


default search action
Shamsher Ullah
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j30]Shamsher Ullah
, Jianqiang Li
, Jie Chen
, Ikram Ali
, Salabat Khan
, Abdul Ahad
, Farhan Ullah
, Victor C. M. Leung
:
A Survey on Emerging Trends and Applications of 5G and 6G to Healthcare Environments. ACM Comput. Surv. 57(4): 85:1-85:36 (2025)
[j29]Farhan Ullah, Nazeeruddin Mohammad
, Leonardo Mostarda
, Diletta Cacciagrano, Shamsher Ullah
, Yue Zhao
:
THE-TAFL: Transforming Healthcare Edge with Transformer-based Adaptive Federated Learning and Learning Rate Optimization. Internet Things 32: 101605 (2025)
[j28]Shamsher Ullah
, Jianqiang Li
, Jie Chen
, Ikram Ali
, Salabat Khan
, Muhammad Tanveer Hussain
, Farhan Ullah
, Victor C. M. Leung
:
Homomorphic Encryption Applications for IoT and Light-Weighted Environments: A Review. IEEE Internet Things J. 12(2): 1222-1246 (2025)
[j27]Ikram Ali
, Jianqiang Li
, Jie Chen
, Yong Chen
, Shamsher Ullah
, Abdul Wakeel
, Beirong Mo:
An Efficient Location Privacy-Preserving Scheme for Edge Computing Using CLC-to-PKI-Based Heterogeneous Deniable Authentication. IEEE Internet Things J. 12(16): 34054-34067 (2025)
[j26]Farhan Ullah
, Gautam Srivastava
, Shamsher Ullah
, Leonardo Mostarda
, Jawad Ahmad
:
EIDS-DTL: Edge-Based Intrusion Detection System for IoUAVs Using Metaheuristic Task Optimization and Deep Transfer Learning. IEEE Internet Things J. 12(23): 50594-50603 (2025)
[j25]Muhammad Tanveer Hussain, Imrana Shafique, Shamsher Ullah:
A novel TriCore scheme for multiple RGB images in telemedicine environments. Knowl. Based Syst. 329: 114451 (2025)
[j24]Ikram Ali
, Jianqiang Li
, Jie Chen
, Yong Chen
, Shamsher Ullah
, Abdul Wakeel
:
Preserving Location Privacy of IoT Devices in Heterogeneous Edge Computing Architecture Through Deniability-Based Authentication. IEEE Trans. Consumer Electron. 71(2): 3266-3278 (2025)- 2024
[j23]Shamsher Ullah
, Jiangbin Zheng, Muhammad Tanveer Hussain
, Muhammad Wasif Sardar
, Muhammad Umar Farooq
, Salabat Khan
:
An investigating study of blind and ID-based signcryption schemes for misuse risk protection and high performance computing. Clust. Comput. 27(1): 721-735 (2024)
[j22]Farhan Ullah
, Shamsher Ullah
, Gautam Srivastava
, Jerry Chun-Wei Lin
:
IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic. Digit. Commun. Networks 10(1): 190-204 (2024)
[j21]Shamsher Ullah
, Jian-Qiang Li
, Farhan Ullah
, Jie Chen, Ikram Ali
, Salabat Khan, Abdul Ahad
, Victor C. M. Leung
:
The revolution and vision of explainable AI for Android malware detection and protection. Internet Things 27: 101320 (2024)
[j20]Ikram Ali
, Jianqiang Li
, Jie Chen
, Yong Chen
, Shamsher Ullah
, Salabat Khan
:
IOOSC-U2G: An Identity-Based Online/Offline Signcryption Scheme for Unmanned Aerial Vehicle to Ground Station Communication. IEEE Internet Things J. 11(18): 29941-29955 (2024)
[j19]Mahwish Yousaf
, Muhammad Saadat Shakoor Khan
, Shamsher Ullah
:
An Extended-Isomap for high-dimensional data accuracy and efficiency: a comprehensive survey. Multim. Tools Appl. 83(38): 85523-85574 (2024)
[j18]Farhan Ullah
, Ali Turab
, Shamsher Ullah
, Diletta Cacciagrano
, Yue Zhao
:
Enhanced Network Intrusion Detection System for Internet of Things Security Using Multimodal Big Data Representation with Transfer Learning and Game Theory. Sensors 24(13): 4152 (2024)
[j17]Farhan Ullah
, Gautam Srivastava
, Shamsher Ullah
, Kenji Yoshigoe
, Yue Zhao
:
NIDS-VSB: Network Intrusion Detection System for VANET Using Spark-Based Big Data Optimization and Transfer Learning. IEEE Trans. Consumer Electron. 70(1): 1798-1809 (2024)
[j16]Farhan Ullah
, Gautam Srivastava
, Shamsher Ullah
, Leonardo Mostarda
:
Privacy-Preserving Federated Learning Approach for Distributed Malware Attacks With Intermittent Clients and Image Representation. IEEE Trans. Consumer Electron. 70(1): 4585-4596 (2024)
[j15]Farhan Ullah
, Gautam Srivastava
, Heng Xiao
, Shamsher Ullah
, Jerry Chun-Wei Lin
, Yue Zhao
:
A Scalable Federated Learning Approach for Collaborative Smart Healthcare Systems With Intermittent Clients Using Medical Imaging. IEEE J. Biomed. Health Informatics 28(6): 3293-3304 (2024)
[j14]Farhan Ullah
, Shamsher Ullah
, Gautam Srivastava
, Jerry Chun-Wei Lin
, Yue Zhao:
NMal-Droid: network-based android malware detection system using transfer learning and CNN-BiGRU ensemble. Wirel. Networks 30(6): 6177-6198 (2024)
[c3]Farhan Ullah
, Leonardo Mostarda, Diletta Cacciagrano, Hamad Naeem
, Shamsher Ullah
, Pradeep Chaudhary, Yue Zhao:
P2FL: Privacy-Preserving Federated Learning Approach for Healthcare Informatics at the Edge. 3PGCIC 2024: 47-58
[c2]Shamsher Ullah
, Jianqiang Li, Farhan Ullah, Diletta Cacciagrano, Muhammad Tanveer Hussain, Victor C. M. Leung:
Homomorphic Cryptography Authentication Scheme to Eliminate Machine Tools Gaps in Industry 4.0. AINA (6) 2024: 76-85- 2023
[j13]Salabat Khan
, Fei Luo
, Zijian Zhang
, Farhan Ullah
, Farhan Amin
, Syed Furqan Qadri
, Md Belal Bin Heyat
, Rukhsana Ruby
, Lu Wang
, Shamsher Ullah
, Meng Li
, Victor C. M. Leung
, Kaishun Wu
:
A Survey on X.509 Public-Key Infrastructure, Certificate Revocation, and Their Modern Implementation on Blockchain and Ledger Technologies. IEEE Commun. Surv. Tutorials 25(4): 2529-2568 (2023)
[j12]Shamsher Ullah
, Jiangbin Zheng
, Nizamud Din, Muhammad Tanveer Hussain
, Farhan Ullah
, Mahwish Yousaf:
Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey. Comput. Sci. Rev. 47: 100530 (2023)
[j11]Nizamud Din, Abdul Waheed, Shamsher Ullah
, Noor Ul Amin, Gautam Srivastava, Farhan Ullah
, Jerry Chun-Wei Lin
:
A typology of secure multicast communication over 5 G/6 G networks. Int. J. Inf. Sec. 22(4): 1055-1073 (2023)
[j10]Farhan Ullah
, Shamsher Ullah
, Gautam Srivastava
, Jerry Chun-Wei Lin
:
Droid-MCFG: Android malware detection system using manifest and control flow traces with multi-head temporal convolutional network. Phys. Commun. 57: 101975 (2023)
[j9]Muhammad Umar Farooq
, Xingfu Wang
, Ammar Hawbani
, Asad Khan
, Adeel Ahmed
, Fisseha Teju Wedaj
, Shamsher Ullah
:
TORAS: Trustworthy Load-Balanced Opportunistic Routing for Asynchronous Duty-Cycled WSNs. IEEE Syst. J. 17(2): 2259-2270 (2023)- 2022
[j8]Shamsher Ullah
, Jiangbin Zheng, Muhammad Tanveer Hussain
, Nizamud Din, Farhan Ullah
, Muhammad Umar Farooq
:
A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments. J. Inf. Secur. Appl. 70: 103346 (2022)
[j7]Farhan Ullah
, Gautam Srivastava, Shamsher Ullah
:
A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization. J. Cloud Comput. 11: 75 (2022)
[j6]Shamsher Ullah
, Muhammad Tanveer Hussain
, Mahwish Yousaf:
QuSigS: A quantum Signcryption scheme to recover key escrow problem and key revocation problem in cloud computing. Multim. Tools Appl. 81(25): 36781-36803 (2022)
[j5]Farhan Ullah
, Shamsher Ullah
, Muhammad Rashid Naeem
, Leonardo Mostarda
, Seungmin Rho
, Xiaochun Cheng
:
Cyber-Threat Detection System Using a Hybrid Approach of Transfer Learning and Multi-Model Image Representation. Sensors 22(15): 5883 (2022)- 2021
[j4]Mahwish Yousaf, Muhammad Saadat Shakoor Khan
, Tanzeel U. Rehman, Shamsher Ullah
, Jing Li:
NRIC: A Noise Removal Approach for Nonlinear Isomap Method. Neural Process. Lett. 53(3): 2277-2304 (2021)
[j3]Shamsher Ullah
, Nizamud Din:
Blind signcryption scheme based on hyper elliptic curves cryptosystem. Peer-to-Peer Netw. Appl. 14(2): 917-932 (2021)- 2020
[j2]Shamsher Ullah
, Xiang-Yang Li, Lan Zhang:
A novel trusted third party based signcryption scheme. Multim. Tools Appl. 79(31-32): 22749-22769 (2020)
2010 – 2019
- 2019
[j1]Shamsher Ullah
, Xiang-Yang Li, Muhammad Tanveer Hussain
, Lan Zhang:
Kernel homomorphic encryption protocol. J. Inf. Secur. Appl. 48 (2019)- 2017
[c1]Shamsher Ullah
, Xiang-Yang Li, Lan Zhang:
A Review of Signcryption Schemes Based on Hyper Elliptic Curve. BigCom 2017: 51-58
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-12-28 01:39 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







