


default search action
M. Arif Khan
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2025
[j17]Samrah Arif
, M. Arif Khan
, Sabih ur Rehman
:
Machine Learning Based Channel Estimation for Low-Power Internet of Things (LP-IoT) Devices: A Probabilistic Analysis. IEEE Access 13: 38470-38483 (2025)
[j16]Jamil Ispahany
, Md. Rafiqul Islam
, M. Arif Khan
, Md Zahidul Islam
:
iCNN-LSTM+: A Batch-Based Incremental Ransomware Detection System Using Sysmon. IEEE Access 13: 87978-87998 (2025)
[j15]Syed Usman Jamil
, M. Arif Khan
, Muhammad Ali Paracha, Abdul Rasheed:
Using intelligence in resource allocation and task off-loading for the IoE-edge networks. Comput. Networks 256: 110884 (2025)
[j14]Syed Usman Jamil
, M. Arif Khan
, Md. Abdur Rahman, Muhammad Ali Paracha, Tanveer A. Zia
, Syed Sadiqur Rahman, Syed Bilal Ahmed:
How intelligence is reshaping today: IoE edge networks? Internet Things 33: 101717 (2025)- 2024
[j13]Samrah Arif
, M. Arif Khan
, Sabih ur Rehman
:
Wireless Channel Estimation for Low-Power IoT Devices Using Real-Time Data. IEEE Access 12: 17895-17914 (2024)
[j12]Jamil Ispahany
, Md. Rafiqul Islam
, Md Zahidul Islam
, M. Arif Khan
:
Ransomware Detection Using Machine Learning: A Review, Research Limitations and Future Directions. IEEE Access 12: 68785-68813 (2024)
[j11]Jonathan Cook
, Sabih ur Rehman
, M. Arif Khan
:
Lightweight Cryptanalysis of IoT Encryption Algorithms: Is Quota Sampling the Answer? IEEE Access 12: 147619-147639 (2024)- 2023
[j10]Jonathan Cook
, Sabih ur Rehman
, M. Arif Khan
:
Security and Privacy for Low Power IoT Devices on 5G and Beyond Networks: Challenges and Future Directions. IEEE Access 11: 39295-39317 (2023)- 2022
[j9]Syed Usman Jamil
, M. Arif Khan
, Sabih ur Rehman
:
Resource Allocation and Task Off-Loading for 6G Enabled Smart Edge Environments. IEEE Access 10: 93542-93563 (2022)
[j8]Jasneet Kaur
, M. Arif Khan
:
Federation based joint client and server side Machine Learning for 5G and beyond Wireless Channel Estimation. Comput. Networks 209: 108902 (2022)- 2021
[j7]Jasneet Kaur
, M. Arif Khan
, Mohsin Iftikhar, Muhammad Imran, Qazi Emad-ul-Haq
:
Machine Learning Techniques for 5G and Beyond. IEEE Access 9: 23472-23488 (2021)- 2020
[j6]Samrah Arif, M. Arif Khan, Sabih ur Rehman, Muhammad Ashad Kabir, Muhammad Imran:
Investigating Smart Home Security: Is Blockchain the Answer? IEEE Access 8: 117802-117816 (2020)- 2019
[j5]Muhammad Jafer, M. Arif Khan
, Sabih ur Rehman
, Tanveer A. Zia
:
Secure Communication in VANET Broadcasting. EAI Endorsed Trans. Security Safety 5(17): e2 (2019)- 2018
[j4]Muhammad Jafer
, M. Arif Khan
, Sabih ur Rehman
, Tanveer A. Zia
:
Evolutionary Algorithm Based Optimized Relay Vehicle Selection in Vehicular Communication. IEEE Access 6: 71524-71539 (2018)- 2017
[j3]Sabih ur Rehman
, M. Arif Khan
, Muhammad Imran, Tanveer A. Zia
, Mohsin Iftikhar:
Enhancing Quality-of-Service Conditions Using a Cross-Layer Paradigm for Ad-Hoc Vehicular Communication. IEEE Access 5: 12404-12416 (2017)
[j2]Jahanzeb Sarwar Malik, Umair Rafique
, Syed Ahsan Ali, Muhammad Arif Khan
:
Novel patch antenna for multiband cellular, WiMAX, and WLAN applications. Turkish J. Electr. Eng. Comput. Sci. 25: 2005-2014 (2017)- 2015
[j1]Sabih ur Rehman
, M. Arif Khan
, Tanveer A. Zia
:
A multi-hop cross layer decision based routing for VANETs. Wirel. Networks 21(5): 1647-1660 (2015)
Conference and Workshop Papers
- 2025
[c28]Wenfeng Jia, Bin Liang, Yuxi Lu, Attavit Wilaiwongsakul, Muhammad Arif Khan, Lihong Zheng:
HOTA: Hierarchical Overlap-Tiling Aggregation for Large-Area 3D Flood Mapping. ACPR (2) 2025: 188-202
[c27]Ather Saeed, M. Arif Khan
, Muhammad Imran:
GTFD Protocol for Fault-detection and Self-stabilization in Wireless Sensor Networks. IWCMC 2025: 1416-1421
[c26]Wenfeng Jia
, Bin Liang
, Yuxi Lu
, Muhammad Arif Khan
, Lihong Zheng
:
A Comprehensive Survey on Deep Learning Solutions for 3D Flood Mapping. PAKDD (6) 2025: 21-38- 2024
[c25]Peter Padiet, Rafiqul Islam
, M. Arif Khan
:
Users' Scenario-Base for Analysing Insider Threat Detection Based on User's Downloads Activity Logs. FICC (2) 2024: 457-472
[c24]Samrah Arif, M. Arif Khan, Sabih ur Rehman:
Deep Learning Approaches to Indoor Wireless Channel Estimation for Low-Power Communication. ICC Workshops 2024: 1547-1552
[c23]Jonathan Cook
, Sabih ur Rehman
, M. Arif Khan
:
Cryptanalysis of the SIMON Cypher Using Neo4j. ICECET 2024: 1-6
[c22]Samrah Arif, M. Arif Khan, Sabih ur Rehman, Syed Muzahir Abbas:
RSSI Estimation for Constrained Indoor Wireless Networks Using ANN. ICECET 2024: 1-6
[c21]Jamil Ispahany
, Md. Rafiqul Islam
, M. Arif Khan
, Md Zahidul Islam
:
iCNN-LSTM: An Incremental CNN-LSTM Based Ransomware Detection System. WISE (PhD Symposium, Demos and Workshops) 2024: 46-60- 2023
[c20]Peter Padiet, Md. Rafiqul Islam
, M. Arif Khan
:
Analysis of Malicious Intruder Threats to Data Integrity. ACR 2023: 359-368- 2021
[c19]Ron Bester, M. Arif Khan
:
Next Generation Cloud Computing: Security, Privacy and Trust Issues from the System View. JCSSE 2021: 1-6
[c18]Muhammad Jafer, M. Arif Khan
, Sabih ur Rehman
, Tanveer A. Zia
:
A Game Theoretical Approach To Model Vehicular Broadcast Communication. VTC Fall 2021: 1-6- 2020
[c17]Quazi Mamun
, Muhammad Arif Khan
:
A Group Mutual Exclusion protocol for the Use Case of IoT-Blockchain Integration In Work-Safe Scenario. CCWC 2020: 25-30
[c16]Syed Usman Jamil
, M. Arif Khan
, Sabih ur Rehman
:
Intelligent Task Off-Loading and Resource Allocation for 6G Smart City Environment. LCN 2020: 441-444
[c15]Syed Usman Jamil
, M. Arif Khan
, Sabih ur Rehman
:
Edge Computing Enabled Technologies for Secure 6G Smart Environment-An Overview. SoCPaR 2020: 934-945
[c14]Usha Choudhary, Vijay Janyani, Muhammad Arif Khan
:
Dual Frame OFDM with Optical Phase Conjugation. WOCC 2020: 1-4- 2019
[c13]M. Arif Khan
:
Fog Computing in 5G Enabled Smart Cities: Conceptual Framework, Overview and Challenges. ISC2 2019: 438-443
[c12]Ather Saeed, M. Arif Khan
, Ali Syed:
Fault-Localization Protocol for Wireless Sensor Networks. LCN Symposium 2019: 42-49- 2017
[c11]Muhammad Jafer, M. Arif Khan
, Sabih ur Rehman
, Tanveer A. Zia:
Exploring Secure Communication in VANET Broadcasting. ATCS/SePrIoT@SecureComm 2017: 69-84
[c10]Muhammad Jafer, M. Arif Khan
, Sabih ur Rehman
, Tanveer A. Zia
:
Broadcasting under Highway Environment in VANETs Using Genetic Algorithm. VTC Spring 2017: 1-5- 2016
[c9]M. Arif Khan
, M. Aziz ul Haq, Sabih ur Rehman
:
A practical miniature antenna design for future internet of things enabled smart devices. ICSPCS 2016: 1-6
[c8]Sabih ur Rehman
, M. Arif Khan
, Tanveer A. Zia
, Albert Y. Zomaya
:
Joint Rate and Queue Based Routing for Vehicular Ad-Hoc Networks. LCN Workshops 2016: 165-172
[c7]Muhammad Jafer, M. Arif Khan
, Sabih ur Rehman
, Tanveer A. Zia
:
Optimizing Broadcasting Scheme for VANETs Using Genetic Algorithm. LCN Workshops 2016: 222-229
[c6]M. Aziz ul Haq, M. Arif Khan
, Md. Rafiqul Islam
:
A novel compact antenna design for secure eHealth wireless applications. SNPD 2016: 281-286- 2015
[c5]M. Arif Khan
, Rafiqul Islam
:
Secrecy Rate Based User Selection Algorithms for Massive MIMO Wireless Networks. SecureComm 2015: 697-710
[c4]M. Arif Khan
, Md. Rafiqul Islam
, Morshed U. Chowdhury
:
A novel approach to maximize the sum-rate for MIMO broadcast channels. SNPD 2015: 155-159
[c3]Sabih ur Rehman
, M. Arif Khan, Tanveer A. Zia
, Muhammad Jafer:
Quality of service based cross layer routing protocol for VANETs. SNPD 2015: 161-166- 2014
[c2]Sabih ur Rehman
, M. Arif Khan
, Tanveer A. Zia
:
Wireless transmission modeling for Vehicular Ad-hoc Networks. ICPADS 2014: 398-403
[c1]Sabih ur Rehman
, M. Arif Khan
, Tanveer A. Zia
:
Cross layer routing for VANETs. WoWMoM 2014: 1-4
Informal and Other Publications
- 2025
[i9]Jamil Ispahany, Md. Rafiqul Islam, M. Arif Khan, Md Zahidul Islam:
iCNN-LSTM: A batch-based incremental ransomware detection system using Sysmon. CoRR abs/2501.01083 (2025)
[i8]Jamil Ispahany, Md. Rafiqul Islam, M. Arif Khan, Md Zahidul Islam:
A Sysmon Incremental Learning System for Ransomware Analysis and Detection. CoRR abs/2501.01089 (2025)
[i7]Wenfeng Jia, Bin Liang, Yuxi Liu, Muhammad Arif Khan, Lihong Zheng:
A Comprehensive Survey on Deep Learning Solutions for 3D Flood Mapping. CoRR abs/2506.13201 (2025)
[i6]Wenfeng Jia, Bin Liang, Yuxi Lu, Attavit Wilaiwongsakul, Muhammad Arif Khan, Lihong Zheng:
HOTA: Hierarchical Overlap-Tiling Aggregation for Large-Area 3D Flood Mapping. CoRR abs/2507.07585 (2025)- 2024
[i5]Jonathan Cook, Sabih ur Rehman
, M. Arif Khan:
Lightweight Cryptanalysis of IoT Encryption Algorithms : Is Quota Sampling the Answer? CoRR abs/2404.08165 (2024)
[i4]Samrah Arif, M. Arif Khan, Sabih ur Rehman
:
RSSI Estimation for Constrained Indoor Wireless Networks using ANN. CoRR abs/2404.15337 (2024)
[i3]Jonathan Cook, Sabih ur Rehman
, M. Arif Khan:
Cryptanalysis of the SIMON Cypher Using Neo4j. CoRR abs/2405.04735 (2024)
[i2]Samrah Arif, Muhammad Arif Khan, Sabih ur Rehman
:
Deep learning approaches to indoor wireless channel estimation for low-power communication. CoRR abs/2405.12427 (2024)- 2023
[i1]Jonathan Cook, Sabih ur Rehman
, M. Arif Khan:
Security and Privacy for Low Power IoT Devices on 5G and Beyond Networks: Challenges and Future Directions. CoRR abs/2304.00713 (2023)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-27 06:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







