Mansoor Ahmed

Orcid: 0000-0003-2034-1403

According to our database1, Mansoor Ahmed authored at least 60 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
User-selectable interaction and privacy features in mobile app recommendation (MAR).
Multim. Tools Appl., June, 2024

Blockchain based general data protection regulation compliant data breach detection system.
PeerJ Comput. Sci., 2024

Chain Links on Wheels: A Security Scheme for IoV Connectivity through Blockchain Integration.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Enhancing Data Protection in Dynamic Consent Management Systems: Formalizing Privacy and Security Definitions with Differential Privacy, Decentralization, and Zero-Knowledge Proofs.
Sensors, September, 2023

Data Provenance in Healthcare: Approaches, Challenges, and Future Directions.
Sensors, July, 2023

Automated Leukemia Screening and Sub-types Classification Using Deep Learning.
Comput. Syst. Sci. Eng., 2023

Blockchain Based Dynamic Consent Management Systems for Enhancing Quality of Life for People with Disabilities.
Proceedings of the IEEE International Smart Cities Conference, 2023

Matchmaking Engine for Energy Data Marketplace Using Word Embedding Techniques.
Proceedings of the IEEE International Conference on Engineering, Technology and Innovation, 2023

Robust Brain Age Estimation via Regression Models and MRI-Derived Features.
Proceedings of the Advances in Computational Collective Intelligence, 2023

2022
<i>Deep-Confidentiality</i>: An IoT-Enabled Privacy-Preserving Framework for Unstructured Big Biomedical Data.
ACM Trans. Internet Techn., 2022

AQE-Net: A Deep Learning Model for Estimating Air Quality of Karachi City from Mobile Images.
Remote. Sens., 2022

BCALS: Blockchain-based secure log management system for cloud computing.
Trans. Emerg. Telecommun. Technol., 2022

Blockchain-Based Software Effort Estimation: An Empirical Study.
IEEE Access, 2022

2021
Decentralised computer systems
PhD thesis, 2021

MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus.
Sensors, 2021

VisTAS: blockchain-based visible and trusted remote authentication system.
PeerJ Comput. Sci., 2021

A semantic rule based digital fraud detection.
PeerJ Comput. Sci., 2021

Exploiting Ontology Recommendation Using Text Categorization Approach.
IEEE Access, 2021

Blockchain-Based Software Process Improvement (BBSPI): An Approach for SMEs to Perform Process Improvement.
IEEE Access, 2021

Dynamic Parameters-Based Reversible Data Transform (RDT) Algorithm in Recommendation System.
IEEE Access, 2021

Software Requirements Prioritization in the context of Global Software Development.
Proceedings of the International Conference on Frontiers of Information Technology, 2021

2020
A methodology for image annotation of human actions in videos.
Multim. Tools Appl., 2020

Watermarking as a service (WaaS) with anonymity.
Multim. Tools Appl., 2020

OBAC: towards agent-based identification and classification of roles, objects, permissions (ROP) in distributed environment.
Multim. Tools Appl., 2020

Leveraging IoT and Fog Computing in Healthcare Systems.
IEEE Internet Things Mag., 2020

A Secure Provenance Scheme for Detecting Consecutive Colluding Users in Distributed Networks.
Int. J. Parallel Program., 2020

MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus.
CoRR, 2020

CDED-Net: Joint Segmentation of Optic Disc and Optic Cup for Glaucoma Screening.
IEEE Access, 2020

Accurate Pixel-Wise Skin Segmentation Using Shallow Fully Convolutional Neural Network.
IEEE Access, 2020

2019
Order preserving secure provenance scheme for distributed networks.
Comput. Secur., 2019

An artificial neural network framework for reduced order modeling of transient flows.
Commun. Nonlinear Sci. Numer. Simul., 2019

A Methodology to Characterize and Compute Public Perception via Social Networks.
Proceedings of the New Knowledge in Information Systems and Technologies - Volume 3, 2019

2018
Towards ontology-based multilingual URL filtering: a big data problem.
J. Supercomput., 2018

Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks.
Future Gener. Comput. Syst., 2018

Identity Aging: Efficient Blockchain Consensus.
CoRR, 2018

Secure provenance using an authenticated data structure approach.
Comput. Secur., 2018

Secrecy Capacity of Artificial Noise Aided Secure Communication in MIMO Rician Channels.
IEEE Access, 2018

A Fault Tolerant Approach for Malicious URL Filtering.
Proceedings of the 2018 International Symposium on Networks, Computers and Communications, 2018

2017
Information collection centric techniques for cloud resource management: Taxonomy, analysis and challenges.
J. Netw. Comput. Appl., 2017

ROTE: Rollback Protection for Trusted Execution.
IACR Cryptol. ePrint Arch., 2017

A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends.
Comput. Secur., 2017

τ-safety: A privacy model for sequential publication with arbitrary updates.
Comput. Secur., 2017

A trust management system model for cloud.
Proceedings of the 2017 International Symposium on Networks, Computers and Communications, 2017

Secure Logging as a Service Using Reversible Watermarking.
Proceedings of the 14th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2017) / 12th International Conference on Future Networks and Communications (FNC 2017) / Affiliated Workshops, 2017

MITIS - An Insider Threats Mitigation Framework for Information Systems.
Proceedings of the Future Data and Security Engineering - 4th International Conference, 2017

2016
Towards Reliable and Energy-Efficient Incremental Cooperative Communication for Wireless Body Area Networks.
Sensors, 2016

Buyer seller watermarking protocols issues and challenges - A survey.
J. Netw. Comput. Appl., 2016

A Scalable Data Integrity Mechanism Based on Provable Data Possession and JARs.
KSII Trans. Internet Inf. Syst., 2016

Aggregated Signatures for Chaining: A Secure Provenance Scheme.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2014
Towards a generic framework for short term firm-specific stock forecasting.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

2011
Aligning Research Resource and Researcher Representation: The eagle-i and VIVO Use Case.
Proceedings of the 2nd International Conference on Biomedical Ontology, 2011

2010
Towards an Ontology-Based Solution for Managing License Agreement Using Semantic Desktop.
Proceedings of the ARES 2010, 2010

2009
CLUSMA: a mobile agent based clustering middleware for wireless sensor networks.
Proceedings of the FIT '09, 2009

Mobile agent watermarking (MAW): security properties and attacks revisited.
Proceedings of the FIT '09, 2009

2008
Context-based privacy management of personal information using semantic desktop: SemanticLIFE case study.
Proceedings of the iiWAS'2008, 2008

2007
User Data Privacy in Web Services Context Using Semantic Desktop - SemanticLIFE Case Study.
Proceedings of the iiWAS'2007, 2007

Towards an Ontology-based Risk Assessment in Collaborative Environment Using the SemanticLIFE.
Proceedings of the The Second International Conference on Availability, 2007

2004
'SemanticLIFE' - A Framework for Managing Information of A Human Lifetime.
Proceedings of the iiWAS'2004, 2004

2001
On application of multiple-input multiple-output antennas to CDMA cellular systems.
Proceedings of the 54th IEEE Vehicular Technology Conference, 2001

CDMA receiver performance for multiple-input multiple-output antenna systems.
Proceedings of the 54th IEEE Vehicular Technology Conference, 2001


  Loading...