Abid Khan
Orcid: 0000-0003-2712-1956
According to our database1,
Abid Khan
authored at least 118 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
General construction of efficient circular partially strongly-balanced repeated measurements designs.
Commun. Stat. Simul. Comput., May, 2024
A robust Internet of Drones security surveillance communication network based on IOTA.
Internet Things, April, 2024
A secure and privacy preserved infrastructure for VANETs based on federated learning with local differential privacy.
Inf. Sci., January, 2024
2023
Cohort-based kernel principal component analysis with Multi-path Service Routing in Federated Learning.
Future Gener. Comput. Syst., December, 2023
Construction of minimal circular nearly strongly balanced repeated measurements designs and their conversion.
Commun. Stat. Simul. Comput., December, 2023
Correction: Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger.
Clust. Comput., December, 2023
Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger.
Clust. Comput., December, 2023
Quantum, November, 2023
Decentralized Receiver-based Link Stability-aware Forwarding Scheme for NDN-based VANETs.
Comput. Networks, November, 2023
Fuzz-classification (<i>p</i>, <i>l</i>)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches.
Digit. Commun. Networks, October, 2023
Sensors, July, 2023
Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home.
Digit. Commun. Networks, April, 2023
Improved angelization technique against background knowledge attack for 1:M microdata.
PeerJ Comput. Sci., 2023
2022
Formal verification and complexity analysis of confidentiality aware textual clinical documents framework.
Int. J. Intell. Syst., December, 2022
<i>Deep-Confidentiality</i>: An IoT-Enabled Privacy-Preserving Framework for Unstructured Big Biomedical Data.
ACM Trans. Internet Techn., 2022
IEEE Trans. Ind. Informatics, 2022
DeepCPPred: A Deep Learning Framework for the Discrimination of Cell-Penetrating Peptides and Their Uptake Efficiencies.
IEEE ACM Trans. Comput. Biol. Bioinform., 2022
A context-aware information-based clone node attack detection scheme in Internet of Things.
J. Netw. Comput. Appl., 2022
(τ, m)-slicedBucket privacy model for sequential anonymization for improving privacy and utility.
Trans. Emerg. Telecommun. Technol., 2022
Trans. Emerg. Telecommun. Technol., 2022
Leveraging Industry 4.0 - Deep Learning, Surrogate Model and Transfer Learning with Uncertainty Quantification Incorporated into Digital Twin for Nuclear System.
CoRR, 2022
A Comprehensive Review of Computing Paradigms, Enabling Computation Offloading and Task Execution in Vehicular Networks.
IEEE Access, 2022
2021
Lucy With Agents in the Sky: Trustworthiness of Cloud Storage for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2021
MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus.
Sensors, 2021
Hybrid Task Coordination Using Multi-Hop Communication in Volunteer Computing-Based VANETs.
Sensors, 2021
Virtual Pseudonym-Changing and Dynamic Grouping Policy for Privacy Preservation in VANETs.
Sensors, 2021
PeerJ Comput. Sci., 2021
On the Role of Hash-Based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions.
IEEE Internet Things J., 2021
IET Inf. Secur., 2021
Trans. Emerg. Telecommun. Technol., 2021
A formal adversarial perspective: Secure and efficient electronic health records collection scheme for multi-records datasets.
Trans. Emerg. Telecommun. Technol., 2021
Privacy preservation of electronic health records with adversarial attacks identification in hybrid cloud.
Comput. Stand. Interfaces, 2021
Computing, 2021
A robust privacy preserving approach for electronic health records using multiple dataset with multiple sensitive attributes.
Comput. Secur., 2021
Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities.
Clust. Comput., 2021
Corrigendum to "Orchestrating product provenance story: When IOTA ecosystem meets electronics supply chain space" [Comput. Ind. 123 (December) (2020) 103334].
Comput. Ind., 2021
An intelligent framework to predict socioeconomic impacts of COVID-19 and public sentiments.
Comput. Electr. Eng., 2021
Comput. Electr. Eng., 2021
Adaptive Grouping and Pseudonym Changing Policy for Protection of Vehicles Location Information in VANETs.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021
2020
Privacy Preserving for Multiple Sensitive Attributes against Fingerprint Correlation Attack Satisfying c-Diversity.
Wirel. Commun. Mob. Comput., 2020
Curbing Address Reuse in the IOTA Distributed Ledger: A Cuckoo-Filter-Based Approach.
IEEE Trans. Engineering Management, 2020
IEEE Netw., 2020
S-box design based on optimize LFT parameter selection: a practical approach in recommendation system domain.
Multim. Tools Appl., 2020
OBAC: towards agent-based identification and classification of roles, objects, permissions (ROP) in distributed environment.
Multim. Tools Appl., 2020
Inf. Sci., 2020
IEEE Internet Things J., 2020
A Secure Provenance Scheme for Detecting Consecutive Colluding Users in Distributed Networks.
Int. J. Parallel Program., 2020
Smart Digital Signatures (SDS): A post-quantum digital signature scheme for distributed ledgers.
Future Gener. Comput. Syst., 2020
MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus.
CoRR, 2020
Comput. Networks, 2020
Orchestrating product provenance story: When IOTA ecosystem meets electronics supply chain space.
Comput. Ind., 2020
Comput. Appl. Math., 2020
VANET-Based Volunteer Computing (VBVC): A Computational Paradigm for Future Autonomous Vehicles.
IEEE Access, 2020
2019
J. Intell. Fuzzy Syst., 2019
Privacy-preserving model and generalization correlation attacks for 1: M data with multiple sensitive attributes.
Inf. Sci., 2019
Privacy-aware relationship semantics-based XACML access control model for electronic health records in hybrid cloud.
Int. J. Distributed Sens. Networks, 2019
Construction of circular partially balanced-Repeated measurement designs using cyclic shifts.
Commun. Stat. Simul. Comput., 2019
Orchestrating Product Provenance Story: When IOTA ECOSYSTEM Meets The Electronics Supply Chain Space.
CoRR, 2019
Comput. Secur., 2019
Comput. Secur., 2019
Comput. Networks, 2019
Comparative Analysis of Machine Learning Techniques for Predicting Air Quality in Smart Cities.
IEEE Access, 2019
2018
J. Supercomput., 2018
Provenance Inference Techniques: Taxonomy, comparative analysis and design challenges.
J. Netw. Comput. Appl., 2018
Recent advancements in garbled computing: How far have we come towards achieving secure, efficient and reusable garbled circuits.
J. Netw. Comput. Appl., 2018
Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks.
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
CoRR, 2018
Comput. Secur., 2018
Clust. Comput., 2018
Ann. des Télécommunications, 2018
Proceedings of the 2018 International Symposium on Networks, Computers and Communications, 2018
Proceedings of the 2018 International Conference on Information Networking, 2018
2017
Wirel. Commun. Mob. Comput., 2017
Formal modeling and verification of security controls for multimedia systems in the cloud.
Multim. Tools Appl., 2017
Balanced Transmissions Based Trajectories of Mobile Sink in Homogeneous Wireless Sensor Networks.
J. Sensors, 2017
J. Netw. Comput. Appl., 2017
J. Netw. Comput. Appl., 2017
Information collection centric techniques for cloud resource management: Taxonomy, analysis and challenges.
J. Netw. Comput. Appl., 2017
A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends.
Comput. Secur., 2017
Comput. Secur., 2017
A high-level domain-specific language for SIEM (design, development and formal verification).
Clust. Comput., 2017
Ann. des Télécommunications, 2017
Enhanced Architecture for Privacy Preserving Data Integration in a Medical Research Environment.
IEEE Access, 2017
Decision Support System for Risk Assessment and Management Strategies in Distributed Software Development.
IEEE Access, 2017
Proceedings of the 2017 International Symposium on Networks, Computers and Communications, 2017
Proceedings of the 14th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2017) / 12th International Conference on Future Networks and Communications (FNC 2017) / Affiliated Workshops, 2017
2016
Sink-to-Sink Coordination Framework Using RPL: Routing Protocol for Low Power and Lossy Networks.
J. Sensors, 2016
J. Netw. Comput. Appl., 2016
KSII Trans. Internet Inf. Syst., 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 International Workshop on Secure Internet of Things, 2016
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016
Proceedings of the 22nd International Conference on Automation and Computing, 2016
2013
Modeling and Evaluating Performance of Routing Operations in Proactive Routing Protocols.
CoRR, 2013
Modeling and Evaluating Performance of Routing Operations in Reactive Routing Protocols.
CoRR, 2013
Energy optimization and Performance Analysis of Cluster Based Routing Protocols Extended from LEACH for WSNs.
CoRR, 2013
REECH-ME: Regional Energy Efficient Cluster Heads Based on Maximum Energy Routing Protocol for WSNs.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013
2010
Towards an Ontology-Based Solution for Managing License Agreement Using Semantic Desktop.
Proceedings of the ARES 2010, 2010
2009
On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS).
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the FIT '09, 2009
Performance analysis of prioritized and non prioritized handoff call queuing schemes in mobile cellular networks.
Proceedings of the FIT '09, 2009
Proceedings of the FIT '09, 2009
2008
On the security properties and attacks against Mobile agent watermark encapsulation(MAWE).
Proceedings of the IEEE International Conference on Systems, 2008
2007
Protecting Mobile Agent's Computation Results with Reversible Watermarking and Digital Signature.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
2006
Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, 2006
1997
Design and implementation of a software bridge with packet filtering and statistics collection functions.
Int. J. Netw. Manag., 1997