default search action
Fawad Khan
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Aftab Akram, Fawad Khan, Shahzaib Tahir, Asif Iqbal, Syed Aziz Shah, Abdullah Baz:
Privacy Preserving Inference for Deep Neural Networks: Optimizing Homomorphic Encryption for Efficient and Secure Classification. IEEE Access 12: 15684-15695 (2024) - [j21]Waqas Ajmal Khan, Fawad Khan, Shahzaib Tahir, Yinghui Zhang, Faisal Amjad, Jawad Ahmad:
HLSBD2: a quantum secure hybrid level source based data deduplication for the cloud. J. Ambient Intell. Humaniz. Comput. 15(1): 89-102 (2024) - [j20]Maemoona Kayani, Muhammad Mohsin Riaz, Abdul Ghafoor, Fawad Khan:
Privacy preserving content based image retrieval. Multim. Tools Appl. 83(15): 44955-44978 (2024) - 2023
- [j19]Fawad Khan, Khurram Kamal, Tahir Abdul Hussain Ratlamwala, Mohammed Alkahtani, Mohammed Almatani, Senthan Mathavan:
Tool Health Classification in Metallic Milling Process Using Acoustic Emission and Long Short-Term Memory Networks: A Deep Learning Approach. IEEE Access 11: 126611-126633 (2023) - [j18]Haroon Malik, Shahzaib Tahir, Hasan Tahir, Musfirah Ihtasham, Fawad Khan:
A homomorphic approach for security and privacy preservation of Smart Airports. Future Gener. Comput. Syst. 141: 500-513 (2023) - [j17]Fawad Khan, Wajid Ullah, Tahir Hussain, Wojciech Sumelka:
Symmetries of the Energy-Momentum Tensor for Static Plane Symmetric Spacetimes. Symmetry 15(8): 1614 (2023) - [j16]Aiman Sultan, Shahzaib Tahir, Hasan Tahir, Tayyaba Anwer, Fawad Khan, Muttukrishnan Rajarajan, Omer F. Rana:
A Novel Image-Based Homomorphic Approach for Preserving the Privacy of Autonomous Vehicles Connected to the Cloud. IEEE Trans. Intell. Transp. Syst. 24(2): 1936-1948 (2023) - 2022
- [j15]Zeeshan Zulkifl, Fawad Khan, Shahzaib Tahir, Mehreen Afzal, Waseem Iqbal, Abdul Rehman, Saqib Saeed, Abdullah Mohammed Almuhaideb:
FBASHI: Fuzzy and Blockchain-Based Adaptive Security for Healthcare IoTs. IEEE Access 10: 15644-15656 (2022) - [j14]Muhammad Awais, Shahzaib Tahir, Fawad Khan, Hasan Tahir, Ruhma Tahir, Rabia Latif, Mir Yasir Umair:
A novel searchable encryption scheme to reduce the access pattern leakage. Future Gener. Comput. Syst. 133: 338-350 (2022) - [j13]Faiqa Amjad, Fawad Khan, Shahzaib Tahir, Tahreem Yaqoob, Haider Abbas:
ENCVIDC: an innovative approach for encoded video content classification. Neural Comput. Appl. 34(21): 18685-18702 (2022) - [j12]Fawad Khan, Zhiguang Xu, Junling Sun, Fazal Maula Khan, Adnan Ahmed, Yan Zhao:
Recent Advances in Sensors for Fire Detection. Sensors 22(9): 3310 (2022) - [j11]Yasir Iqbal, Shahzaib Tahir, Hasan Tahir, Fawad Khan, Saqib Saeed, Abdullah Mohammed Almuhaideb, Adeel M. Syed:
A Novel Homomorphic Approach for Preserving Privacy of Patient Data in Telemedicine. Sensors 22(12): 4432 (2022) - 2021
- [j10]Mustafa Jaihuni, Fawad Khan, Deoghyun Lee, Jayanta Kumar Basak, Anil Bhujel, Byeong Eun Moon, Jaesung Park, Hyeon Tae Kim:
Determining Spatiotemporal Distribution of Macronutrients in a Cornfield Using Remote Sensing and a Deep Learning Model. IEEE Access 9: 30256-30266 (2021) - [j9]Ahsan Rasheed Abbasi, Mehreen Afzal, Waseem Iqbal, Shynar Mussiraliyeva, Fawad Khan, Awais Ur Rehman:
Encryption and Re-Randomization Techniques for Malware Propagation. IEEE Access 9: 132522-132532 (2021) - [j8]Fawad Khan, Hui Li, Yinghui Zhang, Haider Abbas, Tahreem Yaqoob:
Efficient attribute-based encryption with repeated attributes optimization. Int. J. Inf. Sec. 20(3): 431-444 (2021) - [j7]Shahzaib Tahir, Hasan Tahir, Ali Sajjad, Muttukrishnan Rajarajan, Fawad Khan:
Privacy-preserving COVID-19 contact tracing using blockchain. J. Commun. Networks 23(5): 360-373 (2021) - [j6]Ahmed Raheeq Sultan, Imran Rashid, Fawad Khan, Shahzaib Tahir, Maruf Pasha, Aiman Sultan:
A new secure authentication based distance bounding protocol. PeerJ Comput. Sci. 7: e517 (2021) - [j5]Fawad Khan, Saad Khan, Shahzaib Tahir, Jawad Ahmad, Hasan Tahir, Syed Aziz Shah:
Granular Data Access Control with a Patient-Centric Policy Update for Healthcare. Sensors 21(10): 3556 (2021) - 2020
- [j4]Abdullah Qayyum, Jawad Ahmad, Wadii Boulila, Saeed Rubaiee, Arshad Ali, Fawad Masood, Fawad Khan, William J. Buchanan:
Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution. IEEE Access 8: 140876-140895 (2020) - [c7]Muhammad Jehanzaib Yousuf, Mingjun Wang, Zheng Yan, Fawad Khan:
Trusted Network Slicing among Multiple Mobile Network Operators. TrustCom 2020: 1135-1140
2010 – 2019
- 2019
- [j3]Fawad Khan, Essi Vuopala:
Digital Competence Assessment Across Generations: A Finnish Sample Using the Digcomp Framework. Int. J. Digit. Lit. Digit. Competence 10(2): 15-28 (2019) - [c6]Haider Abbas, Farrukh Aslam Khan, Kashif Kifayat, Asif Masood, Imran Rashid, Fawad Khan:
Security Safety and Trust Management (SSTM' 19). WETICE 2019: 196-197 - 2017
- [c5]Fawad Khan, Hui Li, Liangxuan Zhang, Jian Shen:
An Expressive Hidden Access Policy CP-ABE. DSC 2017: 178-186 - [c4]Liangxuan Zhang, Hui Li, Yinghui Zhang, Fawad Khan:
Privacy-Preserving Attribute-Based Encryption Supporting Expressive Access Structures. DSC 2017: 475-482 - [c3]Liangxuan Zhang, Hui Li, Yinghui Zhang, Fawad Khan:
Efficient privacy-preserving decentralized ABE supporting expressive access structures. INFOCOM Workshops 2017: 547-552 - 2016
- [j2]Fawad Khan, Hui Lin, Liangxuan Zhang:
Owner Specified Excessive Access Control for Attribute Based Encryption. IEEE Access 4: 8967-8976 (2016) - 2014
- [j1]Imran Aziz, Siraj-ul-Islam, Fawad Khan:
A new method based on Haar wavelet for the numerical solution of two-dimensional nonlinear integral equations. J. Comput. Appl. Math. 272: 70-80 (2014) - [c2]Fawad Khan, Sarmad Ullah Khan, Inam Bari:
Content Security Scheme for Content Centric Networks. SecureComm (1) 2014: 546-550 - [c1]Fawad Khan, Sarmad Ullah Khan, Muhammad Roman, Muhammad Usman Abbasi:
Location Identity Based Content Security Scheme for Content Centric Networking. SIN 2014: 95
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint