Muazzam Ali Khan
Orcid: 0000-0001-6140-1201Affiliations:
- Quaid-i-Azam University, Department of Computer Science, Islamabad, Pakistan
- National University of Sciences and Technology, Islamabad, Pakistan
According to our database1,
Muazzam Ali Khan
authored at least 87 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Ind. Informatics, January, 2024
2023
TNN-IDS: Transformer neural network-based intrusion detection system for MQTT-enabled IoT Networks.
Comput. Networks, December, 2023
Stacked Bin Convolutional Neural Networks based Sparse Low-Rank Regressor: Robust, Scalable and Novel Model for Memorability Prediction of Videos.
Multim. Tools Appl., November, 2023
J. Supercomput., April, 2023
Comput. Syst. Sci. Eng., 2023
A Comparison of Re-Sampling Techniques for Detection of Multi-Step Attacks on Deep Learning Models.
IEEE Access, 2023
Proceedings of the International Wireless Communications and Mobile Computing, 2023
2022
HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles.
Sensors, 2022
A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering.
Sensors, 2022
A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map.
Multim. Tools Appl., 2022
J. Imaging, 2022
Supervised and weakly supervised deep learning models for COVID-19 CT diagnosis: A systematic review.
Comput. Methods Programs Biomed., 2022
DenseRes-Unet: Segmentation of overlapped/clustered nuclei from multi organ histopathology images.
Comput. Biol. Medicine, 2022
IEEE Access, 2022
A Sequence Mining-Based Novel Architecture for Detecting Fraudulent Transactions in Healthcare Systems.
IEEE Access, 2022
IoTAuth: IoT Sensor Data Analytics for User Authentication Using Discriminative Feature Analysis.
IEEE Access, 2022
A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution.
IEEE Access, 2022
Proceedings of the 20th IEEE/ACIS International Conference on Software Engineering Research, 2022
Proceedings of the IEEE-EMBS International Conference on Biomedical and Health Informatics, 2022
2021
xFogSim: A Distributed Fog Resource Management Framework for Sustainable IoT Services.
IEEE Trans. Sustain. Comput., 2021
A Hybrid Approach for Seamless and Interoperable Communication in the Internet of Things.
IEEE Netw., 2021
Mob. Networks Appl., 2021
Hierarchical Routing Protocols for Wireless Sensor Networks: Functional and Performance Analysis.
J. Sensors, 2021
Efficient network selection using multi fuzzy criteria for confidential data transmission in wireless body sensor networks.
J. Intell. Fuzzy Syst., 2021
J. Inf. Secur. Appl., 2021
Int. J. Imaging Syst. Technol., 2021
Int. J. Distributed Sens. Networks, 2021
Privacy preservation of electronic health records with adversarial attacks identification in hybrid cloud.
Comput. Stand. Interfaces, 2021
CoRR, 2021
Early MCI-to-AD Conversion Prediction Using Future Value Forecasting of Multimodal Features.
Comput. Intell. Neurosci., 2021
A Stochastic Distribution Based Methodology to Estimate Control Phase Time for Software-Defined Radios in Tactical MANETs.
IEEE Access, 2021
IEEE Access, 2021
Decision Support System to Optimize Cloud Service Prioritization for Model Deployment.
Proceedings of the 4th International Conference on Information and Computer Technologies, 2021
Proceedings of the 4th International Conference on Information and Computer Technologies, 2021
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2021
Multi-Feature Extraction with Ensemble Network for Tracing Chronic Retinal Disorders.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2021
2020
Softw. Pract. Exp., 2020
Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions.
Sci. Program., 2020
Corrigendum to "Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions".
Sci. Program., 2020
Security, usability, and biometric authentication scheme for electronic voting using multiple keys.
Int. J. Distributed Sens. Networks, 2020
CoRR, 2020
Robust Method for Semantic Segmentation of Whole-Slide Blood Cell Microscopic Images.
Comput. Math. Methods Medicine, 2020
A Lightweight Identity-Based Signature Scheme for Mitigation of Content Poisoning Attack in Named Data Networking With Internet of Things.
IEEE Access, 2020
A Novel Blockchain-Based Framework for Vehicle Life Cycle Tracking: An End-to-End Solution.
IEEE Access, 2020
IEEE Access, 2020
IEEE Access, 2020
2019
Exploiting cooperative sensing for accurate target tracking in industrial Internet of things.
Int. J. Distributed Sens. Networks, 2019
vFog: A Vehicle-Assisted Computing Framework for Delay-Sensitive Applications in Smart Cities.
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the UK/China Emerging Technologies, 2019
A Novel NLP Application to Automatically Generate Text Extraction Concepts from Textual Descriptions.
Proceedings of the 2019 5th International Conference on Computing and Artificial Intelligence, 2019
Proceedings of the Recent Trends and Advances in Wireless and IoT-enabled Networks, 2019
2018
A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation.
Neural Comput. Appl., 2018
IEEE Access, 2018
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018
Proceedings of the Third International Conference on Fog and Mobile Edge Computing, 2018
2017
A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices.
Neural Comput. Appl., 2017
A novel image encryption based on Lorenz equation, Gingerbreadman chaotic map and S<sub>8</sub> permutation.
J. Intell. Fuzzy Syst., 2017
Security Vulnerabilities and Improvements of SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks.
Inf. Technol. Control., 2017
An Improved Image Encryption Scheme Based on a Non-Linear Chaotic Algorithm and Substitution Boxes.
Informatica, 2017
The Applications of Natural Language Processing (NLP) for Software Requirement Engineering - A Systematic Literature Review.
Proceedings of the Information Science and Applications 2017, 2017
Proceedings of the 6th International Conference on Bioinformatics and Biomedical Science, 2017
Proceedings of the Second International Conference on Fog and Mobile Edge Computing, 2017
AAGV: A Cluster Based Multicast Routing Protocol for Autonomous Aerial and Ground Vehicles Communication in VANET.
Proceedings of the 2017 International Conference on Frontiers of Information Technology, 2017
Proceedings of the 2017 International Conference on Frontiers of Information Technology, 2017
A new technique for designing 8 × 8 substitution box for image encryption applications.
Proceedings of the 2017 9th Computer Science and Electronic Engineering Conference, 2017
2016
A Novel Real Time Framework for Cluster Based Multicast Communication in Vehicular Ad Hoc Networks.
Int. J. Distributed Sens. Networks, 2016
Comput. Electr. Eng., 2016
Improving the Robustness of Neural Networks Using K-Support Norm Based Adversarial Training.
IEEE Access, 2016
Proceedings of the 45th International Conference on Parallel Processing Workshops, 2016
Intelligent Actor Mobility with Event Tracking in Wireless Sensor and Actor Networks.
Proceedings of the 45th International Conference on Parallel Processing Workshops, 2016
Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop, 2016
A Framework for Clustering Cardiac Patient's Records Using Unsupervised Learning Techniques.
Proceedings of the 7th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2016)/The 6th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2016)/Affiliated Workshops, 2016
2015
Hybrid Features and Mediods Classification based Robust Segmentation of Blood Vessels.
J. Medical Syst., 2015
Int. J. Distributed Sens. Networks, 2015
ECG Based Biometric Identification for Population with Normal and Cardiac Anomalies Using Hybrid HRV and DWT Features.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015
Proceedings of the 17th International Conference on E-health Networking, 2015
Survey Based Analysis of Internet of Things Based Architectural Framework for Hospital Management System.
Proceedings of the 13th International Conference on Frontiers of Information Technology, 2015
2013
Int. J. Distributed Sens. Networks, 2013
Proceedings of the 11th International Conference on Frontiers of Information Technology, 2013