default search action
Abid Khan
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j91]Rida Jabeen, Abid Khan, H. M. Kashif Rasheed, Mahmood Ul Hassan, Rashid Ahmed:
General construction of efficient circular partially strongly-balanced repeated measurements designs. Commun. Stat. Simul. Comput. 53(5): 2461-2471 (2024) - [j90]Syeda Mahnoor Gilani, Adeel Anjum, Abid Khan, Madiha Haider Syed, Syed Atif Moqurrab, Gautam Srivastava:
A robust Internet of Drones security surveillance communication network based on IOTA. Internet Things 25: 101066 (2024) - [j89]Hajira Batool, Adeel Anjum, Abid Khan, Stefano Izzo, Carlo Mazzocca, Gwanggil Jeon:
A secure and privacy preserved infrastructure for VANETs based on federated learning with local differential privacy. Inf. Sci. 652: 119717 (2024) - 2023
- [j88]Zainab Iftikhar, Adeel Anjum, Abid Khan, Munam Ali Shah, Gwanggil Jeon:
Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger. Clust. Comput. 26(6): 3361-3377 (2023) - [j87]Zainab Iftikhar, Adeel Anjum, Abid Khan, Munam Ali Shah, Gwanggil Jeon:
Correction: Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger. Clust. Comput. 26(6): 3379 (2023) - [j86]Waseeq Ul Islam Zafar, Muhammad Atif Ur Rehman, Farhana Jabeen, Rehmat Ullah, Ghulam Abbas, Abid Khan:
Decentralized Receiver-based Link Stability-aware Forwarding Scheme for NDN-based VANETs. Comput. Networks 236: 109996 (2023) - [j85]Abid Khan, Zahid Bashir, H. M. Kashif Rasheed, Mahmood Ul Hassan, Rashid Ahmed:
Construction of minimal circular nearly strongly balanced repeated measurements designs and their conversion. Commun. Stat. Simul. Comput. 52(12): 5749-5758 (2023) - [j84]Bello Musa Yakubu, Majid Iqbal Khan, Abid Khan, Farhana Jabeen, Gwanggil Jeon:
Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home. Digit. Commun. Networks 9(2): 383-392 (2023) - [j83]Tehsin Kanwal, Hasina Attaullah, Adeel Anjum, Abid Khan, Gwanggil Jeon:
Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches. Digit. Commun. Networks 9(5): 1131-1140 (2023) - [j82]Hira S. Sikandar, Saif Ur Rehman Malik, Adeel Anjum, Abid Khan, Gwanggil Jeon:
Cohort-based kernel principal component analysis with Multi-path Service Routing in Federated Learning. Future Gener. Comput. Syst. 149: 518-530 (2023) - [j81]Rabeeha Fazal, Razaullah Khan, Adeel Anjum, Madiha Haider Syed, Abid Khan, Semeen Rehman:
Improved angelization technique against background knowledge attack for 1:M microdata. PeerJ Comput. Sci. 9: e1255 (2023) - [j80]Erik J. Gustafson, Andy C. Y. Li, Abid Khan, Joonho Kim, Doga Murat Kurkcuoglu, M. Sohaib Alam, Peter P. Orth, Armin Rahmani, Thomas Iadecola:
Preparing quantum many-body scar states on quantum computers. Quantum 7: 1171 (2023) - [j79]Mansoor Ahmed, Amil Rohani Dar, Markus Helfert, Abid Khan, Jungsuk Kim:
Data Provenance in Healthcare: Approaches, Challenges, and Future Directions. Sensors 23(14): 6495 (2023) - [i11]Abid Khan, Chia-Hao Lee, Pinshane Y. Huang, Bryan K. Clark:
Using CycleGANs to Generate Realistic STEM Images for Machine Learning. CoRR abs/2301.07743 (2023) - 2022
- [j78]Abdul Waheed, Munam Ali Shah, Syed Muhammad Mohsin, Abid Khan, Carsten Maple, Sheraz Aslam, Shahab Shamshirband:
A Comprehensive Review of Computing Paradigms, Enabling Computation Offloading and Task Execution in Vehicular Networks. IEEE Access 10: 3580-3600 (2022) - [j77]Ahmad Ali, Abid Khan, Mansoor Ahmed, Gwanggil Jeon:
BCALS: Blockchain-based secure log management system for cloud computing. Trans. Emerg. Telecommun. Technol. 33(4) (2022) - [j76]Razaullah Khan, Xiaofeng Tao, Adeel Anjum, Saif Ur Rehman Malik, Shui Yu, Abid Khan, Waheed ur Rehman, Hassan Malik:
(τ, m)-slicedBucket privacy model for sequential anonymization for improving privacy and utility. Trans. Emerg. Telecommun. Technol. 33(6) (2022) - [j75]Tehsin Kanwal, Syed Atif Moqurrab, Adeel Anjum, Abid Khan, Joel J. P. C. Rodrigues, Gwanggil Jeon:
Formal verification and complexity analysis of confidentiality aware textual clinical documents framework. Int. J. Intell. Syst. 37(12): 10380-10399 (2022) - [j74]Khizar Hameed, Saurabh Garg, Muhammad Bilal Amin, Byeong Kang, Abid Khan:
A context-aware information-based clone node attack detection scheme in Internet of Things. J. Netw. Comput. Appl. 197: 103271 (2022) - [j73]Muhammad Arif, Muhammad Kabir, Saeed Ahmed, Abid Khan, Fang Ge, Adel Khelifi, Dong-Jun Yu:
DeepCPPred: A Deep Learning Framework for the Discrimination of Cell-Penetrating Peptides and Their Uptake Efficiencies. IEEE ACM Trans. Comput. Biol. Bioinform. 19(5): 2749-2759 (2022) - [j72]Abid Khan, Furqan Shahid, Carsten Maple, Awais Ahmad, Gwanggil Jeon:
Toward Smart Manufacturing Using Spiral Digital Twin Framework and Twinchain. IEEE Trans. Ind. Informatics 18(2): 1359-1366 (2022) - [j71]Syed Atif Moqurrab, Adeel Anjum, Abid Khan, Mansoor Ahmed, Awais Ahmad, Gwanggil Jeon:
Deep-Confidentiality: An IoT-Enabled Privacy-Preserving Framework for Unstructured Big Biomedical Data. ACM Trans. Internet Techn. 22(2): 42:1-42:21 (2022) - [i10]M. Rahman, Abid Khan, Sayeed Anowar, Md. Al Imran, Richa Verma, Dinesh Kumar, Kazuma Kobayashi, Syed B. Alam:
Leveraging Industry 4.0 - Deep Learning, Surrogate Model and Transfer Learning with Uncertainty Quantification Incorporated into Digital Twin for Nuclear System. CoRR abs/2210.00074 (2022) - 2021
- [j70]Hayat Mohammad Khan, Abid Khan, Farhana Jabeen, Adeel Anjum, Gwanggil Jeon:
Fog-enabled secure multiparty computation based aggregation scheme in smart grid. Comput. Electr. Eng. 94: 107358 (2021) - [j69]Nasir Ali Khan, Abid Khan, Mansoor Ahmad, Munam Ali Shah, Gwanggil Jeon:
URL filtering using big data analytics in 5G networks. Comput. Electr. Eng. 95: 107379 (2021) - [j68]Adeena Nasir, Munam Ali Shah, Ummarah Ashraf, Abid Khan, Gwanggil Jeon:
An intelligent framework to predict socioeconomic impacts of COVID-19 and public sentiments. Comput. Electr. Eng. 96(Part): 107526 (2021) - [j67]Sabah Suhail, Rasheed Hussain, Abid Khan, Choong Seon Hong:
Corrigendum to "Orchestrating product provenance story: When IOTA ecosystem meets electronics supply chain space" [Comput. Ind. 123 (December) (2020) 103334]. Comput. Ind. 128: 103392 (2021) - [j66]Tehsin Kanwal, Adeel Anjum, Abid Khan:
Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities. Clust. Comput. 24(1): 293-317 (2021) - [j65]Tehsin Kanwal, Adeel Anjum, Saif Ur Rehman Malik, Sajjad Haider, Abid Khan, Umar Manzoor, Alia Asheralieva:
A robust privacy preserving approach for electronic health records using multiple dataset with multiple sensitive attributes. Comput. Secur. 105: 102224 (2021) - [j64]Bello Musa Yakubu, Majid I. Khan, Nadeem Javaid, Abid Khan:
Blockchain-based secure multi-resource trading model for smart marketplace. Computing 103(3): 379-400 (2021) - [j63]Tehsin Kanwal, Adeel Anjum, Saif Ur Rehman Malik, Abid Khan, Muazzam Ali Khan Khattak:
Privacy preservation of electronic health records with adversarial attacks identification in hybrid cloud. Comput. Stand. Interfaces 78: 103522 (2021) - [j62]Ikram Ullah, Munam Ali Shah, Abid Khan, Gwanggil Jeon:
Privacy-preserving multilevel obfuscation scheme for vehicular network. Trans. Emerg. Telecommun. Technol. 32(2) (2021) - [j61]Tehsin Kanwal, Adeel Anjum, Abid Khan, Alia Asheralieva, Gwanggil Jeon:
A formal adversarial perspective: Secure and efficient electronic health records collection scheme for multi-records datasets. Trans. Emerg. Telecommun. Technol. 32(8) (2021) - [j60]Farhana Jabeen, Zia-ur-Rehman Khan, Zara Hamid, Zobia Rehman, Abid Khan:
Adaptive and survivable trust management for Internet of Things systems. IET Inf. Secur. 15(5): 375-394 (2021) - [j59]Sabah Suhail, Rasheed Hussain, Abid Khan, Choong Seon Hong:
On the Role of Hash-Based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions. IEEE Internet Things J. 8(1): 1-17 (2021) - [j58]Ahmad Ali, Mansoor Ahmed, Abid Khan, Adeel Anjum, Muhammad Ilyas, Markus Helfert:
VisTAS: blockchain-based visible and trusted remote authentication system. PeerJ Comput. Sci. 7: e516 (2021) - [j57]Mansoor Ahmed, Kainat Ansar, Cal B. Muckley, Abid Khan, Adeel Anjum, Muhammad Talha:
A semantic rule based digital fraud detection. PeerJ Comput. Sci. 7: e649 (2021) - [j56]Abdul Waheed, Munam Ali Shah, Abid Khan, Carsten Maple, Ikram Ullah:
Hybrid Task Coordination Using Multi-Hop Communication in Volunteer Computing-Based VANETs. Sensors 21(8): 2718 (2021) - [j55]Ikram Ullah, Munam Ali Shah, Abid Khan, Carsten Maple, Abdul Waheed:
Virtual Pseudonym-Changing and Dynamic Grouping Policy for Privacy Preservation in VANETs. Sensors 21(9): 3077 (2021) - [j54]Faheem Zafar, Abid Khan, Saif Ur Rehman Malik, Mansoor Ahmed, Carsten Maple, Adeel Anjum:
MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus. Sensors 21(15): 5096 (2021) - [j53]Abid Khan, Sadia Din, Gwanggil Jeon, Francesco Piccialli:
Lucy With Agents in the Sky: Trustworthiness of Cloud Storage for Industrial Internet of Things. IEEE Trans. Ind. Informatics 17(2): 953-960 (2021) - [c19]Ikram Ullah, Munam Ali Shah, Abid Khan:
Adaptive Grouping and Pseudonym Changing Policy for Protection of Vehicles Location Information in VANETs. SSCI 2021: 1-7 - [i9]Khizar Hameed, Saurabh Garg, Muhammad Bilal Amin, Byeong Kang, Abid Khan:
A Context-Aware Information-Based Clone Node Attack Detection Scheme in Internet of Things. CoRR abs/2106.15890 (2021) - 2020
- [j52]Ayesha Amjid, Abid Khan, Munam Ali Shah:
VANET-Based Volunteer Computing (VBVC): A Computational Paradigm for Future Autonomous Vehicles. IEEE Access 8: 71763-71774 (2020) - [j51]Abid Khan, Yuanguo Zhu:
New algorithms for parameter reduction of intuitionistic fuzzy soft sets. Comput. Appl. Math. 39(3) (2020) - [j50]Furqan Shahid, Abid Khan, Gwanggil Jeon:
Post-quantum distributed ledger for internet of things. Comput. Electr. Eng. 83: 106581 (2020) - [j49]Sabah Suhail, Rasheed Hussain, Abid Khan, Choong Seon Hong:
Orchestrating product provenance story: When IOTA ecosystem meets electronics supply chain space. Comput. Ind. 123: 103334 (2020) - [j48]Sabah Suhail, Rasheed Hussain, Mohammad M. Abdellatif, Shashi Raj Pandey, Abid Khan, Choong Seon Hong:
Provenance-enabled packet path tracing in the RPL-based internet of things. Comput. Networks 173: 107189 (2020) - [j47]Furqan Shahid, Abid Khan:
Smart Digital Signatures (SDS): A post-quantum digital signature scheme for distributed ledgers. Future Gener. Comput. Syst. 111: 241-253 (2020) - [j46]Idrees Ahmed, Abid Khan, Adeel Anjum, Mansoor Ahmed, Muhammad Asif Habib:
A Secure Provenance Scheme for Detecting Consecutive Colluding Users in Distributed Networks. Int. J. Parallel Program. 48(2): 344-366 (2020) - [j45]Ahsan Saleem, Abid Khan, Saif Ur Rehman Malik, Haris Pervaiz, Hassan Malik, Masoom Alam, Anish Jindal:
FESDA: Fog-Enabled Secure Data Aggregation in Smart Grid IoT Network. IEEE Internet Things J. 7(7): 6132-6142 (2020) - [j44]Furqan Shahid, Abid Khan, Saif Ur Rehman Malik, Kim-Kwang Raymond Choo:
WOTS-S: A Quantum Secure Compact Signature Scheme for Distributed Ledger. Inf. Sci. 539: 229-249 (2020) - [j43]Saira Beg, Naveed Ahmad, Adeel Anjum, Mansoor Ahmad, Abid Khan, Faisal Baig, Ahmed Khan:
S-box design based on optimize LFT parameter selection: a practical approach in recommendation system domain. Multim. Tools Appl. 79(17-18): 11667-11684 (2020) - [j42]Farah Naz, Abid Khan, Mansoor Ahmed, Majid Iqbal Khan, Sadia Din, Awais Ahmad, Gwanggil Jeon:
Watermarking as a service (WaaS) with anonymity. Multim. Tools Appl. 79(23-24): 16051-16075 (2020) - [j41]Sidra Aslam, Mansoor Ahmed, Imran Ahmed, Abid Khan, Awais Ahmad, Muhammad Imran, Adeel Anjum, Shahid Hussain:
OBAC: towards agent-based identification and classification of roles, objects, permissions (ROP) in distributed environment. Multim. Tools Appl. 79(45-46): 34363-34384 (2020) - [j40]Abdul Waheed, Munam Ali Shah, Abid Khan, Saif ul Islam, Suleman Khan, Carsten Maple, Muhammad Khurram Khan:
Volunteer Computing in Connected Vehicles: Opportunities and Challenges. IEEE Netw. 34(5): 212-218 (2020) - [j39]Sehrish Shafeeq, Sherali Zeadally, Masoom Alam, Abid Khan:
Curbing Address Reuse in the IOTA Distributed Ledger: A Cuckoo-Filter-Based Approach. IEEE Trans. Engineering Management 67(4): 1244-1255 (2020) - [j38]Razaullah Khan, Xiaofeng Tao, Adeel Anjum, Sajjad Haider, Saif Ur Rehman Malik, Abid Khan, Fatemeh Amiri:
Privacy Preserving for Multiple Sensitive Attributes against Fingerprint Correlation Attack Satisfying c-Diversity. Wirel. Commun. Mob. Comput. 2020: 8416823:1-8416823:18 (2020) - [i8]Sabah Suhail, Rasheed Hussain, Abid Khan, Choong Seon Hong:
On the Role of Hash-based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions. CoRR abs/2004.10435 (2020) - [i7]Faheem Zafar, Abid Khan, Saif Ur Rehman Malik, Adeel Anjum, Mansoor Ahmed:
MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus. CoRR abs/2011.08538 (2020)
2010 – 2019
- 2019
- [j37]Saba Ameer, Munam Ali Shah, Abid Khan, Houbing Song, Carsten Maple, Saif ul Islam, Muhammad Nabeel Asghar:
Comparative Analysis of Machine Learning Techniques for Predicting Air Quality in Smart Cities. IEEE Access 7: 128325-128338 (2019) - [j36]Abid Khan, Yuanguo Zhu:
A Novel Approach to Parameter Reduction of Fuzzy Soft Set. IEEE Access 7: 128956-128967 (2019) - [j35]Umair Sarfraz, Masoom Alam, Sherali Zeadally, Abid Khan:
Privacy aware IOTA ledger: Decentralized mixing and unlinkable IOTA transactions. Comput. Networks 148: 361-372 (2019) - [j34]Idrees Ahmed, Abid Khan, Mansoor Ahmed, Saif Ur Rehman Malik:
Order preserving secure provenance scheme for distributed networks. Comput. Secur. 82: 99-117 (2019) - [j33]Sajjad Haider, Tehsin Kanwal, Adeel Anjum, Saif Ur Rehman Malik, Ahmed Khan, Abid Khan, Umar Manzoor:
An efficient privacy preserving protocol for dynamic continuous data collection. Comput. Secur. 86: 358-371 (2019) - [j32]Abid Khan, Rashid Ahmed, Farrukh Shehzad, Muhammad Hussain Tahir, Syed Shakir Ali Ghazali:
Construction of circular partially balanced-Repeated measurement designs using cyclic shifts. Commun. Stat. Simul. Comput. 48(2): 506-515 (2019) - [j31]Sehrish Shafeeq, Masoom Alam, Abid Khan:
Privacy aware decentralized access control system. Future Gener. Comput. Syst. 101: 420-433 (2019) - [j30]Tehsin Kanwal, Ather Abdul Jabbar, Adeel Anjum, Saif Ur Rehman Malik, Abid Khan, Naveed Ahmad, Umar Manzoor, Muhammad Naeem Shehzad, Muhammad A. Balubaid:
Privacy-aware relationship semantics-based XACML access control model for electronic health records in hybrid cloud. Int. J. Distributed Sens. Networks 15(6) (2019) - [j29]Tehsin Kanwal, Sayed Ali Asjad Shaukat, Adeel Anjum, Saif Ur Rehman Malik, Kim-Kwang Raymond Choo, Abid Khan, Naveed Ahmad, Mansoor Ahmad, Samee U. Khan:
Privacy-preserving model and generalization correlation attacks for 1: M data with multiple sensitive attributes. Inf. Sci. 488: 238-256 (2019) - [j28]Abid Khan, Yuanguo Zhu:
An improved algorithm for normal parameter reduction of soft set. J. Intell. Fuzzy Syst. 37(2): 2953-2968 (2019) - [i6]Sabah Suhail, Choong Seon Hong, Abid Khan:
Orchestrating Product Provenance Story: When IOTA ECOSYSTEM Meets The Electronics Supply Chain Space. CoRR abs/1902.04314 (2019) - 2018
- [j27]Saba Yaseen, Syed M. Ali Abbas, Adeel Anjum, Tanzila Saba, Abid Khan, Saif Ur Rehman Malik, Naveed Ahmad, Basit Shahzad, Ali Kashif Bashir:
Improved Generalization for Secure Data Publishing. IEEE Access 6: 27156-27165 (2018) - [j26]Usman Shafique, Abid Khan, Abdur Rehman, Faisal Bashir, Masoom Alam:
Detection of rank attack in routing protocol for Low Power and Lossy Networks. Ann. des Télécommunications 73(7-8): 429-438 (2018) - [j25]Altaf Hussain, Muhammad Aleem, Abid Khan, Muhammad Azhar Iqbal, Muhammad Arshad Islam:
RALBA: a computation-aware load balancing scheduler for cloud computing. Clust. Comput. 21(3): 1667-1680 (2018) - [j24]Adeel Anjum, Saif Ur Rehman Malik, Kim-Kwang Raymond Choo, Abid Khan, Asma Haroon, Sangeen Khan, Samee U. Khan, Naveed Ahmad, Basit Raza:
An efficient privacy mechanism for electronic health records. Comput. Secur. 72: 196-211 (2018) - [j23]Fuzel Jamil, Abid Khan, Adeel Anjum, Mansoor Ahmed, Farhana Jabeen, Nadeem Javaid:
Secure provenance using an authenticated data structure approach. Comput. Secur. 73: 34-56 (2018) - [j22]Khizar Hameed, Abid Khan, Mansoor Ahmed, Goutham Reddy Alavalapati, M. Mazhar Rathore:
Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks. Future Gener. Comput. Syst. 82: 274-289 (2018) - [j21]Masoom Alam, Naina Emmanuel, Tanveer Khan, Abid Khan, Nadeem Javaid, Kim-Kwang Raymond Choo, Rajkumar Buyya:
Secure policy execution using reusable garbled circuit in the cloud. Future Gener. Comput. Syst. 87: 488-501 (2018) - [j20]Naina Emmanuel, Abid Khan, Masoom Alam, Tanveer Khan, Muhammad Khurram Khan:
Structures and data preserving homomorphic signatures. J. Netw. Comput. Appl. 102: 58-70 (2018) - [j19]Ahsan Saleem, Abid Khan, Furqan Shahid, Masoom Alam, Muhammad Khurram Khan:
Recent advancements in garbled computing: How far have we come towards achieving secure, efficient and reusable garbled circuits. J. Netw. Comput. Appl. 108: 1-19 (2018) - [j18]Umber Sheikh, Abid Khan, Bilal Ahmed, Abdul Waheed, Abdul Hameed:
Provenance Inference Techniques: Taxonomy, comparative analysis and design challenges. J. Netw. Comput. Appl. 110: 11-26 (2018) - [j17]Mubashar Hussain, Mansoor Ahmed, Hasan Ali Khattak, Muhammad Imran, Abid Khan, Sadia Din, Awais Ahmad, Gwanggil Jeon, Goutham Reddy Alavalapati:
Towards ontology-based multilingual URL filtering: a big data problem. J. Supercomput. 74(10): 5003-5021 (2018) - [c18]Sabah Suhail, Choong Seon Hong, M. Ali Lodhi, Faheem Zafar, Abid Khan, Faisal Bashir Hussain:
Data trustworthiness in IoT. ICOIN 2018: 414-419 - [c17]Mansoor Ahmed, Abid Khan, Osama Saleem, Muhammad Haris:
A Fault Tolerant Approach for Malicious URL Filtering. ISNCC 2018: 1-6 - [i5]Sabah Suhail, Mohammad M. Abdellatif, Shashi Raj Pandey, Abid Khan, Choong Seon Hong:
Provenance-enabled Packet Path Tracing in the RPL-based Internet of Things. CoRR abs/1811.06143 (2018) - 2017
- [j16]Farhana Jabeen, Zara Hamid, Wadood Abdul, Sanaa Ghouzali, Saif Ur Rehman Malik, Abid Khan, Sarfraz Nawaz, Hina Ghafoor:
Enhanced Architecture for Privacy Preserving Data Integration in a Medical Research Environment. IEEE Access 5: 13308-13326 (2017) - [j15]Adeel Aslam, Naveed Ahmad, Tanzila Saba, Abdulaziz S. Almazyad, Amjad Rehman, Adeel Anjum, Abid Khan:
Decision Support System for Risk Assessment and Management Strategies in Distributed Software Development. IEEE Access 5: 20349-20373 (2017) - [j14]Mouzna Tahir, Abid Khan, Abdul Hameed, Masoom Alam, Muhammad Khurram Khan, Farhana Jabeen:
Towards a set aggregation-based data integrity scheme for smart grids. Ann. des Télécommunications 72(9-10): 551-561 (2017) - [j13]Anam Nazir, Masoom Alam, Saif Ur Rehman Malik, Adnan Akhunzada, Muhammad Nadeem Cheema, Muhammad Khurram Khan, Yang Ziang, Tanveer Khan, Abid Khan:
A high-level domain-specific language for SIEM (design, development and formal verification). Clust. Comput. 20(3): 2423-2437 (2017) - [j12]Faheem Zafar, Abid Khan, Saif Ur Rehman Malik, Mansoor Ahmed, Adeel Anjum, Majid Iqbal Khan, Nadeem Javed, Masoom Alam, Fuzel Jamil:
A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends. Comput. Secur. 65: 29-49 (2017) - [j11]Adeel Anjum, Guillaume Raschia, Marc Gelgon, Abid Khan, Saif Ur Rehman Malik, Naveed Ahmad, Mansoor Ahmed, Sabah Suhail, Masoom Alam:
τ-safety: A privacy model for sequential publication with arbitrary updates. Comput. Secur. 66: 20-39 (2017) - [j10]Nadeem Javaid, Sheraz Hussain, Ashfaq Ahmad, Muhammad Imran, Abid Khan, Mohsen Guizani:
Region based cooperative routing in underwater wireless sensor networks. J. Netw. Comput. Appl. 92: 31-41 (2017) - [j9]Faheem Zafar, Abid Khan, Sabah Suhail, Idrees Ahmed, Khizar Hameed, Hayat Mohammad Khan, Farhana Jabeen, Adeel Anjum:
Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes. J. Netw. Comput. Appl. 94: 50-68 (2017) - [j8]Sidra Aslam, Saif ul Islam, Abid Khan, Mansoor Ahmed, Adnan Akhunzada, Muhammad Khurram Khan:
Information collection centric techniques for cloud resource management: Taxonomy, analysis and challenges. J. Netw. Comput. Appl. 100: 80-94 (2017) - [j7]Mariam Akbar, Nadeem Javaid, Wadood Abdul, Sanaa Ghouzali, Abid Khan, Iftikhar Azim Niaz, Manzoor Ilahi:
Balanced Transmissions Based Trajectories of Mobile Sink in Homogeneous Wireless Sensor Networks. J. Sensors 2017: 4281597:1-4281597:16 (2017) - [j6]Masoom Alam, Saif Ur Rehman Malik, Qaisar Javed, Abid Khan, Shamaila Bisma Khan, Adeel Anjum, Nadeem Javed, Adnan Akhunzada, Muhammad Khurram Khan:
Formal modeling and verification of security controls for multimedia systems in the cloud. Multim. Tools Appl. 76(21): 22845-22870 (2017) - [j5]Muhammad Omer Chughtai, Nasreen Badruddin, Maaz Rehan, Abid Khan:
Congestion Detection and Alleviation in Multihop Wireless Sensor Networks. Wirel. Commun. Mob. Comput. 2017 (2017) - [c16]Abid Khan, Ayyaz Yaqoob, Kinza Sarwar, Mouzna Tahir, Mansoor Ahmed:
Secure Logging as a Service Using Reversible Watermarking. FNC/MobiSPC 2017: 336-343 - [c15]Ahmad Ali, Mansoor Ahmed, Abid Khan, Muhammad Ilyas, Muhammad Saad Razzaq:
A trust management system model for cloud. ISNCC 2017: 1-6 - 2016
- [j4]Faheem Zafar, Abid Khan, Mansoor Ahmed, Majid Iqbal Khan, Farhana Jabeen, Zara Hamid, Naveed Ahmed, Faisal Bashir Hussain:
A Scalable Data Integrity Mechanism Based on Provable Data Possession and JARs. KSII Trans. Internet Inf. Syst. 10(6): 2851-2873 (2016) - [j3]Abid Khan, Farhana Jabeen, Farah Naz, Sabah Suhail, Mansoor Ahmed, Sarfraz Nawaz:
Buyer seller watermarking protocols issues and challenges - A survey. J. Netw. Comput. Appl. 75: 317-334 (2016) - [j2]Meer M. Khan, M. Ali Lodhi, Abdul Rehman, Abid Khan, Faisal Bashir Hussain:
Sink-to-Sink Coordination Framework Using RPL: Routing Protocol for Low Power and Lossy Networks. J. Sensors 2016: 2635429:1-2635429:11 (2016) - [c14]Abdul Waheed, Munam Ali Shah, Abid Khan:
Secure login protocols: An analysis on modern attacks and solutions. ICAC 2016: 535-541 - [c13]Khizar Hameed, Muhammad Saleem Khan, Idrees Ahmed, Zuhaib U. Ahmad, Abid Khan, Aun Haider, Nadeem Javaid:
A Zero Watermarking Scheme for Data Integrity in Wireless Sensor Networks. NBiS 2016: 119-126 - [c12]Sabah Suhail, Choong Seong Hong, Zuhaib Uddin Ahmad, Faheem Zafar, Abid Khan:
Introducing Secure Provenance in IoT: Requirements and Challenges. SIoT 2016: 39-46 - [c11]Muhammad Saleem Khan, Idrees Ahmed, Abid Khan, Majid Iqbal Khan:
Adaptive Reputation Weights Assignment Scheme for MANETs. Trustcom/BigDataSE/ISPA 2016: 160-167 - [c10]Idrees Ahmed, Abid Khan, Muhammad Saleem Khan, Mansoor Ahmed:
Aggregated Signatures for Chaining: A Secure Provenance Scheme. Trustcom/BigDataSE/ISPA 2016: 2012-2017 - 2013
- [c9]Arsalan Haider, Nadeem Javaid, N. Amjad, A. A. Awan, Abid Khan, Nasir Khan:
REECH-ME: Regional Energy Efficient Cluster Heads Based on Maximum Energy Routing Protocol for WSNs. BWCCA 2013: 88-92 - [i4]Arsalan Haider, Nadeem Javaid, N. Amjad, A. A. Awan, Abid Khan, Nasir Khan:
REECH-ME: Regional Energy Efficient Cluster Heads based on Maximum Energy Routing Protocol for WSNs. CoRR abs/1307.7052 (2013) - [i3]Muhammad Aslam, Muhammad Babar Rasheed, Tauseef Shah, Azizur Rahim, Zahoor Ali Khan, U. Qasim, M. W. Qasim, Ahmad Hassan, Abid Khan, Nadeem Javaid:
Energy optimization and Performance Analysis of Cluster Based Routing Protocols Extended from LEACH for WSNs. CoRR abs/1309.4373 (2013) - [i2]Danish Mahmood, Nadeem Javaid, Zahoor Ali Khan, U. Qasim, Abid Khan, S. Qurashi, A. M. Memon:
Modeling and Evaluating Performance of Routing Operations in Reactive Routing Protocols. CoRR abs/1309.4386 (2013) - [i1]Danish Mahmood, Nadeem Javaid, U. Qasim, Zahoor Ali Khan, Abid Khan, S. Qurashi, A. M. Memon:
Modeling and Evaluating Performance of Routing Operations in Proactive Routing Protocols. CoRR abs/1309.4389 (2013) - 2010
- [c8]Mansoor Ahmed, Amin Anjomshoaa, Muhammad Asfand-e-yar, A Min Tjoa, Abid Khan:
Towards an Ontology-Based Solution for Managing License Agreement Using Semantic Desktop. ARES 2010: 309-314
2000 – 2009
- 2009
- [c7]Ali Nawaz Khan, Xuejun Sha, Muhammad Waqas Anwar, Abid Khan:
Performance analysis of prioritized and non prioritized handoff call queuing schemes in mobile cellular networks. FIT 2009: 11:1-11:6 - [c6]Abid Khan, Xiamu Niu, Waqas Anwar, Mansoor Ahmed, Ali Nawaz Khan:
Mobile agent watermarking (MAW): security properties and attacks revisited. FIT 2009: 32:1-32:6 - [c5]Usman Sharif, Abid Khan, Mansoor Ahmed, Muhammad Waqas Anwar, Ali Nawaz Khan:
CLUSMA: a mobile agent based clustering middleware for wireless sensor networks. FIT 2009: 63:1-63:4 - [c4]Abid Khan, Qasim Arshad, Xiamu Niu, Yong Zhang, Muhammad Waqas Anwar:
On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS). ISA 2009: 223-228 - 2008
- [c3]Abid Khan, Xiamu Niu, Waqas Anwar, Yong Zhang:
On the security properties and attacks against Mobile agent watermark encapsulation(MAWE). SMC 2008: 707-712 - 2007
- [c2]Abid Khan, Xiamu Niu, Yong Zhang:
Protecting Mobile Agent's Computation Results with Reversible Watermarking and Digital Signature. IIH-MSP 2007: 566-569 - 2006
- [c1]Yong Zhang, Xiamu Niu, Abid Khan, Qiong Li, Qi Han:
A Novel Method of Watermarking Relational Databases using Character String. Artificial Intelligence and Applications 2006: 120-124
1990 – 1999
- 1997
- [j1]Abid Khan, Nasir Al-Darwish, Mohsen Guizani, M. Benten, H. Youssef:
Design and implementation of a software bridge with packet filtering and statistics collection functions. Int. J. Netw. Manag. 7(5): 251-263 (1997)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint