Zhang and Muhammad Waqas Anwar}, editor = {Jong Hyuk Park and Hsiao{-}Hwa Chen and Mohammed Atiquzzaman and Changhoon Lee and Tai{-}Hoon Kim and Sang{-}Soo Yeo}, title = {On the Security Properties and Attacks against Mobile Agent Graph Head Sealing {(MAGHS)}}, booktitle = {Advances in Information Security and Assurance, Third International Conference and Workshops, {ISA} 2009, Seoul, Korea, June 25-27, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5576}, pages = {223--228}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02617-1\_23}, doi = {10.1007/978-3-642-02617-1\_23}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sersc-isa/KhanANYA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/KhanNAY08, author = {Abid Khan and Xiamu Niu and Waqas Anwar and Yong Zhang}, title = {On the security properties and attacks against Mobile agent watermark encapsulation(MAWE)}, booktitle = {Proceedings of the {IEEE} International Conference on Systems, Man and Cybernetics, Singapore, 12-15 October 2008}, pages = {707--712}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICSMC.2008.4811361}, doi = {10.1109/ICSMC.2008.4811361}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/smc/KhanNAY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/KhanNY07, author = {Abid Khan and Xiamu Niu and Yong Zhang}, editor = {Bin{-}Yih Liao and Jeng{-}Shyang Pan and Lakhmi C. Jain and Mark Liao and Hideki Noda and Anthony T. S. Ho}, title = {Protecting Mobile Agent's Computation Results with Reversible Watermarking and Digital Signature}, booktitle = {3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2007), Kaohsiung, Taiwan, 26-28 November 2007, Proceedings}, pages = {566--569}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IIH-MSP.2007.250}, doi = {10.1109/IIH-MSP.2007.250}, timestamp = {Fri, 24 Mar 2023 08:33:27 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/KhanNY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aia/ZhangNKLH06, author = {Yong Zhang and Xiamu Niu and Abid Khan and Qiong Li and Qi Han}, editor = {Vladan Devedzic}, title = {A Novel Method of Watermarking Relational Databases using Character String}, booktitle = {{IASTED} International Conference on Artificial Intelligence and Applications, part of the 24th Multi-Conference on Applied Informatics, Innsbruck, Austria, February 13-16, 2006}, pages = {120--124}, publisher = {{IASTED/ACTA} Press}, year = {2006}, url = {https://dl.acm.org/doi/10.5555/1166890.1166911}, doi = {10.5555/1166890.1166911}, timestamp = {Wed, 04 May 2022 13:03:25 +0200}, biburl = {https://dblp.org/rec/conf/aia/ZhangNKLH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/KhanAGBY97, author = {Abid Khan and Nasir Al{-}Darwish and Mohsen Guizani and M. Benten and H. Youssef}, title = {Design and implementation of a software bridge with packet filtering and statistics collection functions}, journal = {Int. J. Netw. Manag.}, volume = {7}, number = {5}, pages = {251--263}, year = {1997}, url = {https://doi.org/10.1002/(SICI)1099-1190(199709/10)7:5\&\#60;251::AID-NEM254\&\#62;3.0.CO;2-H}, doi = {10.1002/(SICI)1099-1190(199709/10)7:5\&\#60;251::AID-NEM254\&\#62;3.0.CO;2-H}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/KhanAGBY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.