Ikram Ali

Orcid: 0000-0002-1499-9594

According to our database1, Ikram Ali authored at least 33 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy-Preserving Distributed Optimal Control for Vehicular Platoon With Quantization.
IEEE Trans. Intell. Transp. Syst., October, 2024

IOOSC-U2G: An Identity-Based Online/Offline Signcryption Scheme for Unmanned Aerial Vehicle to Ground Station Communication.
IEEE Internet Things J., September, 2024

Distributed Fuzzy Resilient Control for Vehicular Platooning System With Multiple Nodes Attacks in Prescribed Performance.
IEEE Trans. Veh. Technol., May, 2024

Fuzzy-tolerant-strategy for constrained nonlinear system via adaptive observer.
Inf. Sci., 2024

The revolution and vision of explainable AI for Android malware detection and protection.
Internet Things, 2024

2023
Efficient Offline/Online Heterogeneous-Aggregated Signcryption Protocol for Edge Computing-Based Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., December, 2023

Distributed Adaptive Platoon Secure Control on Unmanned Vehicles System for Lane Change Under Compound Attacks.
IEEE Trans. Intell. Transp. Syst., November, 2023

Event-Based Distributed Fixed-Time Resilient Control for Heterogeneous Vehicular Platoon Against Attack and Disturbances.
IEEE Internet Things J., July, 2023

Efficient and Secure Certificateless Signcryption Without Pairing for Edge Computing-Based Internet of Vehicles.
IEEE Trans. Veh. Technol., May, 2023

2022
Distributed Finite-Time Fault-Tolerant Control for Heterogeneous Vehicular Platoon With Saturation.
IEEE Trans. Intell. Transp. Syst., 2022

Adaptive Resilient Control for Interconnected Vehicular Platoon With Fault and Saturation.
IEEE Trans. Intell. Transp. Syst., 2022

A computationally efficient HMAC-based authentication scheme for network coding.
Telecommun. Syst., 2022

ID-CEPPA: Identity-based Computationally Efficient Privacy-Preserving Authentication scheme for vehicle-to-vehicle communications.
J. Syst. Archit., 2022

ECCHSC: Computationally and Bandwidth Efficient ECC-Based Hybrid Signcryption Protocol for Secure Heterogeneous Vehicle-to-Infrastructure Communications.
IEEE Internet Things J., 2022

Efficient deniable authentication and its application in location-based services.
Comput. Electr. Eng., 2022

2021
An Efficient and Provably Secure ECC-Based Conditional Privacy-Preserving Authentication for Vehicle-to-Vehicle Communication in VANETs.
IEEE Trans. Veh. Technol., 2021

Bilinear Pairing-Based Hybrid Signcryption for Secure Heterogeneous Vehicular Communications.
IEEE Trans. Veh. Technol., 2021

An HMAC-based authentication scheme for network coding with support for error correction and rogue node identification.
J. Syst. Archit., 2021

An Integration of blockchain and AI for secure data sharing and detection of CT images for the hospitals.
Comput. Medical Imaging Graph., 2021

Requirements for Total Resistance to Pollution Attacks in HMAC-Based Authentication Schemes for Network Coding.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

Adaptive Fault-Tolerant Control for Autonomous Vehicle Platoon against Fault.
Proceedings of the CAA Symposium on Fault Detection, 2021

2020
An efficient conditional privacy-preserving authentication scheme for Vehicle-To-Infrastructure communication in VANETs.
Veh. Commun., 2020

An Efficient Hybrid Signcryption Scheme With Conditional Privacy-Preservation for Heterogeneous Vehicular Communication in VANETs.
IEEE Trans. Veh. Technol., 2020

Authenticated key agreement for blockchain-based WBAN.
Telecommun. Syst., 2020

Certificateless authenticated key agreement for blockchain-based WBANs.
J. Syst. Archit., 2020

An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs.
J. Syst. Archit., 2020

A bandwidth efficient HMAC-based authentication scheme for network coding.
J. Inf. Secur. Appl., 2020

Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges.
Complex., 2020

Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges.
Complex., 2020

2019
Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey.
Veh. Commun., 2019

A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs.
J. Syst. Archit., 2019

2018
Heterogeneous signcryption with keyword search for wireless body area network.
Secur. Priv., 2018

2017
A Survey on Lightweight Authentication Schemes in Vertical Handoff.
Int. J. Cooperative Inf. Syst., 2017


  Loading...