Muhammad Waqas
Orcid: 0000-0003-0814-7544Affiliations:
- University of Bahrain, Computer Engineering Department, Zallaq, Bahrain
- Edith Cowan University, School of Engineering, Perth, WA, Australia
- Ghulam Ishaq Khan Institute of Engineering Sciences and Technology, Swabi, Pakistan
- Beijing University of Technology, School of Computing, China
- Tsinghua University, Department of Electronic Engineering, Beijing, China (PhD 2019)
According to our database1,
Muhammad Waqas
authored at least 111 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on giki.edu.pk
-
on orcid.org
On csauthors.net:
Bibliography
2024
J. Cloud Comput., December, 2024
Blockchain-Enhanced Time-Variant Mean Field-Optimized Dynamic Computation Sharing in Mobile Network.
IEEE Trans. Wirel. Commun., September, 2024
USAF-IoD: Ultralightweight and Secure Authenticated Key Agreement Framework for Internet of Drones Environment.
IEEE Trans. Veh. Technol., August, 2024
Knowledge Graph Enhanced Contextualized Attention-Based Network for Responsible User-Specific Recommendation.
ACM Trans. Intell. Syst. Technol., August, 2024
Blockchain-Assisted Lightweight Authenticated Key Agreement Security Framework for Smart Vehicles-Enabled Intelligent Transportation System.
IEEE Trans Autom. Sci. Eng., July, 2024
Futuristic Decentralized Vehicular Network Architecture and Repairing Management System on Blockchain.
IEEE Internet Things J., July, 2024
EAKE-WC: Efficient and Anonymous Authenticated Key Exchange Scheme for Wearable Computing.
IEEE Trans. Mob. Comput., May, 2024
Emotion detection using convolutional neural network and long short-term memory: a deep multimodal framework.
Multim. Tools Appl., May, 2024
A Many-Objective Ensemble Optimization Algorithm for the Edge Cloud Resource Scheduling Problem.
IEEE Trans. Mob. Comput., February, 2024
Hybrid Edge-Cloud Collaborator Resource Scheduling Approach Based on Deep Reinforcement Learning and Multiobjective Optimization.
IEEE Trans. Computers, January, 2024
SLIM: A Secure and Lightweight Multi-Authority Attribute-Based Signcryption Scheme for IoT.
IEEE Trans. Inf. Forensics Secur., 2024
Fuzzy-Based Fusion Model for β-Thalassemia Carriers Prediction Using Machine Learning Technique.
Adv. Fuzzy Syst., 2024
IEEE Access, 2024
2023
Many-Objective Optimization Based Intrusion Detection for in-Vehicle Network Security.
IEEE Trans. Intell. Transp. Syst., December, 2023
On the Effect of Emotion Identification from Limited Translated Text Samples Using Computational Intelligence.
Int. J. Comput. Intell. Syst., December, 2023
Symmetry, November, 2023
IEEE Trans. Veh. Technol., September, 2023
LCDMA: Lightweight Cross-Domain Mutual Identity Authentication Scheme for Internet of Things.
IEEE Internet Things J., July, 2023
Pattern Recognit., June, 2023
Multiple re-configurable intelligent surfaces based physical layer eavesdropper detection for V2I communications.
Phys. Commun., June, 2023
Deep convolutional cross-connected kernel mapping support vector machine based on SelectDropout.
Inf. Sci., May, 2023
Physical layer security analysis using radio frequency-fingerprinting in cellular-V2X for 6G communication.
IET Signal Process., May, 2023
RSU assisted reliable relay selection for emergency message routing in intermittently connected VANETs.
Wirel. Networks, April, 2023
Knowl. Based Syst., April, 2023
Cooperative Computational Offloading in Mobile Edge Computing for Vehicles: A Model-Based DNN Approach.
IEEE Trans. Veh. Technol., March, 2023
AAKE-BIVT: Anonymous Authenticated Key Exchange Scheme for Blockchain-Enabled Internet of Vehicles in Smart Transportation.
IEEE Trans. Intell. Transp. Syst., February, 2023
Comput. Networks, February, 2023
A Hybrid Many-Objective Optimization Algorithm for Task Offloading and Resource Allocation in Multi-Server Mobile Edge Computing Networks.
IEEE Trans. Serv. Comput., 2023
Network Intrusion Detection System (NIDS) Based on Pseudo-Siamese Stacked Autoencoders in Fog Computing.
IEEE Trans. Serv. Comput., 2023
Multi-hop emergency message dissemination through optimal cooperative forwarder in grid-based 5G-VANETs.
J. Ambient Intell. Humaniz. Comput., 2023
Deep neural network-based identification of driving risk utilizing driver dependent vehicle driving features: a scheme for critical infrastructure protection.
J. Ambient Intell. Humaniz. Comput., 2023
Network load prediction and anomaly detection using ensemble learning in 5G cellular networks.
Comput. Commun., 2023
A Provable Secure and Efficient Authentication Framework for Smart Manufacturing Industry.
IEEE Access, 2023
Secrecy Capacity Analysis with Imperfect Channel State Information and Varying Interference for 6G C-V2X Communication.
Proceedings of the 10th International Conference on Wireless Networks and Mobile Communications, 2023
Proceedings of the International Wireless Communications and Mobile Computing, 2023
Distance Vector and Prominent Reliable Path Selection based Stochastic Routing in Distributed Internet of Things.
Proceedings of the International Wireless Communications and Mobile Computing, 2023
2022
IEEE Trans. Wirel. Commun., 2022
ACM Trans. Multim. Comput. Commun. Appl., 2022
IEEE Trans. Netw. Serv. Manag., 2022
Social Phenomena and Fog Computing Networks: A Novel Perspective for Future Networks.
IEEE Trans. Comput. Soc. Syst., 2022
SCCA: A slicing-and coding-based consensus algorithm for optimizing storage in blockchain-based IoT data sharing.
Peer-to-Peer Netw. Appl., 2022
A novel binary chaotic genetic algorithm for feature selection and its utility in affective computing and healthcare.
Neural Comput. Appl., 2022
IT Prof., 2022
A position-based reliable emergency message routing scheme for road safety in VANETs.
Comput. Networks, 2022
The role of artificial intelligence and machine learning in wireless networks security: principle, practice and challenges.
Artif. Intell. Rev., 2022
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022
Enhancing Security in The Internet of Things Ecosystem using Reinforcement Learning and Blockchain.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022
Resource Allocation for Blockchain-Enabled Fog Computing with Deep Reinforcement Learning.
Proceedings of the 12th International Conference on Communication and Network Security, 2022
A Reliable and Stable V2V Routing Scheme for Warning Message Dissemination in VANETs using Bi-Directional Clustering.
Proceedings of the 12th International Conference on Communication and Network Security, 2022
Infrared Ship Video Target Tracking Based on Cross-Connection and Spatial Transformer Network.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
Blockchain Enable IoT Using Deep Reinforcement Learning: A Novel Architecture to Ensure Security of Data Sharing and Storage.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
Ciphertext-Policy Attribute-based Encryption for Securing IoT Devices in Fog Computing.
Proceedings of the International Conference on Computer, 2022
Deep Reinforcement Learning based Intrusion Detection System with Feature Selections Method and Optimal Hyper-parameter in IoT Environment.
Proceedings of the International Conference on Computer, 2022
2021
Reinforcement Learning Assisted Impersonation Attack Detection in Device-to-Device Communications.
IEEE Trans. Veh. Technol., 2021
J. Supercomput., 2021
ModPSO-CNN: an evolutionary convolution neural network with application to visual recognition.
Soft Comput., 2021
Sensors, 2021
A neural network architecture optimizer based on DARTS and generative adversarial learning.
Inf. Sci., 2021
An Evolutionary Computing-Based Efficient Hybrid Task Scheduling Approach for Heterogeneous Computing Environment.
J. Grid Comput., 2021
Future Gener. Comput. Syst., 2021
Spectrum utilization efficiency in CRNs with hybrid spectrum access and channel reservation: A comprehensive analysis under prioritized traffic.
Future Gener. Comput. Syst., 2021
Utilizing 3D joints data extracted through depth camera to train classifiers for identifying suicide bomber.
Expert Syst. Appl., 2021
An effective genetic algorithm-based feature selection method for intrusion detection systems.
Comput. Secur., 2021
A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing.
Comput. Networks, 2021
An In-ad contents-based viewability prediction framework using Artificial Intelligence for Web Ads.
Artif. Intell. Rev., 2021
Proceedings of the International Conference on UK-China Emerging Technologies, 2021
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021
2020
The Allocation and Reuse Scheme of Physical Cell Identifications Based on Maximum Degree First Coloring Algorithm.
IEEE Syst. J., 2020
J. Netw. Comput. Appl., 2020
Optimisation-based training of evolutionary convolution neural network for visual classification applications.
IET Comput. Vis., 2020
Power maximisation technique for generating secret keys by exploiting physical layer security in wireless communication.
IET Commun., 2020
A Comprehensive Survey on Mobility-Aware D2D Communications: Principles, Practice and Challenges.
IEEE Commun. Surv. Tutorials, 2020
Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL.
Comput. Commun., 2020
Comput. Networks, 2020
Spectrum efficiency in CRNs using hybrid dynamic channel reservation and enhanced dynamic spectrum access.
Ad Hoc Networks, 2020
IEEE Access, 2020
RBO-EM: Reduced Broadcast Overhead Scheme for Emergency Message Dissemination in VANETs.
IEEE Access, 2020
A Novel Quantum Inspired Particle Swarm Optimization Algorithm for Electromagnetic Applications.
IEEE Access, 2020
IEEE Access, 2020
IEEE Access, 2020
An Efficient Approach for Selecting a Secure Relay Node in Fog Computing Social Ties Network.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020
Service Completion Probability Enhancement and Fairness for SUs using Hybrid Mode CRNs.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
2019
ISC Int. J. Inf. Secur., 2019
Unsupervised pre-trained filter learning approach for efficient convolution neural network.
Neurocomputing, 2019
IET Commun., 2019
Mobility-Aware Fog Computing in Dynamic Environments: Understandings and Implementation.
IEEE Access, 2019
2018
Social-Aware Secret Key Generation for Secure Device-to-Device Communication via Trusted and Non-Trusted Relays.
IEEE Trans. Wirel. Commun., 2018
Socially Aware Secrecy-Ensured Resource Allocation in D2D Underlay Communication: An Overlapping Coalitional Game Scheme.
IEEE Trans. Wirel. Commun., 2018
Mobility Assisted Content Transmission For Device-to-Device Communication Underlaying Cellular Networks.
IEEE Trans. Veh. Technol., 2018
IEEE Commun. Surv. Tutorials, 2018
IEEE Access, 2018
FHC-PCIA: A Physical Cell Identification Allocation Method Based on Fuzzy Hierarchical Clustering for Heterogeneous Cellular Network.
IEEE Access, 2018
SSLSS: Semi-Supervised Learning-Based Steganalysis Scheme for Instant Voice Communication Network.
IEEE Access, 2018
A Quantum Particle Swarm Optimization Method With Fitness Selection Methodology for Electromagnetic Inverse Problems.
IEEE Access, 2018
Incentive Mechanism Design for Computation Offloading in Heterogeneous Fog Computing: A Contract-Based Approach.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Confidential Information Ensurance through Physical Layer Security in Device-to-Device Communication.
Proceedings of the IEEE Global Communications Conference, 2018
2017
Impact of thermal aging on the intermetallic compound particle size and mechanical properties of lead free solder for green electronics.
Microelectron. Reliab., 2017
Int. J. Approx. Reason., 2017
IEEE Commun. Surv. Tutorials, 2017
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017
2015
Inf. Sci., 2015
2013
Proceedings of the Eighth International Conference on Digital Information Management (ICDIM 2013), 2013