Abid Khan

Orcid: 0000-0003-2712-1956

According to our database1, Abid Khan authored at least 118 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
General construction of efficient circular partially strongly-balanced repeated measurements designs.
Commun. Stat. Simul. Comput., May, 2024

A robust Internet of Drones security surveillance communication network based on IOTA.
Internet Things, April, 2024

A secure and privacy preserved infrastructure for VANETs based on federated learning with local differential privacy.
Inf. Sci., January, 2024

2023
Cohort-based kernel principal component analysis with Multi-path Service Routing in Federated Learning.
Future Gener. Comput. Syst., December, 2023

Construction of minimal circular nearly strongly balanced repeated measurements designs and their conversion.
Commun. Stat. Simul. Comput., December, 2023

Correction: Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger.
Clust. Comput., December, 2023

Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger.
Clust. Comput., December, 2023

Preparing quantum many-body scar states on quantum computers.
Quantum, November, 2023

Decentralized Receiver-based Link Stability-aware Forwarding Scheme for NDN-based VANETs.
Comput. Networks, November, 2023

Fuzz-classification (<i>p</i>, <i>l</i>)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches.
Digit. Commun. Networks, October, 2023

Data Provenance in Healthcare: Approaches, Challenges, and Future Directions.
Sensors, July, 2023

Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home.
Digit. Commun. Networks, April, 2023

Improved angelization technique against background knowledge attack for 1:M microdata.
PeerJ Comput. Sci., 2023

Using CycleGANs to Generate Realistic STEM Images for Machine Learning.
CoRR, 2023

2022
Formal verification and complexity analysis of confidentiality aware textual clinical documents framework.
Int. J. Intell. Syst., December, 2022

<i>Deep-Confidentiality</i>: An IoT-Enabled Privacy-Preserving Framework for Unstructured Big Biomedical Data.
ACM Trans. Internet Techn., 2022

Toward Smart Manufacturing Using Spiral Digital Twin Framework and Twinchain.
IEEE Trans. Ind. Informatics, 2022

DeepCPPred: A Deep Learning Framework for the Discrimination of Cell-Penetrating Peptides and Their Uptake Efficiencies.
IEEE ACM Trans. Comput. Biol. Bioinform., 2022

A context-aware information-based clone node attack detection scheme in Internet of Things.
J. Netw. Comput. Appl., 2022

(τ, m)-slicedBucket privacy model for sequential anonymization for improving privacy and utility.
Trans. Emerg. Telecommun. Technol., 2022

BCALS: Blockchain-based secure log management system for cloud computing.
Trans. Emerg. Telecommun. Technol., 2022

Leveraging Industry 4.0 - Deep Learning, Surrogate Model and Transfer Learning with Uncertainty Quantification Incorporated into Digital Twin for Nuclear System.
CoRR, 2022

A Comprehensive Review of Computing Paradigms, Enabling Computation Offloading and Task Execution in Vehicular Networks.
IEEE Access, 2022

2021
Lucy With Agents in the Sky: Trustworthiness of Cloud Storage for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2021

MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus.
Sensors, 2021

Hybrid Task Coordination Using Multi-Hop Communication in Volunteer Computing-Based VANETs.
Sensors, 2021

Virtual Pseudonym-Changing and Dynamic Grouping Policy for Privacy Preservation in VANETs.
Sensors, 2021

VisTAS: blockchain-based visible and trusted remote authentication system.
PeerJ Comput. Sci., 2021

A semantic rule based digital fraud detection.
PeerJ Comput. Sci., 2021

On the Role of Hash-Based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions.
IEEE Internet Things J., 2021

Adaptive and survivable trust management for Internet of Things systems.
IET Inf. Secur., 2021

Privacy-preserving multilevel obfuscation scheme for vehicular network.
Trans. Emerg. Telecommun. Technol., 2021

A formal adversarial perspective: Secure and efficient electronic health records collection scheme for multi-records datasets.
Trans. Emerg. Telecommun. Technol., 2021

Privacy preservation of electronic health records with adversarial attacks identification in hybrid cloud.
Comput. Stand. Interfaces, 2021

Blockchain-based secure multi-resource trading model for smart marketplace.
Computing, 2021

A robust privacy preserving approach for electronic health records using multiple dataset with multiple sensitive attributes.
Comput. Secur., 2021

Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities.
Clust. Comput., 2021

Corrigendum to "Orchestrating product provenance story: When IOTA ecosystem meets electronics supply chain space" [Comput. Ind. 123 (December) (2020) 103334].
Comput. Ind., 2021

An intelligent framework to predict socioeconomic impacts of COVID-19 and public sentiments.
Comput. Electr. Eng., 2021

Fog-enabled secure multiparty computation based aggregation scheme in smart grid.
Comput. Electr. Eng., 2021

URL filtering using big data analytics in 5G networks.
Comput. Electr. Eng., 2021

Adaptive Grouping and Pseudonym Changing Policy for Protection of Vehicles Location Information in VANETs.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021

2020
Privacy Preserving for Multiple Sensitive Attributes against Fingerprint Correlation Attack Satisfying c-Diversity.
Wirel. Commun. Mob. Comput., 2020

Curbing Address Reuse in the IOTA Distributed Ledger: A Cuckoo-Filter-Based Approach.
IEEE Trans. Engineering Management, 2020

Volunteer Computing in Connected Vehicles: Opportunities and Challenges.
IEEE Netw., 2020

Watermarking as a service (WaaS) with anonymity.
Multim. Tools Appl., 2020

S-box design based on optimize LFT parameter selection: a practical approach in recommendation system domain.
Multim. Tools Appl., 2020

OBAC: towards agent-based identification and classification of roles, objects, permissions (ROP) in distributed environment.
Multim. Tools Appl., 2020

WOTS-S: A Quantum Secure Compact Signature Scheme for Distributed Ledger.
Inf. Sci., 2020

FESDA: Fog-Enabled Secure Data Aggregation in Smart Grid IoT Network.
IEEE Internet Things J., 2020

A Secure Provenance Scheme for Detecting Consecutive Colluding Users in Distributed Networks.
Int. J. Parallel Program., 2020

Smart Digital Signatures (SDS): A post-quantum digital signature scheme for distributed ledgers.
Future Gener. Comput. Syst., 2020

MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus.
CoRR, 2020

Provenance-enabled packet path tracing in the RPL-based internet of things.
Comput. Networks, 2020

Orchestrating product provenance story: When IOTA ecosystem meets electronics supply chain space.
Comput. Ind., 2020

Post-quantum distributed ledger for internet of things.
Comput. Electr. Eng., 2020

New algorithms for parameter reduction of intuitionistic fuzzy soft sets.
Comput. Appl. Math., 2020

VANET-Based Volunteer Computing (VBVC): A Computational Paradigm for Future Autonomous Vehicles.
IEEE Access, 2020

2019
An improved algorithm for normal parameter reduction of soft set.
J. Intell. Fuzzy Syst., 2019

Privacy-preserving model and generalization correlation attacks for 1: M data with multiple sensitive attributes.
Inf. Sci., 2019

Privacy-aware relationship semantics-based XACML access control model for electronic health records in hybrid cloud.
Int. J. Distributed Sens. Networks, 2019

Privacy aware decentralized access control system.
Future Gener. Comput. Syst., 2019

Construction of circular partially balanced-Repeated measurement designs using cyclic shifts.
Commun. Stat. Simul. Comput., 2019

Orchestrating Product Provenance Story: When IOTA ECOSYSTEM Meets The Electronics Supply Chain Space.
CoRR, 2019

An efficient privacy preserving protocol for dynamic continuous data collection.
Comput. Secur., 2019

Order preserving secure provenance scheme for distributed networks.
Comput. Secur., 2019

Privacy aware IOTA ledger: Decentralized mixing and unlinkable IOTA transactions.
Comput. Networks, 2019

A Novel Approach to Parameter Reduction of Fuzzy Soft Set.
IEEE Access, 2019

Comparative Analysis of Machine Learning Techniques for Predicting Air Quality in Smart Cities.
IEEE Access, 2019

2018
Towards ontology-based multilingual URL filtering: a big data problem.
J. Supercomput., 2018

Provenance Inference Techniques: Taxonomy, comparative analysis and design challenges.
J. Netw. Comput. Appl., 2018

Recent advancements in garbled computing: How far have we come towards achieving secure, efficient and reusable garbled circuits.
J. Netw. Comput. Appl., 2018

Structures and data preserving homomorphic signatures.
J. Netw. Comput. Appl., 2018

Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks.
Future Gener. Comput. Syst., 2018

Secure policy execution using reusable garbled circuit in the cloud.
Future Gener. Comput. Syst., 2018

Provenance-enabled Packet Path Tracing in the RPL-based Internet of Things.
CoRR, 2018

Secure provenance using an authenticated data structure approach.
Comput. Secur., 2018

An efficient privacy mechanism for electronic health records.
Comput. Secur., 2018

RALBA: a computation-aware load balancing scheduler for cloud computing.
Clust. Comput., 2018

Detection of rank attack in routing protocol for Low Power and Lossy Networks.
Ann. des Télécommunications, 2018

Improved Generalization for Secure Data Publishing.
IEEE Access, 2018

A Fault Tolerant Approach for Malicious URL Filtering.
Proceedings of the 2018 International Symposium on Networks, Computers and Communications, 2018

Data trustworthiness in IoT.
Proceedings of the 2018 International Conference on Information Networking, 2018

2017
Congestion Detection and Alleviation in Multihop Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2017

Formal modeling and verification of security controls for multimedia systems in the cloud.
Multim. Tools Appl., 2017

Balanced Transmissions Based Trajectories of Mobile Sink in Homogeneous Wireless Sensor Networks.
J. Sensors, 2017

Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes.
J. Netw. Comput. Appl., 2017

Region based cooperative routing in underwater wireless sensor networks.
J. Netw. Comput. Appl., 2017

Information collection centric techniques for cloud resource management: Taxonomy, analysis and challenges.
J. Netw. Comput. Appl., 2017

A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends.
Comput. Secur., 2017

τ-safety: A privacy model for sequential publication with arbitrary updates.
Comput. Secur., 2017

A high-level domain-specific language for SIEM (design, development and formal verification).
Clust. Comput., 2017

Towards a set aggregation-based data integrity scheme for smart grids.
Ann. des Télécommunications, 2017

Enhanced Architecture for Privacy Preserving Data Integration in a Medical Research Environment.
IEEE Access, 2017

Decision Support System for Risk Assessment and Management Strategies in Distributed Software Development.
IEEE Access, 2017

A trust management system model for cloud.
Proceedings of the 2017 International Symposium on Networks, Computers and Communications, 2017

Secure Logging as a Service Using Reversible Watermarking.
Proceedings of the 14th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2017) / 12th International Conference on Future Networks and Communications (FNC 2017) / Affiliated Workshops, 2017

2016
Sink-to-Sink Coordination Framework Using RPL: Routing Protocol for Low Power and Lossy Networks.
J. Sensors, 2016

Buyer seller watermarking protocols issues and challenges - A survey.
J. Netw. Comput. Appl., 2016

A Scalable Data Integrity Mechanism Based on Provable Data Possession and JARs.
KSII Trans. Internet Inf. Syst., 2016

Adaptive Reputation Weights Assignment Scheme for MANETs.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Aggregated Signatures for Chaining: A Secure Provenance Scheme.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Introducing Secure Provenance in IoT: Requirements and Challenges.
Proceedings of the 2016 International Workshop on Secure Internet of Things, 2016

A Zero Watermarking Scheme for Data Integrity in Wireless Sensor Networks.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

Secure login protocols: An analysis on modern attacks and solutions.
Proceedings of the 22nd International Conference on Automation and Computing, 2016

2013
Modeling and Evaluating Performance of Routing Operations in Proactive Routing Protocols.
CoRR, 2013

Modeling and Evaluating Performance of Routing Operations in Reactive Routing Protocols.
CoRR, 2013

Energy optimization and Performance Analysis of Cluster Based Routing Protocols Extended from LEACH for WSNs.
CoRR, 2013

REECH-ME: Regional Energy Efficient Cluster Heads Based on Maximum Energy Routing Protocol for WSNs.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

2010
Towards an Ontology-Based Solution for Managing License Agreement Using Semantic Desktop.
Proceedings of the ARES 2010, 2010

2009
On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS).
Proceedings of the Advances in Information Security and Assurance, 2009

CLUSMA: a mobile agent based clustering middleware for wireless sensor networks.
Proceedings of the FIT '09, 2009

Performance analysis of prioritized and non prioritized handoff call queuing schemes in mobile cellular networks.
Proceedings of the FIT '09, 2009

Mobile agent watermarking (MAW): security properties and attacks revisited.
Proceedings of the FIT '09, 2009

2008
On the security properties and attacks against Mobile agent watermark encapsulation(MAWE).
Proceedings of the IEEE International Conference on Systems, 2008

2007
Protecting Mobile Agent's Computation Results with Reversible Watermarking and Digital Signature.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
A Novel Method of Watermarking Relational Databases using Character String.
Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, 2006

1997
Design and implementation of a software bridge with packet filtering and statistics collection functions.
Int. J. Netw. Manag., 1997


  Loading...