


default search action
Muhammad Nadeem
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Muhammad Nadeem 0001
— SPILab Corporation, Seoul, South Korea - Muhammad Nadeem 0002
— American University of the Middle East, College of Engineering and Technology, Egaila, Kuwait (and 1 more) - Muhammad Nadeem 0003
— Qujing Normal University, School of Mathematics and Statistics, China (and 1 more) - Muhammad Nadeem 0004
— Vanderbilt University, Civil and Environmental Engineering Department, Nashville, TN, USA (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j30]Muhammad Nadeem, Muhammad Maaz Rehan, Saima Gulzar Ahmad, Ehsan Ullah Munir, Muhammad Waqas Rehan:
PFCS: An efficient Path setup and Fast Channel Switching protocol for cognitive mobile IoTs. Ad Hoc Networks 171: 103786 (2025)
[j29]Muhammad Kamran, Qingyu Zhang
, Shahzaib Ashraf, Muhammad Nadeem:
Enhancing decision-making in environmental management: a complex picture fuzzy soft set approach to sustainability assessment. Comput. Appl. Math. 44(5): 258 (2025)
[j28]Muhammad Nadeem
, Hongsong Chen:
Advancing social network security with magteon-turing L3TM: A multi-layered defense system against cyber threats. Comput. Networks 267: 111375 (2025)
[j27]Mohammad Mazyad Hazzazi, Muhammad Nadeem, Muhammad Kamran, Muhammad Arshad, M. I. Elashiry, Samuel Asefa Fufa:
Linking Bipartiteness and Inversion in Algebra via Graph-Theoretic Methods and Simulink. Complex. 2025(1) (2025)
[j26]Muhammad Kamran, Muhammad Nadeem, Manal E. M. Abdulla, Ismail Naci Cangül, Nurullayev Mirolim Nosirovich:
Computational Analysis of Benzenoid Systems Using Valency-Based Entropy Metrics and Topological Indices. Complex. 2025(1) (2025)
[j25]Muhammad Nadeem
, Hongsong Chen:
Protecting social networks against Dual-Vector attacks using Swarm OpenAI, Large Language Models, Swarm Intelligence, and Transformers. Expert Syst. Appl. 278: 127307 (2025)
[c15]Rajanbir Singh Tucker, Muhammad Nadeem, Shahbaz Pervez:
Real-Time Detection and Mitigation of GPS Spoofing in UAV Systems. ICIT 2025: 154-160
[c14]Muhammad Nadeem, Rashid Mustafa, Pierre E. Abi-Char, Rajanbir Singh Tucker:
A Study of Security Threats in IoT Network Layer using MQTT and TLS. ICIT 2025: 161-166- 2024
[j24]Farhan Mateen Khan
, Asim Munir, Majed Albaity
, Muhammad Nadeem
, Tahir Mahmood
:
Software Reliability Growth Model Selection by Using VIKOR Method Based on q-Rung Orthopair Fuzzy Entropy and Divergence Measures. IEEE Access 12: 86572-86582 (2024)
[j23]Shujaat Ali, Muhammad Nadeem
, Sheeraz Ahmed, Mohammad Asmat Ullah Khan
, Muhammad Tahir
:
3D Dynamic Topology With Energy-Aware Forwarding in Underwater Acoustic Networks (MAEARS). IEEE Access 12: 129319-129329 (2024)
[j22]Sarfraz Ahmad, Muhammad Kamran Siddiqui, Muhammad Arfan Ali, Muhammad Nadeem
:
On the Shelter of a Poset & Its Algebraic Applications. Ars Comb. 159(1): 59-71 (2024)
[j21]Mohammad Mazyad Hazzazi, Muhammad Nadeem, Muhammad Kamran, Ismail Naci Cangül
, J. Akhter:
Holomorphism and Edge Labeling: An Inner Study of Latin Squares Associated with Antiautomorphic Inverse Property Moufang Quasigroups with Applications. Complex. 2024 (2024)
[j20]Faizan Ullah
, Muhammad Nadeem, Muhammad Abrar:
Revolutionizing Brain Tumor Segmentation in MRI with Dynamic Fusion of Handcrafted Features and Global Pathway-based Deep Learning. KSII Trans. Internet Inf. Syst. 18(1): 105-125 (2024)
[j19]Muhammad Nadeem
, Sharafat Ali
, Md. Ashraful Alam
:
Graphs Connected to Isotopes of Inverse Property Quasigroups: A Few Applications. J. Appl. Math. 2024 (2024)
[j18]Abid Mahboob, Imran Siddique
, Muhammad Asif
, Muhammad Nadeem
, Aysha Saleem:
Construction of highly non linear component of block cipher based on mclaurin series and mellin transformation with application in image encryption. Multim. Tools Appl. 83(3): 7159-7177 (2024)
[j17]Muhammad Abrar, Abdu Salam, Faizan Ullah, Muhammad Nadeem, Hussain AlSalman
, Muaadh Mukred
, Farhan Amin:
Advanced neural network-based model for predicting court decisions on child custody. PeerJ Comput. Sci. 10: e2293 (2024)
[j16]Shujaat Ali, Muhammad Nadeem, Sheeraz Ahmed, Faheem Khan, Murad Khan, Abdullah Alharbi:
Acoustic Sensors data transmission integrity and endurance with IoT-enabled location-aware framework. PeerJ Comput. Sci. 10: e2452 (2024)
[j15]Syeda Wajiha Zahra
, Muhammad Nadeem
, Ali Arshad
, Saman Riaz
, Waqas Ahmed, Muhammad Abu Bakr, Amerah A. Alabrah
:
Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks. Symmetry 16(5): 605 (2024)
[j14]Muhammad Kamran, Manal Elzain Mohamed Abdalla, Muhammad Nadeem, Anns Uzair, Muhammad Farman, Lakhdar Ragoub, Ismail Naci Cangül
:
A Systematic Formulation into Neutrosophic Z Methodologies for Symmetrical and Asymmetrical Transportation Problem Challenges. Symmetry 16(5): 615 (2024)
[j13]Muhammad Kamran, Muhammad Nadeem, Justyna Zywiolek
, Manal Elzain Mohamed Abdalla, Anns Uzair, Aiman Ishtiaq:
Enhancing Transportation Efficiency with Interval-Valued Fermatean Neutrosophic Numbers: A Multi-Item Optimization Approach. Symmetry 16(6): 766 (2024)
[j12]Afia Zafar, Noushin Saba
, Ali Arshad
, Amerah A. Alabrah
, Saman Riaz
, Mohsin Suleman
, Shahneer Zafar, Muhammad Nadeem
:
Convolutional Neural Networks: A Comprehensive Evaluation and Benchmarking of Pooling Layer Variants. Symmetry 16(11): 1516 (2024)
[j11]Muhammad Nadeem
, Muhammad Irfan Malik
, Arif Ullah
, Novaira Junaid
:
Smoking Dynamics: Factors Supplementing Tobacco Smoking in Pakistan. IEEE Trans. Comput. Soc. Syst. 11(4): 5367-5373 (2024)
[i7]Usman Ali, Sahil Ranmbail, Muhammad Nadeem, Hamid Ishfaq, Muhammad Umer Ramzan, Waqas Ali:
Leveraging Deep Learning with Multi-Head Attention for Accurate Extraction of Medicine from Handwritten Prescriptions. CoRR abs/2412.18199 (2024)- 2023
[j10]Faizan Ullah
, Muhammad Nadeem
, Muhammad Abrar
, Farhan Amin
, Abdu Salam
, Amerah A. Alabrah, Hussain AlSalman
:
Evolutionary Model for Brain Cancer-Grading and Classification. IEEE Access 11: 126182-126194 (2023)
[c13]Muhammad Nadeem, Aqib Khan, Ji-Won Kim, Lien Minh Dang, Hyeonjoon Moon:
Wheat Diseases Recognition Using Optimal Features Assisted Modified Soft Attention Network. ICTC 2023: 1487-1492
[i6]Muhammad Nadeem, Faisal Bukhari, Ali Hussain:
Predicting the Students Involvements and its Impacts on Learning Outcomes Through Online Education During Covid-19. CoRR abs/2301.00031 (2023)
[i5]Muhammad Nadeem, Humaira Afzal, Muhammad Idrees, Sajid Iqbal, Muhammad Rafiq Asim:
A Review Of Progress for Component Based Software Cost Estimation From 1965 to 2023. CoRR abs/2306.03971 (2023)- 2022
[j9]Abid Mahboob, Muhammad Asif
, Imran Siddique, Aysha Saleem, Muhammad Nadeem
, Dariusz Grzelczyk, Jan Awrejcewicz
:
A Novel Construction of Substitution Box Based on Polynomial Mapped and Finite Field With Image Encryption Application. IEEE Access 10: 119244-119258 (2022)
[j8]Abid Mahboob, Muhammad Asif
, Muhammad Nadeem
, Aysha Saleem, Sayed M. Eldin, Imran Siddique:
A Cryptographic Scheme for Construction of Substitution Boxes Using Quantic Fractional Transformation. IEEE Access 10: 132908-132916 (2022)- 2021
[j7]Muhammad Nadeem
, Ali Arshad
, Saman Riaz
, Shahab S. Band, Amir Mosavi
:
Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention System. IEEE Access 9: 152300-152309 (2021)
[j6]Muhammad Nadeem, Ahmed Elmoasry, Imran Siddique
, Fahd Jarad
, Rana Muhammad Zulqarnain
, Jawdat Alebraheem
, Naseer S. Elazab:
Study of Triangular Fuzzy Hybrid Nanofluids on the Natural Convection Flow and Heat Transfer between Two Vertical Plates. Comput. Intell. Neurosci. 2021: 3678335:1-3678335:15 (2021)
[j5]Imran Siddique
, Rana Muhammad Zulqarnain
, Muhammad Nadeem, Fahd Jarad
:
Numerical Simulation of MHD Couette Flow of a Fuzzy Nanofluid through an Inclined Channel with Thermal Radiation Effect. Comput. Intell. Neurosci. 2021: 6608684:1-6608684:16 (2021)
[j4]Muhammad Nadeem, Muhammad Altaf
, Ayaz Ahmad
:
Short-Term Load Forecasting Using Hybrid Neural Network. Int. J. Appl. Metaheuristic Comput. 12(1): 142-156 (2021)
[c12]Muhammad Nadeem, Khurram Shahzad, Nadeem Majeed:
Extracting Software Change Requests from Mobile App Reviews. ASE Workshops 2021: 198-203- 2020
[j3]Muhammad Nadeem, Ayyaz Hussain, Asim Munir, Muhammad Habib
, Muhammad Tahir Naseem:
Removal of random valued impulse noise from grayscale images using quadrant based spatially adaptive fuzzy filter. Signal Process. 169: 107403 (2020)
[c11]Siraj Un Muneer, Muhammad Nadeem, Bakhtiar Kasi, Mir Hamayoun Yousaf:
Evaluating the Effectiveness of Notations for Designing Security Aspects. ICACT 2020: 465-471
2010 – 2019
- 2019
[j2]Muhammad Tahir Naseem, Muhammad Nadeem, Ijaz Mansoor Qureshi, Ayyaz Hussain:
Optimal Secure Information using Digital Watermarking and Fuzzy Rule base. Multim. Tools Appl. 78(6): 7691-7712 (2019)
[j1]Muhammad Nadeem
, Ayyaz Hussain, Asim Munir:
Fuzzy logic based computational model for speckle noise removal in ultrasound images. Multim. Tools Appl. 78(13): 18531-18548 (2019)
[c10]Bushra Haq
, Muhammad Nadeem, Imran Ali, Kamran Ali, Mohsin Raza
, Masood Ur Rehman:
Use of Expert System in Requirements Engineering Process A Systematic Literature Review. UCET 2019: 1-5- 2016
[c9]Muhammad Nadeem, Byron J. Williams, Gary L. Bradshaw, Edward B. Allen:
Human Subject Evaluation of Computer-Security Training Recommender. COMPSAC 2016: 251-256
[i4]Muhammad Nadeem:
Standard quantum bit commitment - an indefinite commitment time. IACR Cryptol. ePrint Arch. 2016: 39 (2016)
[i3]Muhammad Nadeem:
Secure positioning and quantum non-local correlations. IACR Cryptol. ePrint Arch. 2016: 59 (2016)- 2015
[c8]W. Noor-ul-Ain, Muhammad Atta-ur-Rahman
, Muhammad Nadeem, Abdul Ghafoor Abbasi:
Quantum Cryptography Trends: A Milestone in Information Security. HIS 2015: 25-39
[c7]Muhammad Nadeem, Edward B. Allen, Byron J. Williams:
A Method for Recommending Computer-Security Training for Software Developers: Leveraging the Power of Static Analysis Techniques and Vulnerability Repositories. ITNG 2015: 534-539- 2014
[c6]Muhammad Nadeem, Edward B. Allen, Byron J. Williams:
Computer Security Training Recommender for Developers. RecSys Posters 2014- 2012
[c5]Muhammad Nadeem, Byron J. Williams, Edward B. Allen:
High false positive detection of security vulnerabilities: a case study. ACM Southeast Regional Conference 2012: 359-360
[i2]M. Rizwan Jameel Qureshi, Muhammad Rafiq Asim, Muhammad Nadeem, Asif Mehmood:
A New Teaching Model For The Subject Of Software Project Management. CoRR abs/1202.2510 (2012)- 2010
[c4]Muhammad Nadeem, Stephan Wong, Georgi Kuzmanov, Ahsan Shabbir, Muhammad Faisal Nadeem, Fakhar Anjam:
Low-power, high-throughput deblocking filter for H.264/AVC. SoC 2010: 93-98
2000 – 2009
- 2009
[c3]Syed Shams-ul-Haq, Muhammad Nadeem:
Supervised DAG Based Data Mining Model for DNA Sequence Analysis and Pattern Discovery. DMIN 2009: 171-177- 2008
[c2]Muhammad Nadeem, Syed Shams-ul-Haq:
Guided Web Content Mining Approach for Automated Meta-Rule Extraction and Information Retrieval. DMIN 2008: 619-625- 2006
[c1]Muhammad Anwar Usman, Muhammad Nadeem, M. Zeeshan Ali Ansari, Sajjad Raza:
Multi-agent Based Semantic E-government Web Service Architecture Using Extended WSDL. IAT Workshops 2006: 599-604- 2004
[i1]Muhammad Nadeem, Syed Ata Hussain Jaffri:
Application of Business Intelligence In Banks (Pakistan). CoRR cs.DB/0406004 (2004)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-06 00:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







