


default search action
Adeel Anjum
Person information
- affiliation: Southern University of Science and Technology, Shenzhen, China
- affiliation (PhD 2013): University of Nantes, France
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
 [j83]Muhammad Adnan [j83]Muhammad Adnan , Madiha Haider Syed , Madiha Haider Syed , Adeel Anjum , Adeel Anjum , Semeen Rehman , Semeen Rehman : :
 A Framework for Privacy-Preserving in IoV Using Federated Learning With Differential Privacy. IEEE Access 13: 13507-13521 (2025)
 [j82]Zahra Abbas [j82]Zahra Abbas , Sunila Fatima Ahmad , Sunila Fatima Ahmad , Adeel Anjum , Adeel Anjum , Madiha Haider Syed , Madiha Haider Syed , Saif Ur Rehman Malik , Saif Ur Rehman Malik , Semeen Rehman , Semeen Rehman : :
 Ensuring Zero Trust in GDPR-Compliant Deep Federated Learning Architecture. Comput. 14(8): 317 (2025)
 [j81]Muhammad Rizwan [j81]Muhammad Rizwan , Ammar Hawbani , Ammar Hawbani , Xingfu Wang , Xingfu Wang , Adeel Anjum, Pelin Angin , Adeel Anjum, Pelin Angin , Yigit Sever , Yigit Sever , Sanchuan Chen , Sanchuan Chen , Liang Zhao , Liang Zhao , Ahmed Yassin Al-Dubai , Ahmed Yassin Al-Dubai : :
 An Enhanced and Robust Data Publishing Scheme for Private and Useful 1:M Microdata. IEEE Trans. Big Data 11(4): 1932-1944 (2025)
 [j80]Muhammad Rizwan, Mudassir Ali, Ammar Hawbani, Xingfu Wang, Adeel Anjum, Pelin Angin, Olaoluwa Popoola, Muhammad Ali Imran: [j80]Muhammad Rizwan, Mudassir Ali, Ammar Hawbani, Xingfu Wang, Adeel Anjum, Pelin Angin, Olaoluwa Popoola, Muhammad Ali Imran:
 IOTA-Based Game-Theoretic Energy Trading With Privacy-Preservation for V2G Networks. IEEE Trans. Sustain. Comput. 10(2): 217-231 (2025)
- 2024
 [j79]Zahra Abbas [j79]Zahra Abbas , Sunila Fatima Ahmad , Sunila Fatima Ahmad , Madiha Haider Syed , Madiha Haider Syed , Adeel Anjum, Semeen Rehman , Adeel Anjum, Semeen Rehman : :
 Exploring Deep Federated Learning for the Internet of Things: A GDPR-Compliant Architecture. IEEE Access 12: 10548-10574 (2024)
 [j78]Muhammad Noman Sohail [j78]Muhammad Noman Sohail , Adeel Anjum , Adeel Anjum , Iftikhar Ahmed Saeed, Madiha Haider Syed , Iftikhar Ahmed Saeed, Madiha Haider Syed , Axel Jantsch , Axel Jantsch , Semeen Rehman , Semeen Rehman : :
 Optimizing Industrial IoT Data Security Through Blockchain-Enabled Incentive-Driven Game Theoretic Approach for Data Sharing. IEEE Access 12: 51176-51192 (2024)
 [j77]Sunila Fatima Ahmad [j77]Sunila Fatima Ahmad , Zahra Abbas , Zahra Abbas , Madiha Haider Syed , Madiha Haider Syed , Adeel Anjum , Adeel Anjum , Semeen Rehman , Semeen Rehman : :
 Dynamic Cohort Formation with Hierarchical Blockchain Using GDP for Enhanced FL. Comput. 13(12): 317 (2024)
 [j76]Syeda Mahnoor Gilani [j76]Syeda Mahnoor Gilani , Adeel Anjum , Adeel Anjum , Abid Khan , Abid Khan , Madiha Haider Syed , Madiha Haider Syed , Syed Atif Moqurrab , Syed Atif Moqurrab , Gautam Srivastava , Gautam Srivastava : :
 A robust Internet of Drones security surveillance communication network based on IOTA. Internet Things 25: 101066 (2024)
 [j75]Hajira Batool, Adeel Anjum, Abid Khan [j75]Hajira Batool, Adeel Anjum, Abid Khan , Stefano Izzo , Stefano Izzo , Carlo Mazzocca, Gwanggil Jeon: , Carlo Mazzocca, Gwanggil Jeon:
 A secure and privacy preserved infrastructure for VANETs based on federated learning with local differential privacy. Inf. Sci. 652: 119717 (2024)
 [j74]Saira Beg [j74]Saira Beg , Adeel Anjum, Mansoor Ahmed: , Adeel Anjum, Mansoor Ahmed:
 User-selectable interaction and privacy features in mobile app recommendation (MAR). Multim. Tools Appl. 83(20): 58043-58073 (2024)
 [c10]Ahsan Altaf [c10]Ahsan Altaf , Adeel Anjum: , Adeel Anjum:
 Empowering Smart Vehicles: Giving Authority with LLM and SSI. FIT 2024: 1-6
 [c9]Muhammad Dilshad, Adeel Anjum, Madiha Haider Syed: [c9]Muhammad Dilshad, Adeel Anjum, Madiha Haider Syed:
 Blockchain Enabled Secure and Efficient DDoS Attack Detection Mechanisms in Connected Internet of Vehicles Using Federated Learning. FIT 2024: 1-6
 [c8]Syeda Aqsa Habib Gilani, Madiha Haider Syed, Adeel Anjum: [c8]Syeda Aqsa Habib Gilani, Madiha Haider Syed, Adeel Anjum:
 Effective Diabetes Prediction: Integrating Ensemble Learning with LIME for Robust Results. FIT 2024: 1-6
 [c7]Shoaib Ullah, Madam Hussain Shah, Adeel Anjum: [c7]Shoaib Ullah, Madam Hussain Shah, Adeel Anjum:
 Quantum Enhanced Federated Learning with Differential Privacy. FIT 2024: 1-6
- 2023
 [j73]Zainab Iftikhar [j73]Zainab Iftikhar , Adeel Anjum, Abid Khan , Adeel Anjum, Abid Khan , Munam Ali Shah, Gwanggil Jeon: , Munam Ali Shah, Gwanggil Jeon:
 Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger. Clust. Comput. 26(6): 3361-3377 (2023)
 [j72]Zainab Iftikhar, Adeel Anjum, Abid Khan, Munam Ali Shah, Gwanggil Jeon: [j72]Zainab Iftikhar, Adeel Anjum, Abid Khan, Munam Ali Shah, Gwanggil Jeon:
 Correction: Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger. Clust. Comput. 26(6): 3379 (2023)
 [j71]Tehsin Kanwal, Hasina Attaullah [j71]Tehsin Kanwal, Hasina Attaullah , Adeel Anjum, Abid Khan , Adeel Anjum, Abid Khan , Gwanggil Jeon: , Gwanggil Jeon:
 Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches. Digit. Commun. Networks 9(5): 1131-1140 (2023)
 [j70]Laraib Javed, Adeel Anjum, Bello Musa Yakubu [j70]Laraib Javed, Adeel Anjum, Bello Musa Yakubu , Majid Iqbal, Syed Atif Moqurrab , Majid Iqbal, Syed Atif Moqurrab , Gautam Srivastava , Gautam Srivastava : :
 ShareChain: Blockchain-enabled model for sharing patient data using federated learning and differential privacy. Expert Syst. J. Knowl. Eng. 40(5) (2023)
 [j69]Hira S. Sikandar, Saif Ur Rehman Malik [j69]Hira S. Sikandar, Saif Ur Rehman Malik , Adeel Anjum, Abid Khan , Adeel Anjum, Abid Khan , Gwanggil Jeon: , Gwanggil Jeon:
 Cohort-based kernel principal component analysis with Multi-path Service Routing in Federated Learning. Future Gener. Comput. Syst. 149: 518-530 (2023)
 [j68]Najam U. Saqib [j68]Najam U. Saqib , Saif Ur Rehman Malik , Saif Ur Rehman Malik , Adeel Anjum, Madiha Haider Syed , Adeel Anjum, Madiha Haider Syed , Syed Atif Moqurrab , Syed Atif Moqurrab , Gautam Srivastava , Gautam Srivastava , Jerry Chun-Wei Lin , Jerry Chun-Wei Lin : :
 Preserving Privacy in Internet of Vehicles (IoV): A Novel Group-Leader-Based Shadowing Scheme Using Blockchain. IEEE Internet Things J. 10(24): 21421-21430 (2023)
 [j67]Rabeeha Fazal, Razaullah Khan, Adeel Anjum, Madiha Haider Syed, Abid Khan [j67]Rabeeha Fazal, Razaullah Khan, Adeel Anjum, Madiha Haider Syed, Abid Khan , Semeen Rehman: , Semeen Rehman:
 Improved angelization technique against background knowledge attack for 1:M microdata. PeerJ Comput. Sci. 9: e1255 (2023)
 [j66]Syed Atif Moqurrab [j66]Syed Atif Moqurrab , Adeel Anjum , Adeel Anjum , Noshina Tariq , Noshina Tariq , Gautam Srivastava , Gautam Srivastava : :
 Instant_Anonymity: A Lightweight Semantic Privacy Guarantee for 5G-Enabled IIoT. IEEE Trans. Ind. Informatics 19(1): 951-959 (2023)
- 2022
 [j65]Awais Abdul Khaliq [j65]Awais Abdul Khaliq , Adeel Anjum , Adeel Anjum , Abdul Basit Ajmal , Abdul Basit Ajmal , Julian L. Webber , Julian L. Webber , Abolfazl Mehbodniya , Abolfazl Mehbodniya , Shawal Khan , Shawal Khan : :
 A Secure and Privacy Preserved Parking Recommender System Using Elliptic Curve Cryptography and Local Differential Privacy. IEEE Access 10: 56410-56426 (2022)
 [j64]Syed Atif Moqurrab [j64]Syed Atif Moqurrab , Adeel Anjum , Adeel Anjum , Noshina Tariq , Noshina Tariq , Gautam Srivastava , Gautam Srivastava : :
 An efficient framework for semantically-correlated term detection and sanitization in clinical documents. Comput. Electr. Eng. 100: 107985 (2022)
 [j63]Saif Ur Rehman Malik [j63]Saif Ur Rehman Malik , Adeel Anjum, Syed Atif Moqurrab , Adeel Anjum, Syed Atif Moqurrab , Gautam Srivastava , Gautam Srivastava : :
 Towards enhanced threat modelling and analysis using a Markov Decision Process. Comput. Commun. 194: 282-291 (2022)
 [j62]Razaullah Khan [j62]Razaullah Khan , Xiaofeng Tao, Adeel Anjum, Saif Ur Rehman Malik , Xiaofeng Tao, Adeel Anjum, Saif Ur Rehman Malik , Shui Yu , Shui Yu , Abid Khan, Waheed ur Rehman, Hassan Malik , Abid Khan, Waheed ur Rehman, Hassan Malik : :
 (τ, m)-slicedBucket privacy model for sequential anonymization for improving privacy and utility. Trans. Emerg. Telecommun. Technol. 33(6) (2022)
 [j61]Zineddine Kouahla [j61]Zineddine Kouahla , Ala-Eddine Benrazek , Ala-Eddine Benrazek , Mohamed Amine Ferrag , Mohamed Amine Ferrag , Brahim Farou , Brahim Farou , Hamid Seridi, Muhammet Kurulay , Hamid Seridi, Muhammet Kurulay , Adeel Anjum , Adeel Anjum , Alia Asheralieva , Alia Asheralieva : :
 A Survey on Big IoT Data Indexing: Potential Solutions, Recent Advancements, and Open Issues. Future Internet 14(1): 19 (2022)
 [j60]Tehsin Kanwal [j60]Tehsin Kanwal , Syed Atif Moqurrab, Adeel Anjum , Syed Atif Moqurrab, Adeel Anjum , Abid Khan , Abid Khan , Joel J. P. C. Rodrigues , Joel J. P. C. Rodrigues , Gwanggil Jeon , Gwanggil Jeon : :
 Formal verification and complexity analysis of confidentiality aware textual clinical documents framework. Int. J. Intell. Syst. 37(12): 10380-10399 (2022)
 [j59]Hasina Attaullah [j59]Hasina Attaullah , Tehsin Kanwal , Tehsin Kanwal , Adeel Anjum , Adeel Anjum , Ghufran Ahmed , Ghufran Ahmed , Suleman Khan , Suleman Khan , Danda B. Rawat , Danda B. Rawat , Rizwan Khan , Rizwan Khan : :
 Fuzzy-Logic-Based Privacy-Aware Dynamic Release of IoT-Enabled Healthcare Data. IEEE Internet Things J. 9(6): 4411-4420 (2022)
 [j58]Waseeqa Ghazanfer [j58]Waseeqa Ghazanfer , Noman Nasir Minhas , Noman Nasir Minhas , Muhammad Rauf , Muhammad Rauf , Adeel Anjum , Adeel Anjum : :
 iTrace: When IOTA Meets COVID-19 Contact Tracing. IT Prof. 24(1): 56-62 (2022)
 [j57]Aqsa Ayub, Muhammad Rizwan [j57]Aqsa Ayub, Muhammad Rizwan , Shivanshu Shrivastava, Adeel Anjum, Pelin Angin, Yigit Sever , Shivanshu Shrivastava, Adeel Anjum, Pelin Angin, Yigit Sever : :
 Securely Offloading Computation to the Edge with the Tangle Cache. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(4): 40-60 (2022)
 [j56]Saira Beg [j56]Saira Beg , Saif Ur Rehman Khan , Saif Ur Rehman Khan , Adeel Anjum , Adeel Anjum : :
 Data usage-based privacy and security issues in mobile app recommendation (MAR): a systematic literature review. Libr. Hi Tech 40(3): 725-749 (2022)
 [j55]Saira Beg, Faisal Baig [j55]Saira Beg, Faisal Baig , Yousaf Hameed , Yousaf Hameed , Adeel Anjum, Ahmed Khan , Adeel Anjum, Ahmed Khan : :
 Thermal image encryption based on laser diode feedback and 2D logistic chaotic map. Multim. Tools Appl. 81(18): 26403-26423 (2022)
 [j54]Mazzamal Aslam, Saira Beg, Adeel Anjum, Zakria Qadir, Shawal Khan, Saif Ur Rehman Malik [j54]Mazzamal Aslam, Saira Beg, Adeel Anjum, Zakria Qadir, Shawal Khan, Saif Ur Rehman Malik , M. A. Parvez Mahmud , M. A. Parvez Mahmud : :
 A strong construction of S-box using Mandelbrot set an image encryption scheme. PeerJ Comput. Sci. 8: e892 (2022)
 [j53]Ayesha Shaukat, Adeel Anjum [j53]Ayesha Shaukat, Adeel Anjum , Saif Ur Rehman Malik , Saif Ur Rehman Malik , Munam Ali Shah , Munam Ali Shah , Carsten Maple , Carsten Maple : :
 A Novel Privacy Paradigm for Improving Serial Data Privacy. Sensors 22(7): 2811 (2022)
 [j52]Syed Atif Moqurrab, Adeel Anjum, Abid Khan, Mansoor Ahmed [j52]Syed Atif Moqurrab, Adeel Anjum, Abid Khan, Mansoor Ahmed , Awais Ahmad, Gwanggil Jeon: , Awais Ahmad, Gwanggil Jeon:
 Deep-Confidentiality: An IoT-Enabled Privacy-Preserving Framework for Unstructured Big Biomedical Data. ACM Trans. Internet Techn. 22(2): 42:1-42:21 (2022)
 [j51]Syed Atif Moqurrab, Noshina Tariq [j51]Syed Atif Moqurrab, Noshina Tariq , Adeel Anjum, Alia Asheralieva , Adeel Anjum, Alia Asheralieva , Saif Ur Rehman Malik , Saif Ur Rehman Malik , Hassan Malik , Hassan Malik , Haris Pervaiz, Sukhpal Singh Gill , Haris Pervaiz, Sukhpal Singh Gill : :
 A Deep Learning-Based Privacy-Preserving Model for Smart Healthcare in Internet of Medical Things Using Fog Computing. Wirel. Pers. Commun. 126(3): 2379-2401 (2022)
- 2021
 [j50]Shawal Khan [j50]Shawal Khan , Shahzad Khan , Shahzad Khan , Mahdi Zareei , Mahdi Zareei , Faisal S. Alanazi , Faisal S. Alanazi , Nazri Kama, Masoom Alam , Nazri Kama, Masoom Alam , Adeel Anjum , Adeel Anjum : :
 ABKS-PBM: Attribute-Based Keyword Search With Partial Bilinear Map. IEEE Access 9: 46313-46324 (2021)
 [j49]Saira Beg [j49]Saira Beg , Adeel Anjum , Adeel Anjum , Mansoor Ahmed , Mansoor Ahmed , Saif Ur Rehman Malik , Saif Ur Rehman Malik , Hassan Malik , Hassan Malik , Navuday Sharma , Navuday Sharma , Omer Waqar , Omer Waqar : :
 Dynamic Parameters-Based Reversible Data Transform (RDT) Algorithm in Recommendation System. IEEE Access 9: 110011-110025 (2021)
 [j48]Hayat Mohammad Khan, Abid Khan, Farhana Jabeen [j48]Hayat Mohammad Khan, Abid Khan, Farhana Jabeen , Adeel Anjum, Gwanggil Jeon: , Adeel Anjum, Gwanggil Jeon:
 Fog-enabled secure multiparty computation based aggregation scheme in smart grid. Comput. Electr. Eng. 94: 107358 (2021)
 [j47]Tehsin Kanwal, Adeel Anjum, Abid Khan [j47]Tehsin Kanwal, Adeel Anjum, Abid Khan : :
 Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities. Clust. Comput. 24(1): 293-317 (2021)
 [j46]Tehsin Kanwal, Adeel Anjum [j46]Tehsin Kanwal, Adeel Anjum , Saif Ur Rehman Malik , Saif Ur Rehman Malik , Sajjad Haider, Abid Khan, Umar Manzoor , Sajjad Haider, Abid Khan, Umar Manzoor , Alia Asheralieva , Alia Asheralieva : :
 A robust privacy preserving approach for electronic health records using multiple dataset with multiple sensitive attributes. Comput. Secur. 105: 102224 (2021)
 [j45]Tehsin Kanwal, Adeel Anjum, Saif Ur Rehman Malik [j45]Tehsin Kanwal, Adeel Anjum, Saif Ur Rehman Malik , Abid Khan, Muazzam Ali Khan Khattak: , Abid Khan, Muazzam Ali Khan Khattak:
 Privacy preservation of electronic health records with adversarial attacks identification in hybrid cloud. Comput. Stand. Interfaces 78: 103522 (2021)
 [j44]Tehsin Kanwal, Adeel Anjum, Abid Khan, Alia Asheralieva [j44]Tehsin Kanwal, Adeel Anjum, Abid Khan, Alia Asheralieva , Gwanggil Jeon , Gwanggil Jeon : :
 A formal adversarial perspective: Secure and efficient electronic health records collection scheme for multi-records datasets. Trans. Emerg. Telecommun. Technol. 32(8) (2021)
 [j43]Muhammad Shahbaz Khan, Adeel Anjum, Tanzila Saba, Amjad Rehman [j43]Muhammad Shahbaz Khan, Adeel Anjum, Tanzila Saba, Amjad Rehman , Usman Tariq , Usman Tariq : :
 Improved Generalization for Secure Personal Data Publishing Using Deviation. IT Prof. 23(2): 75-80 (2021)
 [j42]Saira Beg, Adeel Anjum, Mansoor Ahmad [j42]Saira Beg, Adeel Anjum, Mansoor Ahmad , Shahid Hussain, Ghufran Ahmad, Suleman Khan , Shahid Hussain, Ghufran Ahmad, Suleman Khan , Kim-Kwang Raymond Choo , Kim-Kwang Raymond Choo : :
 A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS). J. Netw. Comput. Appl. 174: 102874 (2021)
 [j41]M. Abrar, Behjat Zuhaira, Adeel Anjum [j41]M. Abrar, Behjat Zuhaira, Adeel Anjum : :
 Privacy-preserving data collection for 1: M dataset. Multim. Tools Appl. 80(20): 31335-31356 (2021)
 [j40]Ahmad Ali [j40]Ahmad Ali , Mansoor Ahmed , Mansoor Ahmed , Abid Khan , Abid Khan , Adeel Anjum , Adeel Anjum , Muhammad Ilyas , Muhammad Ilyas , Markus Helfert: , Markus Helfert:
 VisTAS: blockchain-based visible and trusted remote authentication system. PeerJ Comput. Sci. 7: e516 (2021)
 [j39]Mansoor Ahmed [j39]Mansoor Ahmed , Kainat Ansar , Kainat Ansar , Cal B. Muckley , Cal B. Muckley , Abid Khan , Abid Khan , Adeel Anjum, Muhammad Talha: , Adeel Anjum, Muhammad Talha:
 A semantic rule based digital fraud detection. PeerJ Comput. Sci. 7: e649 (2021)
 [j38]Hasina Attaullah [j38]Hasina Attaullah , Adeel Anjum , Adeel Anjum , Tehsin Kanwal, Saif Ur Rehman Malik , Tehsin Kanwal, Saif Ur Rehman Malik , Alia Asheralieva , Alia Asheralieva , Hassan Malik , Hassan Malik , Ahmed Zoha , Ahmed Zoha , Kamran Arshad , Kamran Arshad , Muhammad Ali Imran , Muhammad Ali Imran : :
 F-Classify: Fuzzy Rule Based Classification Method for Privacy Preservation of Multiple Sensitive Attributes. Sensors 21(14): 4933 (2021)
 [j37]Faheem Zafar [j37]Faheem Zafar , Abid Khan , Abid Khan , Saif Ur Rehman Malik , Saif Ur Rehman Malik , Mansoor Ahmed , Mansoor Ahmed , Carsten Maple , Carsten Maple , Adeel Anjum , Adeel Anjum : :
 MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus. Sensors 21(15): 5096 (2021)
 [j36]Saeed Akbar [j36]Saeed Akbar , Saif Ur Rehman Malik , Saif Ur Rehman Malik , Kim-Kwang Raymond Choo , Kim-Kwang Raymond Choo , Samee U. Khan , Samee U. Khan , Naveed Ahmad , Naveed Ahmad , Adeel Anjum , Adeel Anjum : :
 A Game-based Thermal-Aware Resource Allocation Strategy for Data Centers. IEEE Trans. Cloud Comput. 9(3): 845-853 (2021)
 [j35]Syed Atif Moqurrab [j35]Syed Atif Moqurrab , Umair Ayub, Adeel Anjum , Umair Ayub, Adeel Anjum , Sohail Asghar , Sohail Asghar , Gautam Srivastava , Gautam Srivastava : :
 An Accurate Deep Learning Model for Clinical Entity Recognition From Clinical Notes. IEEE J. Biomed. Health Informatics 25(10): 3804-3811 (2021)
 [c6]Muhammad Rizwan [c6]Muhammad Rizwan , Muhammad Noman Sohail , Muhammad Noman Sohail , Alia Asheralieva , Alia Asheralieva , Adeel Anjum, Pelin Angin: , Adeel Anjum, Pelin Angin:
 SAID: ECC-Based Secure Authentication and Incentive Distribution Mechanism for Blockchain-Enabled Data Sharing System. Blockchain 2021: 530-537
 [c5]Maryam Jadoon [c5]Maryam Jadoon , Adeel Anjum: , Adeel Anjum:
 Differentiation of bacterial and viral pneumonia in children under five using deep learning. UCC Companion 2021: 32:1-32:6
- 2020
 [j34]Junaid Haseeb [j34]Junaid Haseeb , Naveed Ahmad, Saif Ur Rehman Malik , Naveed Ahmad, Saif Ur Rehman Malik , Adeel Anjum: , Adeel Anjum:
 Application of formal methods to modelling and analysis aspects of business process reengineering. Bus. Process. Manag. J. 26(2): 548-569 (2020)
 [j33]Celestine Iwendi [j33]Celestine Iwendi , Syed Atif Moqurrab, Adeel Anjum, Sangeen Khan, Senthilkumar Mohan, Gautam Srivastava , Syed Atif Moqurrab, Adeel Anjum, Sangeen Khan, Senthilkumar Mohan, Gautam Srivastava : :
 N-Sanitization: A semantic privacy-preserving framework for unstructured medical datasets. Comput. Commun. 161: 160-171 (2020)
 [j32]Idrees Ahmed [j32]Idrees Ahmed , Abid Khan , Abid Khan , Adeel Anjum, Mansoor Ahmed , Adeel Anjum, Mansoor Ahmed , Muhammad Asif Habib , Muhammad Asif Habib : :
 A Secure Provenance Scheme for Detecting Consecutive Colluding Users in Distributed Networks. Int. J. Parallel Program. 48(2): 344-366 (2020)
 [j31]Iqra Fatima, Adeel Anjum, Saif Ur Rehman Malik [j31]Iqra Fatima, Adeel Anjum, Saif Ur Rehman Malik , Naveed Ahmad: , Naveed Ahmad:
 Cyber Physical Systems and IoT: Architectural Practices, Interoperability, and Transformation. IT Prof. 22(3): 46-54 (2020)
 [j30]Muhammad Aizad Fayyaz, Adeel Anjum, Sheikh Ziauddin, Ahmed Khan [j30]Muhammad Aizad Fayyaz, Adeel Anjum, Sheikh Ziauddin, Ahmed Khan , Aaliya Sarfaraz , Aaliya Sarfaraz : :
 An improved surveillance video forgery detection technique using sensor pattern noise and correlation of noise residues. Multim. Tools Appl. 79(9-10): 5767-5788 (2020)
 [j29]Saira Beg, Naveed Ahmad, Adeel Anjum, Mansoor Ahmad [j29]Saira Beg, Naveed Ahmad, Adeel Anjum, Mansoor Ahmad , Abid Khan , Abid Khan , Faisal Baig , Faisal Baig , Ahmed Khan , Ahmed Khan : :
 S-box design based on optimize LFT parameter selection: a practical approach in recommendation system domain. Multim. Tools Appl. 79(17-18): 11667-11684 (2020)
 [j28]Sidra Aslam, Mansoor Ahmed [j28]Sidra Aslam, Mansoor Ahmed , Imran Ahmed , Imran Ahmed , Abid Khan , Abid Khan , Awais Ahmad , Awais Ahmad , Muhammad Imran, Adeel Anjum, Shahid Hussain: , Muhammad Imran, Adeel Anjum, Shahid Hussain:
 OBAC: towards agent-based identification and classification of roles, objects, permissions (ROP) in distributed environment. Multim. Tools Appl. 79(45-46): 34363-34384 (2020)
 [j27]Razaullah Khan [j27]Razaullah Khan , Xiaofeng Tao , Xiaofeng Tao , Adeel Anjum , Adeel Anjum , Sajjad Haider, Saif Ur Rehman Malik , Sajjad Haider, Saif Ur Rehman Malik , Abid Khan , Abid Khan , Fatemeh Amiri , Fatemeh Amiri : :
 Privacy Preserving for Multiple Sensitive Attributes against Fingerprint Correlation Attack Satisfying c-Diversity. Wirel. Commun. Mob. Comput. 2020: 8416823:1-8416823:18 (2020)
 [i1]Faheem Zafar, Abid Khan, Saif Ur Rehman Malik, Adeel Anjum, Mansoor Ahmed: [i1]Faheem Zafar, Abid Khan, Saif Ur Rehman Malik, Adeel Anjum, Mansoor Ahmed:
 MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus. CoRR abs/2011.08538 (2020)
2010 – 2019
- 2019
 [j26]Muhammad Hammad Waseem, Malik Sajjad Ahmed Nadeem, Assad Abbas [j26]Muhammad Hammad Waseem, Malik Sajjad Ahmed Nadeem, Assad Abbas , Aliya Shaheen, Wajid Aziz , Aliya Shaheen, Wajid Aziz , Adeel Anjum , Adeel Anjum , Umar Manzoor , Umar Manzoor , Muhammad A. Balubaid , Muhammad A. Balubaid , Seong-O Shim , Seong-O Shim : :
 On the Feature Selection Methods and Reject Option Classifiers for Robust Cancer Prediction. IEEE Access 7: 141072-141082 (2019)
 [j25]Malik Najmus Saqib [j25]Malik Najmus Saqib , Junaid Kiani, Basit Shahzad, Adeel Anjum , Junaid Kiani, Basit Shahzad, Adeel Anjum , Saif Ur Rehman Malik , Saif Ur Rehman Malik , Naveed Ahmad, Atta ur Rehman Khan , Naveed Ahmad, Atta ur Rehman Khan : :
 Anonymous and formally verified dual signature based online e-voting protocol. Clust. Comput. 22(Suppl 1): 1703-1716 (2019)
 [j24]Zineddine Kouahla [j24]Zineddine Kouahla , Adeel Anjum , Adeel Anjum , Sheeraz Akram , Sheeraz Akram , Tanzila Saba , Tanzila Saba , José Martinez: , José Martinez:
 XM-tree: data driven computational model by using metric extended nodes with non-overlapping in high-dimensional metric spaces. Comput. Math. Organ. Theory 25(2): 196-223 (2019)
 [j23]Sajjad Haider, Tehsin Kanwal, Adeel Anjum [j23]Sajjad Haider, Tehsin Kanwal, Adeel Anjum , Saif Ur Rehman Malik , Saif Ur Rehman Malik , Ahmed Khan , Ahmed Khan , Abid Khan , Abid Khan , Umar Manzoor , Umar Manzoor : :
 An efficient privacy preserving protocol for dynamic continuous data collection. Comput. Secur. 86: 358-371 (2019)
 [j22]Muhammad Waqas [j22]Muhammad Waqas , Saif Ur Rehman Malik , Saif Ur Rehman Malik , Saeed Akbar , Saeed Akbar , Adeel Anjum, Naveed Ahmad: , Adeel Anjum, Naveed Ahmad:
 Convergence time analysis of OSPF routing protocol using social network metrics. Future Gener. Comput. Syst. 94: 62-71 (2019)
 [j21]Muhammad Naeem Shehzad, Qaisar Bashir, Ghufran Ahmad [j21]Muhammad Naeem Shehzad, Qaisar Bashir, Ghufran Ahmad , Adeel Anjum , Adeel Anjum , Muhammad Naeem Awais, Umar Manzoor , Muhammad Naeem Awais, Umar Manzoor , Zeeshan Azmat Shaikh , Zeeshan Azmat Shaikh , Muhammad A. Balubaid , Muhammad A. Balubaid , Tanzila Saba: , Tanzila Saba:
 Thermal-aware resource allocation in earliest deadline first using fluid scheduling. Int. J. Distributed Sens. Networks 15(3) (2019)
 [j20]Tehsin Kanwal, Ather Abdul Jabbar, Adeel Anjum [j20]Tehsin Kanwal, Ather Abdul Jabbar, Adeel Anjum , Saif Ur Rehman Malik , Saif Ur Rehman Malik , Abid Khan , Abid Khan , Naveed Ahmad, Umar Manzoor , Naveed Ahmad, Umar Manzoor , Muhammad Naeem Shehzad, Muhammad A. Balubaid , Muhammad Naeem Shehzad, Muhammad A. Balubaid : :
 Privacy-aware relationship semantics-based XACML access control model for electronic health records in hybrid cloud. Int. J. Distributed Sens. Networks 15(6) (2019)
 [j19]Tehsin Kanwal, Sayed Ali Asjad Shaukat, Adeel Anjum [j19]Tehsin Kanwal, Sayed Ali Asjad Shaukat, Adeel Anjum , Saif Ur Rehman Malik , Saif Ur Rehman Malik , Kim-Kwang Raymond Choo , Kim-Kwang Raymond Choo , Abid Khan , Abid Khan , Naveed Ahmad, Mansoor Ahmad , Naveed Ahmad, Mansoor Ahmad , Samee U. Khan , Samee U. Khan : :
 Privacy-preserving model and generalization correlation attacks for 1: M data with multiple sensitive attributes. Inf. Sci. 488: 238-256 (2019)
 [j18]Amjad Rehman [j18]Amjad Rehman , Tanzila Saba, Toqeer Mahmood, Zahid Mehmood , Tanzila Saba, Toqeer Mahmood, Zahid Mehmood , Mohsin Shah , Mohsin Shah , Adeel Anjum: , Adeel Anjum:
 Data hiding technique in steganography for information security using number theory. J. Inf. Sci. 45(6) (2019)
 [j17]Basit Raza [j17]Basit Raza , Asma Sher, Sana Afzal, Ahmad Kamran Malik, Adeel Anjum, Yogan Jaya Kumar , Asma Sher, Sana Afzal, Ahmad Kamran Malik, Adeel Anjum, Yogan Jaya Kumar , Muhammad Faheem , Muhammad Faheem : :
 Autonomic workload performance tuning in large-scale data repositories. Knowl. Inf. Syst. 61(1): 27-63 (2019)
- 2018
 [j16]Sunnia Amjad, Naveed Ahmad [j16]Sunnia Amjad, Naveed Ahmad , Tanzila Saba , Tanzila Saba , Adeel Anjum, Umar Manzoor , Adeel Anjum, Umar Manzoor , Muhammad A. Balubaid , Muhammad A. Balubaid , Saif Ur Rehman Malik , Saif Ur Rehman Malik : :
 Calculating Completeness of Agile Scope in Scaled Agile Development. IEEE Access 6: 5822-5847 (2018)
 [j15]Saba Yaseen, Syed M. Ali Abbas, Adeel Anjum [j15]Saba Yaseen, Syed M. Ali Abbas, Adeel Anjum , Tanzila Saba , Tanzila Saba , Abid Khan , Abid Khan , Saif Ur Rehman Malik , Saif Ur Rehman Malik , Naveed Ahmad , Naveed Ahmad , Basit Shahzad , Basit Shahzad , Ali Kashif Bashir , Ali Kashif Bashir : :
 Improved Generalization for Secure Data Publishing. IEEE Access 6: 27156-27165 (2018)
 [j14]Adeel Anjum [j14]Adeel Anjum , Saif Ur Rehman Malik , Saif Ur Rehman Malik , Kim-Kwang Raymond Choo , Kim-Kwang Raymond Choo , Abid Khan , Abid Khan , Asma Haroon, Sangeen Khan , Asma Haroon, Sangeen Khan , Samee U. Khan , Samee U. Khan , Naveed Ahmad, Basit Raza , Naveed Ahmad, Basit Raza : :
 An efficient privacy mechanism for electronic health records. Comput. Secur. 72: 196-211 (2018)
 [j13]Fuzel Jamil, Abid Khan [j13]Fuzel Jamil, Abid Khan , Adeel Anjum, Mansoor Ahmed , Adeel Anjum, Mansoor Ahmed , Farhana Jabeen , Farhana Jabeen , Nadeem Javaid , Nadeem Javaid : :
 Secure provenance using an authenticated data structure approach. Comput. Secur. 73: 34-56 (2018)
 [j12]Basit Raza [j12]Basit Raza , Yogan Jaya Kumar , Yogan Jaya Kumar , Ahmad Kamran Malik , Ahmad Kamran Malik , Adeel Anjum, Muhammad Faheem , Adeel Anjum, Muhammad Faheem : :
 Performance prediction and adaptation for database management system workload using Case-Based Reasoning approach. Inf. Syst. 76: 46-58 (2018)
 [j11]Zineddine Kouahla [j11]Zineddine Kouahla , Adeel Anjum, Hamid Seridi: , Adeel Anjum, Hamid Seridi:
 Indexing through separable partitioning for complex data sharing in P2P systems. J. Intell. Fuzzy Syst. 35(6): 6469-6478 (2018)
 [j10]Basharat Mahmood, Naveed Ahmad, Saif Ur Rehman Malik [j10]Basharat Mahmood, Naveed Ahmad, Saif Ur Rehman Malik , Adeel Anjum, Saif ul Islam , Adeel Anjum, Saif ul Islam : :
 Power-efficient scheduling of parallel real-time tasks on performance asymmetric multicore processors. Sustain. Comput. Informatics Syst. 17: 81-95 (2018)
 [j9]Rahmat Ullah [j9]Rahmat Ullah , Naveed Ahmad, Saif Ur Rehman Malik , Naveed Ahmad, Saif Ur Rehman Malik , Saeed Akbar , Saeed Akbar , Adeel Anjum: , Adeel Anjum:
 Simulator for modeling, analysis, and visualizations of thermal status in data centers. Sustain. Comput. Informatics Syst. 19: 324-340 (2018)
 [j8]Adeel Anjum, Naveed Ahmad, Saif Ur Rehman Malik [j8]Adeel Anjum, Naveed Ahmad, Saif Ur Rehman Malik , Samiya Zubair, Basit Shahzad: , Samiya Zubair, Basit Shahzad:
 An efficient approach for publishing microdata for multiple sensitive attributes. J. Supercomput. 74(10): 5127-5155 (2018)
 [c4]Zineddine Kouahla [c4]Zineddine Kouahla , Adeel Anjum: , Adeel Anjum:
 A Parallel Implementation of GHB Tree. CIIA 2018: 47-55
- 2017
 [j7]Behjat Zuhaira, Naveed Ahmad [j7]Behjat Zuhaira, Naveed Ahmad , Tanzila Saba , Tanzila Saba , Junaid Haseeb , Junaid Haseeb , Saif Ur Rehman Malik , Saif Ur Rehman Malik , Umar Manzoor , Umar Manzoor , Muhammad A. Balubaid , Muhammad A. Balubaid , Adeel Anjum: , Adeel Anjum:
 Identifying Deviations in Software Processes. IEEE Access 5: 20319-20332 (2017)
 [j6]Adeel Aslam, Naveed Ahmad [j6]Adeel Aslam, Naveed Ahmad , Tanzila Saba , Tanzila Saba , Abdulaziz S. Almazyad , Abdulaziz S. Almazyad , Amjad Rehman , Amjad Rehman , Adeel Anjum, Abid Khan , Adeel Anjum, Abid Khan : :
 Decision Support System for Risk Assessment and Management Strategies in Distributed Software Development. IEEE Access 5: 20349-20373 (2017)
 [j5]Faheem Zafar, Abid Khan [j5]Faheem Zafar, Abid Khan , Saif Ur Rehman Malik , Saif Ur Rehman Malik , Mansoor Ahmed , Mansoor Ahmed , Adeel Anjum, Majid Iqbal Khan, Nadeem Javed, Masoom Alam, Fuzel Jamil: , Adeel Anjum, Majid Iqbal Khan, Nadeem Javed, Masoom Alam, Fuzel Jamil:
 A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends. Comput. Secur. 65: 29-49 (2017)
 [j4]Adeel Anjum, Guillaume Raschia, Marc Gelgon, Abid Khan [j4]Adeel Anjum, Guillaume Raschia, Marc Gelgon, Abid Khan , Saif Ur Rehman Malik , Saif Ur Rehman Malik , Naveed Ahmad, Mansoor Ahmed , Naveed Ahmad, Mansoor Ahmed , Sabah Suhail , Sabah Suhail , Masoom Alam: , Masoom Alam:
 τ-safety: A privacy model for sequential publication with arbitrary updates. Comput. Secur. 66: 20-39 (2017)
 [j3]Adeel Anjum [j3]Adeel Anjum , Guillaume Raschia: , Guillaume Raschia:
 BangA: An Efficient and Flexible Generalization-Based Algorithm for Privacy Preserving Data Publication. Comput. 6(1): 1 (2017)
 [j2]Faheem Zafar, Abid Khan [j2]Faheem Zafar, Abid Khan , Sabah Suhail , Sabah Suhail , Idrees Ahmed , Idrees Ahmed , Khizar Hameed , Khizar Hameed , Hayat Mohammad Khan, Farhana Jabeen , Hayat Mohammad Khan, Farhana Jabeen , Adeel Anjum: , Adeel Anjum:
 Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes. J. Netw. Comput. Appl. 94: 50-68 (2017)
 [j1]Masoom Alam, Saif Ur Rehman Malik [j1]Masoom Alam, Saif Ur Rehman Malik , Qaisar Javed, Abid Khan , Qaisar Javed, Abid Khan , Shamaila Bisma Khan, Adeel Anjum, Nadeem Javed, Adnan Akhunzada , Shamaila Bisma Khan, Adeel Anjum, Nadeem Javed, Adnan Akhunzada , Muhammad Khurram Khan , Muhammad Khurram Khan : :
 Formal modeling and verification of security controls for multimedia systems in the cloud. Multim. Tools Appl. 76(21): 22845-22870 (2017)
- 2016
 [c3]Muhammad Aleem Taufiq, Nazia Hameed [c3]Muhammad Aleem Taufiq, Nazia Hameed , Adeel Anjum, Fozia Hameed , Adeel Anjum, Fozia Hameed : :
 m-Skin Doctor: A Mobile Enabled System for Early Melanoma Skin Cancer Detection Using Support Vector Machine. eHealth 360° 2016: 468-475
- 2014
 [c2]Adeel Anjum, Adnan Anjum: [c2]Adeel Anjum, Adnan Anjum:
 Differentially Private K-Anonymity. FIT 2014: 153-158
- 2013
 [b1]Adeel Anjum: [b1]Adeel Anjum:
 Towards Privacy-Preserving Publication of Continuous and Dynamic Data Spatial Indexing and Bucketization Approaches. (Publication de données qui préserve la vie privée pour des données continues et dynamiques: Les approches d'indexation spatiales et de bucketization). University of Nantes, France, 2013
 [c1]Adeel Anjum, Guillaume Raschia: [c1]Adeel Anjum, Guillaume Raschia:
 Anonymizing sequential releases under arbitrary updates. EDBT/ICDT Workshops 2013: 145-154
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from  to the list of external document links (if available).
 to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the  of the Internet Archive (if available).
 of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from  ,
,  , and
, and  to record detail pages.
 to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from  and
 and  to record detail pages.
 to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from  .
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-31 02:09 CET by the dblp team
 all metadata released as open data under CC0 1.0 license
 all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID







