default search action
Muhammad Khuram Shahzad
Person information
- affiliation: Sungkyunkwan University, Suwon, South Korea
Other persons with the same name
- Khurram Shahzad — disambiguation page
- Khurram Shahzad 0002 — University of the Punjab, Lahore, Pakistan (and 1 more)
- Khurram Shahzad 0003 — Australian National University, Canberra, ACT, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c9]Zeeshan Ali, Safdar Abbas Khan, Muhammad Khuram Shahzad, Hafiz Syed Muhammad Bilal:
A Large-Scale Font-Diverse Sindhi Ligature Recognition System. FIT 2023: 132-137 - 2022
- [j7]Muhammad Zeeshan, Qaiser Riaz, Muhammad Ahmad Bilal, Muhammad Khuram Shahzad, Hajira Jabeen, Syed Ali Haider, Azizur Rahim:
Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets. IEEE Access 10: 2269-2283 (2022) - [c8]Syeda Rabia Arshad, Ishwa Obaid, Rameesha Gull, Muhammad Khuram Shahzad:
Steel Defect Classification Using Machine Learning. IMCOM 2022: 1-6 - [c7]Muhammad Fasih Ashfaq, Maryam Malik, Urooj Fatima, Muhammad Khuram Shahzad:
Classification of IoT based DDoS Attack using Machine Learning Techniques. IMCOM 2022: 1-6 - 2021
- [c6]Muhammad Khuram Shahzad, Laiba Bukhari, Tayyeba Muhammad Khan, S. M. Riazul Islam, Md. Mahmud Hossain, Kyung-Sup Kwak:
BPTE: Bitcoin Price Prediction and Trend Examination using Twitter Sentiment Analysis. ICTC 2021: 119-122 - [c5]Ghulam Murtaza, Obaid Ur Rehman, Muhammad Khuram Shahzad, S. M. Riazul Islam, Mahmud Hossain, Kyung-Sup Kwak:
Hybrid ResNet: A Shallow Deep Learning Architecture for Moderate Datasets. ICTC 2021: 1679-1682 - [c4]Abdul Saboor Malik, Muhammad Khuram Shahzad, Mehdi Hussain:
A Forensic Framework for Webmail Threat Detection Using Log Analysis. SecITC 2021: 57-69 - 2020
- [j6]Lewis Nkenyereye, Bayu Adhi Tama, Muhammad Khuram Shahzad, Yoon-Ho Choi:
Secure and Blockchain-Based Emergency Driven Message Protocol for 5G Enabled Vehicular Edge Computing. Sensors 20(1): 154 (2020)
2010 – 2019
- 2019
- [j5]Muhammad Khuram Shahzad, S. M. Riazul Islam, Kyung-Sup Kwak, Lewis Nkenyereye:
AEF: Adaptive En-Route Filtering to Extend Network Lifetime in Wireless Sensor Networks. Sensors 19(18): 4036 (2019) - [c3]Muhammad Khuram Shahzad, Lewis Nkenyereye, S. M. Riazul Islam:
A Fuzzy System based Approach to Extend Network Lifetime for En-Route Filtering Schemes in WSNs. ICCAE 2019: 118-121 - 2018
- [j4]Muhammad Khuram Shahzad, Tae Ho Cho:
PKSM: Pre-key Distribution and Sink Mobility in Commutative Cipher Based En-route Filtering to Extend the Network Lifetime in WSNs. Ad Hoc Sens. Wirel. Networks 42(1-2): 19-33 (2018) - [j3]Muhammad Khuram Shahzad, Dang Tu Nguyen, Vyacheslav V. Zalyubovskiy, Hyunseung Choo:
LNDIR: A lightweight non-increasing delivery-latency interval-based routing for duty-cycled sensor networks. Int. J. Distributed Sens. Networks 14(4) (2018) - [i1]Muhammad Khuram Shahzad, Lewis Nkenyereye, S. M. Riazul Islam:
A Fuzzy System based Approach to Extend Network Lifetime for En-Route Filtering Schemes in WSNs. CoRR abs/1812.08652 (2018) - 2017
- [j2]Muhammad Khuram Shahzad, Tae Ho Cho:
A Network Density-adaptive Improved CCEF Scheme for Enhanced Network Lifetime, Energy Efficiency, and Filtering in WSNs. Ad Hoc Sens. Wirel. Networks 35(1-2): 129-149 (2017) - 2015
- [j1]Muhammad Khuram Shahzad, Tae Ho Cho:
Extending the network lifetime by pre-deterministic key distribution in CCEF in wireless sensor networks. Wirel. Networks 21(8): 2799-2809 (2015)
2000 – 2009
- 2008
- [c2]Khurram Shahzad, Arshad Ali, Nasir D. Gohar:
ETSP: An Energy-Efficient Time Synchronization Protocol for Wireless Sensor Networks. AINA Workshops 2008: 971-976 - [c1]Adnan Iqbal, Khurram Shahzad, Syed Ali Khayam:
SRVF: An Energy-Efficient Link Layer Protocol for Reliable Transmission over Wireless Sensor Networks. ICC 2008: 146-150
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-24 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint