


default search action
Farhan Ullah 0001
Person information
- affiliation: Prince Mohammad Bin Fahd University, Dhahran, Saudi Arabia
Other persons with the same name
- Farhan Ullah — disambiguation page
- Farhan Ullah 0002
— XWuxi University, Wuxi, China - Farhan Ullah 0003
— Khyber Pakhtunkhwa, Pakistan - Farhan Ullah 0004
— Northwestern Polytechnical University, Xi'an, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j59]Asad Ur Rehman
, Noor Ul Eman
, Farhan Ullah
, Diletta Cacciagrano
, Leonardo Mostarda
, Nabeel Raza:
Advanced EEG Signal Processing and Deep Q-Learning for Accurate Student Attention Monitoring. IEEE Access 13: 47260-47270 (2025)
[j58]Muhammad Asif Habib
, Umar Raza
, Sohail Jabbar
, Muhammad Farhan
, Farhan Ullah
:
ActionSync Video Transformation: Automated Object Removal and Responsive Effects in Motion Videos Using Hybrid CNN and GRU. IEEE Access 13: 149834-149852 (2025)
[j57]Furong Chang
, Songxian Wu, Yue Zhao
, Kenji Yoshigoe
, Farhan Ullah
, Xueshu Dong:
NRF: A Network Reconstruction Framework for Community Detection in Bipartite Networks. IEEE Access 13: 181507-181518 (2025)
[j56]Farhan Ullah
, Leonardo Mostarda, Diletta Cacciagrano
, Chien-Ming Chen
, Saru Kumari
:
Semantic-Based Federated Defense for Distributed Malicious Attacks. IEEE Consumer Electron. Mag. 14(2): 49-58 (2025)
[j55]Farhan Ullah
, Leonardo Mostarda
, Diletta Cacciagrano
, Chien-Ming Chen
, Mohammed Amoon
, Saru Kumari
:
Metaheuristic-Driven Secure Task Optimization for Consumer Edge Devices. IEEE Consumer Electron. Mag. 14(4): 57-65 (2025)
[j54]Mehwish Naseer
, Farhan Ullah
, Jawad Ahmad
, Rutvij H. Jhaveri
, Thippa Reddy Gadekallu
:
Adaptive IoT Defense With Deep Q-Learning Model for DNS Spoofing Prevention in Self-Organizing Networks. IEEE Commun. Stand. Mag. 9(3): 64-69 (2025)
[j53]Shamsher Ullah
, Jianqiang Li
, Jie Chen
, Ikram Ali
, Salabat Khan
, Abdul Ahad
, Farhan Ullah
, Victor C. M. Leung
:
A Survey on Emerging Trends and Applications of 5G and 6G to Healthcare Environments. ACM Comput. Surv. 57(4): 85:1-85:36 (2025)
[j52]Hamad Naeem
, Farhan Ullah
, Gautam Srivastava
:
Classification of intrusion cyber-attacks in smart power grids using deep ensemble learning with metaheuristic-based optimization. Expert Syst. J. Knowl. Eng. 42(1) (2025)
[j51]Yue Zhao
, Farhan Ullah
, Chien-Ming Chen
, Mohammed Amoon
, Saru Kumari:
Efficient malware detection using hybrid approach of transfer learning and generative adversarial examples with image representation. Expert Syst. J. Knowl. Eng. 42(2) (2025)
[j50]Asad Ur Rehman
, Xiaochuan Shi
, Farhan Ullah
, Zepeng Wang
, Chao Ma
:
Measuring student attention based on EEG brain signals using deep reinforcement learning. Expert Syst. Appl. 269: 126426 (2025)
[j49]Waqas Ahmed, Waseem Iqbal
, Ammar Hassan
, Awais Ahmad, Farhan Ullah
, Gautam Srivastava
:
Elevating e-health excellence with IOTA distributed ledger technology: Sustaining data integrity in next-gen fog-driven systems. Future Gener. Comput. Syst. 168: 107755 (2025)
[j48]Hamad Naeem
, Farhan Ullah, Ondrej Krejcar, Deguang Li
, Danish Vasan:
Optimizing vehicle security: A multiclassification framework using deep transfer learning and metaheuristic-based genetic algorithm optimization. Int. J. Crit. Infrastructure Prot. 49: 100745 (2025)
[j47]Farhan Ullah, Nazeeruddin Mohammad
, Leonardo Mostarda
, Diletta Cacciagrano, Shamsher Ullah
, Yue Zhao
:
THE-TAFL: Transforming Healthcare Edge with Transformer-based Adaptive Federated Learning and Learning Rate Optimization. Internet Things 32: 101605 (2025)
[j46]Shamsher Ullah
, Jianqiang Li
, Jie Chen
, Ikram Ali
, Salabat Khan
, Muhammad Tanveer Hussain
, Farhan Ullah
, Victor C. M. Leung
:
Homomorphic Encryption Applications for IoT and Light-Weighted Environments: A Review. IEEE Internet Things J. 12(2): 1222-1246 (2025)
[j45]Yue Zhao
, Farhan Ullah
, Khalid Mahmood
, Jawad Ahmad
, Ali Kashif Bashir
, Nazik Alturki
:
TFedSec-HI: Transformer-Driven Federated Security for IoT-Enabled Healthcare Industry 5.0 on Non-IID Data. IEEE Internet Things J. 12(22): 46204-46214 (2025)
[j44]Farhan Ullah
, Gautam Srivastava
, Shamsher Ullah
, Leonardo Mostarda
, Jawad Ahmad
:
EIDS-DTL: Edge-Based Intrusion Detection System for IoUAVs Using Metaheuristic Task Optimization and Deep Transfer Learning. IEEE Internet Things J. 12(23): 50594-50603 (2025)
[j43]Jawad Ahmad
, Shahid Latif
, Djamel Djenouri
, Farhan Ullah
, Muhammad Shahbaz Khan
, Malik Muhammad Saad
, Rutvij H. Jhaveri
, Priyanka Verma
:
A Stochastic Prototypical Network for Few-Shot Intrusion Detection in CAN-Based IoV Network. IEEE Open J. Commun. Soc. 6: 6421-6436 (2025)
[j42]Farhan Ullah
, Leonardo Mostarda
, Diletta Cacciagrano
, Mohammed J. F. Alenazi
, Chien-Ming Chen
, Saru Kumari
:
Federated Edge Intelligence for Enhanced Security in Consumer Intermittent Healthcare Devices Using Adversarial Examples. IEEE Trans. Consumer Electron. 71(2): 4574-4585 (2025)
[j41]Farhan Ullah
, Nazeeruddin Mohammad
, Leonardo Mostarda
, Diletta Cacciagrano
, Yue Zhao
:
Q-P2FL: Quantum-Enhanced Federated Edge Intelligence for Privacy-Preserving Adversarial Attack Detection on Consumer Edge Devices. IEEE Trans. Consumer Electron. 71(2): 4914-4924 (2025)
[j40]Hongping Gan
, Hejie Zheng
, Josué-Antonio Nescolarde-Selva
, Yunong Chen
, Zhangfa Wu
, Farhan Ullah
:
TCAD-Net: Integrating Transformer and Convolution for Weakly Supervised Anomaly Data Discovery. IEEE Trans. Consumer Electron. 71(2): 5475-5488 (2025)
[c5]Muhammad Pervez Akhter, Farhan Ullah, Leonardo Mostarda, Diletta Cacciagrano:
A Deep Learning-Based RIDNet Approach for Enhanced Denoising of SAR Images. AINA (7) 2025: 268-279- 2024
[j39]Muhammad Yousaf
, Muhammad Farhan
, Yousaf Saeed
, Muhammad Jamshaid Iqbal
, Farhan Ullah, Gautam Srivastava
:
Enhancing driver attention and road safety through EEG-informed deep reinforcement learning and soft computing. Appl. Soft Comput. 167: 112320 (2024)
[j38]Farhan Ullah
, Shamsher Ullah
, Gautam Srivastava
, Jerry Chun-Wei Lin
:
IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic. Digit. Commun. Networks 10(1): 190-204 (2024)
[j37]Ali Turab
, Wutiphol Sintunavarat, Farhan Ullah, Shujaat Ali Zaidi, Andrés Montoyo, Josué-Antonio Nescolarde-Selva
:
Computational modeling of animal behavior in T-mazes: Insights from machine learning. Ecol. Informatics 81: 102639 (2024)
[j36]Muhammad Jamshaid Iqbal
, Muhammad Farhan
, Farhan Ullah
, Gautam Srivastava
, Sohail Jabbar:
Intelligent multimedia content delivery in 5G/6G networks: A reinforcement learning approach. Trans. Emerg. Telecommun. Technol. 35(4) (2024)
[j35]Shamsher Ullah
, Jian-Qiang Li
, Farhan Ullah
, Jie Chen, Ikram Ali
, Salabat Khan, Abdul Ahad
, Victor C. M. Leung
:
The revolution and vision of explainable AI for Android malware detection and protection. Internet Things 27: 101320 (2024)
[j34]Sheharyar Khan
, Jiangbin Zheng, Muhammad Irfan, Farhan Ullah
, Sohrab Khan:
An expert system for hybrid edge to cloud computational offloading in heterogeneous MEC-MCC environments. J. Netw. Comput. Appl. 225: 103867 (2024)
[j33]Rahat Ullah, Muhammad Yahya
, Leonardo Mostarda, Abdullah Alshammari
, Ahmed I. Alutaibi, Nadeem Sarwar
, Farhan Ullah
, Sibghat Ullah:
Intelligent decision making for energy efficient fog nodes selection and smart switching in the IOT: a machine learning approach. PeerJ Comput. Sci. 10: e1833 (2024)
[j32]Sheharyar Khan
, Jiangbin Zheng, Farhan Ullah, Muhammad Pervez Akhter, Sohrab Khan, Fuad A. Awwad, Emad A. A. Ismail:
Hybrid computing framework security in dynamic offloading for IoT-enabled smart home system. PeerJ Comput. Sci. 10: e2211 (2024)
[j31]Farhan Ullah
, Ali Turab
, Shamsher Ullah
, Diletta Cacciagrano
, Yue Zhao
:
Enhanced Network Intrusion Detection System for Internet of Things Security Using Multimodal Big Data Representation with Transfer Learning and Game Theory. Sensors 24(13): 4152 (2024)
[j30]Farhan Ullah
, Gautam Srivastava
, Shamsher Ullah
, Kenji Yoshigoe
, Yue Zhao
:
NIDS-VSB: Network Intrusion Detection System for VANET Using Spark-Based Big Data Optimization and Transfer Learning. IEEE Trans. Consumer Electron. 70(1): 1798-1809 (2024)
[j29]Farhan Ullah
, Gautam Srivastava
, Shamsher Ullah
, Leonardo Mostarda
:
Privacy-Preserving Federated Learning Approach for Distributed Malware Attacks With Intermittent Clients and Image Representation. IEEE Trans. Consumer Electron. 70(1): 4585-4596 (2024)
[j28]Farhan Ullah
, Gautam Srivastava
, Heng Xiao
, Shamsher Ullah
, Jerry Chun-Wei Lin
, Yue Zhao
:
A Scalable Federated Learning Approach for Collaborative Smart Healthcare Systems With Intermittent Clients Using Medical Imaging. IEEE J. Biomed. Health Informatics 28(6): 3293-3304 (2024)
[j27]Muhammad Jamil
, Muhammad Farhan
, Farhan Ullah
, Gautam Srivastava:
A Lightweight Zero Trust Framework for Secure 5G VANET Vehicular Communication. IEEE Wirel. Commun. 31(6): 136-141 (2024)
[j26]Farhan Ullah
, Shamsher Ullah
, Gautam Srivastava
, Jerry Chun-Wei Lin
, Yue Zhao:
NMal-Droid: network-based android malware detection system using transfer learning and CNN-BiGRU ensemble. Wirel. Networks 30(6): 6177-6198 (2024)
[c4]Farhan Ullah
, Leonardo Mostarda, Diletta Cacciagrano, Hamad Naeem, Shamsher Ullah
, Pradeep Chaudhary, Yue Zhao:
P2FL: Privacy-Preserving Federated Learning Approach for Healthcare Informatics at the Edge. 3PGCIC 2024: 47-58
[c3]Shamsher Ullah
, Jianqiang Li, Farhan Ullah, Diletta Cacciagrano, Muhammad Tanveer Hussain, Victor C. M. Leung:
Homomorphic Cryptography Authentication Scheme to Eliminate Machine Tools Gaps in Industry 4.0. AINA (6) 2024: 76-85
[c2]Farhan Ullah
, Gautam Srivastava, Leonardo Mostarda, Diletta Cacciagrano:
Collaborative Intrusion Detection System for Intermittent 10 Vs Using Federated Learning and Deep Swarm Particle Optimization. DSAA 2024: 1-8- 2023
[j25]Shamsher Ullah
, Jiangbin Zheng
, Nizamud Din, Muhammad Tanveer Hussain
, Farhan Ullah
, Mahwish Yousaf:
Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey. Comput. Sci. Rev. 47: 100530 (2023)
[j24]Hamad Naeem
, Shi Dong, Olorunjube James Falana
, Farhan Ullah
:
Development of a deep stacked ensemble with process based volatile memory forensics for platform independent malware detection and classification. Expert Syst. Appl. 223: 119952 (2023)
[j23]Nizamud Din, Abdul Waheed, Shamsher Ullah
, Noor Ul Amin, Gautam Srivastava, Farhan Ullah
, Jerry Chun-Wei Lin
:
A typology of secure multicast communication over 5 G/6 G networks. Int. J. Inf. Sec. 22(4): 1055-1073 (2023)
[j22]Farhan Ullah
, Xiaochun Cheng
, Leonardo Mostarda
, Sohail Jabbar:
Android-IoT Malware Classification and Detection Approach Using Deep URL Features Analysis. J. Database Manag. 34(2): 1-26 (2023)
[j21]Yang Yang, Haitao Shang, Nasir Jamal, Farhan Ullah
:
Video Resources Recommendation for Online Tourism Teaching in Interactive Network. Mob. Networks Appl. 28(3): 971-982 (2023)
[j20]Jing Ge, Kangcheng Wu, Nasir Jamal, Farhan Ullah
:
Dynamic Resource Allocation Techniques for Wireless Network Data in Elastic Optical Network Applications. Mob. Networks Appl. 28(5): 1712-1723 (2023)
[j19]Farhan Ullah
, Shamsher Ullah
, Gautam Srivastava
, Jerry Chun-Wei Lin
:
Droid-MCFG: Android malware detection system using manifest and control flow traces with multi-head temporal convolutional network. Phys. Commun. 57: 101975 (2023)- 2022
[j18]Farhan Ullah
, Hamad Naeem
, Muhammad Rashid Naeem
, Sohail Jabbar
, Shehazad Khalid, Fadi Al-Turjman, Abdelrahman Abuarqoub:
Detection of clone scammers in Android markets using IoT-based edge computing. Trans. Emerg. Telecommun. Technol. 33(6) (2022)
[j17]Farhan Ullah
, Muhammad Rashid Naeem
, Hamad Naeem
, Xiaochun Cheng, Mamoun Alazab:
CroLSSim: Cross-language software similarity detector using hybrid approach of LSA-based AST-MDrep features and CNN-LSTM model. Int. J. Intell. Syst. 37(9): 5768-5795 (2022)
[j16]Shamsher Ullah
, Jiangbin Zheng, Muhammad Tanveer Hussain
, Nizamud Din, Farhan Ullah
, Muhammad Umar Farooq
:
A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments. J. Inf. Secur. Appl. 70: 103346 (2022)
[j15]Farhan Ullah
, Gautam Srivastava, Shamsher Ullah
:
A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization. J. Cloud Comput. 11: 75 (2022)
[j14]Hamad Naeem, Xiaochun Cheng, Farhan Ullah
, Sohail Jabbar, Shi Dong:
A Deep Convolutional Neural Network Stacked Ensemble for Malware Threat Classification in Internet of Things. J. Circuits Syst. Comput. 31(17): 2250302:1-2250302:21 (2022)
[j13]Farhan Ullah
, Shamsher Ullah
, Muhammad Rashid Naeem
, Leonardo Mostarda
, Seungmin Rho
, Xiaochun Cheng
:
Cyber-Threat Detection System Using a Hybrid Approach of Transfer Learning and Multi-Model Image Representation. Sensors 22(15): 5883 (2022)
[j12]Farhan Ullah
, Amjad Alsirhani
, Mohammed Mujib Alshahrani, Abdullah Alomari
, Hamad Naeem
, Syed Aziz Shah
:
Explainable Malware Detection System Using Transformers-Based Transfer Learning and Multi-Model Visual Representation. Sensors 22(18): 6766 (2022)
[j11]Farhan Ullah
, Jihoon Moon, Hamad Naeem
, Sohail Jabbar:
Explainable artificial intelligence approach in combating real-time surveillance of COVID19 pandemic from CT scan and X-ray images using ensemble model. J. Supercomput. 78(17): 19246-19271 (2022)
[j10]Farhan Ullah
, Muhammad Rashid Naeem
, Abdullah S. Bajahzar
, Fadi Al-Turjman
:
IoT-based Cloud Service for Secured Android Markets using PDG-based Deep Learning Classification. ACM Trans. Internet Techn. 22(2): 40:1-40:17 (2022)- 2021
[j9]Farhan Ullah
, Sohail Jabbar
, Leonardo Mostarda
:
An intelligent decision support system for software plagiarism detection in academia. Int. J. Intell. Syst. 36(6): 2730-2752 (2021)
[j8]Farhan Ullah
, Muhammad Rashid Naeem
, Leonardo Mostarda, Syed Aziz Shah
:
Clone detection in 5G-enabled social IoT system using graph semantics and deep learning model. Int. J. Mach. Learn. Cybern. 12(11): 3115-3127 (2021)
[j7]Nasir Jamal
, Chen Xianqiao, Fadi M. Al-Turjman
, Farhan Ullah
:
A Deep Learning-based Approach for Emotions Classification in Big Corpus of Imbalanced Tweets. ACM Trans. Asian Low Resour. Lang. Inf. Process. 20(3): 42:1-42:16 (2021)- 2020
[j6]Hamad Naeem
, Farhan Ullah
, Muhammad Rashid Naeem
, Shehzad Khalid, Danish Vasan
, Sohail Jabbar, Saqib Saeed
:
Malware detection in industrial internet of things based on hybrid image visualization and deep learning model. Ad Hoc Networks 105: 102154 (2020)
[c1]Umair Khadam, Muhammad Munwar Iqbal, Leonardo Mostarda, Farhan Ullah
:
An Efficient Framework for Text Document Security and Privacy. SocialSec 2020: 132-140
2010 – 2019
- 2019
[j5]Farhan Ullah
, Hamad Naeem
, Sohail Jabbar
, Shehzad Khalid, Muhammad Ahsan Latif, Fadi M. Al-Turjman
, Leonardo Mostarda
:
Cyber Security Threats Detection in Internet of Things Using Deep Learning Approach. IEEE Access 7: 124379-124389 (2019)
[j4]Farhan Ullah
, Junfeng Wang
, Sohail Jabbar
, Fadi Al-Turjman
, Mamoun Alazab
:
Source Code Authorship Attribution Using Hybrid Approach of Program Dependence Graph and Deep Learning Model. IEEE Access 7: 141987-141999 (2019)
[j3]Muhammad Rashid Naeem
, Tao Lin, Hamad Naeem
, Farhan Ullah
, Saqib Saeed
:
Scalable Mutation Testing Using Predictive Analysis of Deep Learning Model. IEEE Access 7: 158264-158283 (2019)
[j2]Hamad Naeem
, Bing Guo, Muhammad Rashid Naeem
, Farhan Ullah
, Hamza Aldabbas, Muhammad Sufyan Javed
:
Identification of malicious code variants based on image visualization. Comput. Electr. Eng. 76: 225-237 (2019)
[j1]Hamad Naeem
, Bing Guo, Farhan Ullah
, Muhammad Rashid Naeem
:
A Cross-Platform Malware Variant Classification based on Image Representation. KSII Trans. Internet Inf. Syst. 13(7): 3756-3777 (2019)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-27 06:54 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







