Mohammad Nazeeruddin

Orcid: 0000-0003-3580-5960

Affiliations:
  • Prince Mohammad Bin Fahd University, Khobar, Saudi Arabia
  • King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia (former)
  • University of Ulster, Coleraine, UK (PhD 2007)


According to our database1, Mohammad Nazeeruddin authored at least 51 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Blockchain enabled secure pharmaceutical supply chain framework with traceability: an efficient searchable pharmachain approach.
Clust. Comput., December, 2024

An Automated Threat Intelligence Framework for Vehicle-Road Cooperation Systems.
IEEE Internet Things J., November, 2024

Appendicitis Diagnosis: Ensemble Machine Learning and Explainable Artificial Intelligence-Based Comprehensive Approach.
Big Data Cogn. Comput., September, 2024

Secure Data Dissemination Scheme for Digital Twin Empowered Vehicular Networks in Open RAN.
IEEE Trans. Veh. Technol., July, 2024

SpMV and BiCG-Stab sparse solver on Multi-GPUs for reservoir simulation.
Multim. Tools Appl., 2024

2023
AI-Enabled Cryptographic Key Management Model for Secure Communications in the Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., April, 2023

Multiclass tumor identification using combined texture and statistical features.
Medical Biol. Eng. Comput., 2023

Cooperative IDS for Detecting Collaborative Attacks in RPL-AODV Protocol in Internet of Everything.
J. Database Manag., 2023

AI Potentiality and Awareness: A Position Paper from the Perspective of Human-AI Teaming in Cybersecurity.
CoRR, 2023

Unsupervised Deep Learning Approach for In-Vehicle Intrusion Detection System.
IEEE Consumer Electron. Mag., 2023

Security Analysis of a Digital Twin Framework Using Probabilistic Model Checking.
IEEE Access, 2023

Plant Seedling Classification Using Preprocessed Deep CNN.
Proceedings of the 15th International Conference on Computer and Automation Engineering, 2023

2022
Writer verification of partially damaged handwritten Arabic documents based on individual character shapes.
PeerJ Comput. Sci., 2022

H2HI-Net: A Dual-Branch Network for Recognizing Human-to-Human Interactions From Channel-State Information.
IEEE Internet Things J., 2022

Securing the Smart City Airspace: Drone Cyber Attack Detection through Machine Learning.
Future Internet, 2022

Performance evaluation and comparison study of adaptive MANET service location and discovery protocols for highly dynamic environments.
EURASIP J. Wirel. Commun. Netw., 2022

An Intelligent Machine Learning Approach for Smart Grid Theft Detection.
Proceedings of the 23rd IEEE International Symposium on a World of Wireless, 2022

RBDA: Redactable-Blockchain based Secure Data Aggregation Scheme for IoT enabled Cloud Paradigm.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

UAV-enabled edge computing and blockchain based secure charging station selection for energy trading in V2G environment.
Proceedings of the 5th International ACM Mobicom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2022

Unsupervised Machine Learning for Drone Forensics through Flight Path Analysis.
Proceedings of the 10th International Symposium on Digital Forensics and Security, 2022

Deep Learning enabled Channel Secrecy Codes for Physical Layer Security of UAVs in 5G and beyond Networks.
Proceedings of the IEEE International Conference on Communications, 2022

2021
Adaptive tiling for parallel N-body simulations on many core.
Astron. Comput., 2021

Solar Winds Hack: In-Depth Analysis and Countermeasures.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

EfficientNet-based Convolutional Neural Networks for Malware Classification.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

Security Principles and Challenges in Electronic Voting.
Proceedings of the 25th International Enterprise Distributed Object Computing Workshop, 2021

2020
A review of CUDA optimization techniques and tools for structured grid computing.
Computing, 2020

Dual Connectivity-Based Mobility Management and Data Split Mechanism in 4G/5G Cellular Networks.
IEEE Access, 2020

Automatic Fruits Calories Estimation through Convolutional Neural Networks.
Proceedings of the ICCTA 2020: 6th International Conference on Computer and Technology Applications, 2020

Model Checking Based Unmanned Aerial Vehicle (UAV) Security Analysis.
Proceedings of the International Conference on Communications, 2020

Recent Applications of Computing and Mobility Technologies to Modern Manufacturing.
Proceedings of the International Conference on Communications, 2020

2019
Designing Human Assisted Wireless Sensor and Robot Networks Using Probabilistic Model Checking.
J. Intell. Robotic Syst., 2019

Formal Analysis of Human-Assisted Smart City Emergency Services.
IEEE Access, 2019

A Multi-Tiered Defense Model for the Security Analysis of Critical Facilities in Smart Cities.
IEEE Access, 2019

Enhanced MR Image Classification Using Hybrid Statistical and Wavelets Features.
IEEE Access, 2019

Analysis of In-vehicle Security System of Smart Vehicles.
Proceedings of the Future Network Systems and Security - 5th International Conference, 2019

2018
Modeling and Evaluation of Pre-Copy Live VM Migration Using Probabilistic Model Checking.
Proceedings of the 12th International Conference on Signal Processing and Communication Systems, 2018

2017
Design and modeling of energy efficient WSN architecture for tactical applications.
Proceedings of the 2017 Military Communications and Information Systems Conference, 2017

2016
Erratum to: Optimizing the Matrix Multiplication Using Strassen and Winograd Algorithms with Limited Recursions on Many-Core.
Int. J. Parallel Program., 2016

Optimizing the Matrix Multiplication Using Strassen and Winograd Algorithms with Limited Recursions on Many-Core.
Int. J. Parallel Program., 2016

A mining-based approach for efficient enumeration of algebraic structures.
Int. J. Data Sci. Anal., 2016

2013
Design and implementation of reliable auctioning algorithms for multi-robot systems.
Proceedings of the International Conference on Advances in Computing, 2013

2012
Modeling and Analyzing MAC Frame Aggregation Techniques in 802.11n Using Bi-dimensional Markovian Model.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

2010
Experimental Evaluation of Feedback Modalities for Five Teleoperation Tasks.
IEEE Trans. Instrum. Meas., 2010

An efficient and robust name resolution protocol for dynamic MANETs.
Ad Hoc Networks, 2010

2009
Design and Instrumentation of Force Feedback in Telerobotics.
IEEE Trans. Instrum. Meas., 2009

2006
DHAPM: A New Host Auto-configuration Protocol for Highly Dynamic MANETs.
J. Netw. Syst. Manag., 2006

Building a controlled delay assured forwarding class in differentiated services networks.
Proceedings of the 2006 SIGCOMM Workshop on Internet Network Management, 2006

An Efficient and Robust Service Discovery Protocol for Dynamic MANETs.
Proceedings of the Autonomic Management of Mobile Multimedia Services, 2006

Deploying Lightweight Queue Management for improving performance of Mobile Ad-hoc Networks (MANETs).
Proceedings of the 2006 International Conference on Networking and Services (ICNS 2006), 2006

2004
A Distributed Framework for Relaying Stereo Vision for Telerobotics.
Proceedings of the IEEE/ACS International Conference on Pervasive Services (ICPS'04), 2004

2002
Electric load forecasting: Literature survey and classification of methods.
Int. J. Syst. Sci., 2002


  Loading...