Izhar Ahmed Khan
Orcid: 0000-0001-7180-8179
According to our database1,
Izhar Ahmed Khan
authored at least 26 papers
between 2019 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2019
2020
2021
2022
2023
2024
2025
0
1
2
3
4
5
6
7
1
5
5
6
5
2
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
A context-aware zero trust-based hybrid approach to IoT-based self-driving vehicles security.
Ad Hoc Networks, 2025
2024
A Novel Collaborative SRU Network With Dynamic Behaviour Aggregation, Reduced Communication Overhead and Explainable Features.
IEEE J. Biomed. Health Informatics, June, 2024
Exploring the Impact of Vocabulary Techniques on Code Completion: A Comparative Approach.
Int. J. Softw. Eng. Knowl. Eng., May, 2024
ICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networks.
J. Supercomput., April, 2024
Fed-Inforce-Fusion: A federated reinforcement-based fusion model for security and privacy protection of IoMT networks against cyber-attacks.
Inf. Fusion, January, 2024
IEEE Access, 2024
2023
Self-Supervised Learning IoT Device Features With Graph Contrastive Neural Network for Device Classification in Social Internet of Things.
IEEE Trans. Netw. Serv. Manag., December, 2023
SAR-to-optical image translation using multi-stream deep ResCNN of information reconstruction.
Expert Syst. Appl., August, 2023
Federated-SRUs: A Federated-Simple-Recurrent-Units-Based IDS for Accurate Detection of Cyber Attacks Against IoT-Augmented Industrial Control Systems.
IEEE Internet Things J., May, 2023
DFF-SC4N: A Deep Federated Defence Framework for Protecting Supply Chain 4.0 Networks.
IEEE Trans. Ind. Informatics, March, 2023
J. Ambient Intell. Humaniz. Comput., 2023
Optimized Tokenization Process for Open-Vocabulary Code Completion: An Empirical Study.
Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, 2023
2022
An Enhanced Multi-Stage Deep Learning Framework for Detecting Malicious Activities From Autonomous Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022
A New Explainable Deep Learning Framework for Cyber Threat Discovery in Industrial IoT Networks.
IEEE Internet Things J., 2022
Int. J. Softw. Eng. Knowl. Eng., 2022
Intell. Data Anal., 2022
XSRU-IoMT: Explainable simple recurrent units for threat detection in Internet of Medical Things networks.
Future Gener. Comput. Syst., 2022
Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control Systems.
Ad Hoc Networks, 2022
2021
DenseNetFuse: a study of deep unsupervised DenseNet to infrared and visual image fusion.
J. Ambient Intell. Humaniz. Comput., 2021
Int. J. Softw. Eng. Knowl. Eng., 2021
Intell. Data Anal., 2021
piSAAC: Extended notion of SAAC feature selection novel method for discrimination of Enzymes model using different machine learning algorithm.
CoRR, 2021
A privacy-conserving framework based intrusion detection method for detecting and recognizing malicious behaviours in cyber-physical power networks.
Appl. Intell., 2021
2020
Inf. Sci., 2020
2019
HML-IDS: A Hybrid-Multilevel Anomaly Prediction Approach for Intrusion Detection in SCADA Systems.
IEEE Access, 2019