Naveed Ahmad

Orcid: 0000-0003-2941-9780

Affiliations:
  • Prince Sultan University, Department of Computer Science, Riyadh, Saudi Arabia
  • University of Peshawar, Department of Computer Science, Pakistan (former)
  • University of Surrey, Institute of Communication System, UK (PhD 2013)


According to our database1, Naveed Ahmad authored at least 49 papers between 2010 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
FCG-MFD: Benchmark function call graph-based dataset for malware family detection.
J. Netw. Comput. Appl., 2025

2024
HDA-IDS: A Hybrid DoS Attacks Intrusion Detection System for IoT by using semi-supervised CL-GAN.
Expert Syst. Appl., March, 2024

End-to-end vertical web search pseudo relevance feedback queries recommendation software.
SoftwareX, 2024

TransResUNet: Revolutionizing Glioma Brain Tumor Segmentation Through Transformer-Enhanced Residual UNet.
IEEE Access, 2024

XEmoAccent: Embracing Diversity in Cross-Accent Emotion Recognition Using Deep Learning.
IEEE Access, 2024

Cyber-Threat-Intelligence: Detection of Selective Packet Drops and Fake Packet Attacks in Opportunistic Networks (DOSFAN).
Proceedings of the 2024 8th International Conference on Information System and Data Mining, 2024

2023
Autonomous valet parking optimization with two-step reservation and pricing strategy.
J. Netw. Comput. Appl., October, 2023

AMED: Aggregated multimedia exploratory and discovery search software.
SoftwareX, February, 2023

I-Cubid: a nonlinear cubic graph-based approach to visualize and in-depth browse Flickr image results.
PeerJ Comput. Sci., 2023

GAB-Net: A Robust Detector for Remote Sensing Object Detection Under Dramatic Scale Variation and Complex Backgrounds.
IEEE Geosci. Remote. Sens. Lett., 2023

Sampling Fingerprints From Multimedia Content Resource Clusters.
IEEE Access, 2023

Simulative Survey of Flooding Attacks in Intermittently Connected Vehicular Delay Tolerant Networks.
IEEE Access, 2023

FAPMIC: Fake Packet and Selective Packet Drops Attacks Mitigation by Merkle Hash Tree in Intermittently Connected Networks.
IEEE Access, 2023

Detection of Targeted Attacks Using Medium-Interaction Honeypot for Unmanned Aerial Vehicle.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023

2022
Multimedia Aggregated Information Discovery Data.
Dataset, March, 2022

An Explanatory Study on User Behavior in Discovering Aggregated Multimedia Web Content.
IEEE Access, 2022

2021
From smart parking towards autonomous valet parking: A survey, challenges and future Works.
J. Netw. Comput. Appl., 2021

Proof of Pseudonym: Blockchain-Based Privacy Preserving Protocol for Intelligent Transport System.
IEEE Access, 2021

2020
Towards Efficient Battery Swapping Service Operation Under Battery Heterogeneity.
IEEE Trans. Veh. Technol., 2020

Mobile Charging as a Service: A Reservation-Based Approach.
IEEE Trans Autom. Sci. Eng., 2020

xDBAuth: Blockchain Based Cross Domain Authentication and Authorization Framework for Internet of Things.
IEEE Access, 2020

2019
A Decentralized Deadline-Driven Electric Vehicle Charging Recommendation.
IEEE Syst. J., 2019

DSCB: Dual sink approach using clustering in body area network.
Peer-to-Peer Netw. Appl., 2019

BCON: Blockchain based access CONtrol across multiple conflict of interest domains.
J. Netw. Comput. Appl., 2019

Guest Editorial Special Issue on Toward Securing Internet of Connected Vehicles (IoV) From Virtual Vehicle Hijacking.
IEEE Internet Things J., 2019

E<sup>2</sup>MR: energy-efficient multipath routing protocol for underwater wireless sensor networks.
IET Networks, 2019

Privacy by Architecture Pseudonym Framework for Delay Tolerant Network.
Future Gener. Comput. Syst., 2019

Blockchain based permission delegation and access control in Internet of Things (BACI).
Comput. Secur., 2019

Robust and Efficient Energy Harvested-Aware Routing Protocol With Clustering Approach in Body Area Networks.
IEEE Access, 2019

FRID: Flood Attack Mitigation Using Resources Efficient Intrusion Detection Techniques in Delay Tolerant Networks.
IEEE Access, 2019

2018
Industrial Internet of Things Based Efficient and Reliable Data Dissemination Solution for Vehicular Ad Hoc Networks.
Wirel. Commun. Mob. Comput., 2018

A comparative study of scenario-driven multi-hop broadcast protocols for VANETs.
Veh. Commun., 2018

An EV Charging Management System Concerning Drivers' Trip Duration and Mobility Uncertainty.
IEEE Trans. Syst. Man Cybern. Syst., 2018

Radius-based multipath courier node routing protocol for acoustic communications.
IET Wirel. Sens. Syst., 2018

Multi-criteria based zone head selection in Internet of Things based wireless sensor networks.
Future Gener. Comput. Syst., 2018

A survey of local/cooperative-based malicious information detection techniques in VANETs.
EURASIP J. Wirel. Commun. Netw., 2018

A taxonomy on misbehaving nodes in delay tolerant networks.
Comput. Secur., 2018

SPATA: Strong Pseudonym-Based AuthenTicAtion in Intelligent Transport System.
IEEE Access, 2018

Towards autonomy: Cost-effective scheduling for long-range autonomous valet parking (LAVP).
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

Intelligent Transportation Systems Enabled ICT Framework for Electric Vehicle Charging in Smart City.
Proceedings of the Handbook of Smart Cities, Software Services and Cyber Infrastructure., 2018

2017
A Survey of Routing Issues and Associated Protocols in Underwater Wireless Sensor Networks.
J. Sensors, 2017

Certificate revocation in vehicular ad hoc networks techniques and protocols: a survey.
Sci. China Inf. Sci., 2017

2013
Engineering privacy by design for delay tolerant networks.
PhD thesis, 2013

A Reliable and Efficient Geographic Routing Scheme for Delay/Disruption Tolerant Networks.
IEEE Wirel. Commun. Lett., 2013

2012
A mobility vector based routing algorithm for Delay Tolerant Networks using history geographic information.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

2011
Flow Aware Admission Control-Multipath protocol with multiple constraints (FAAC-MM) for assurance of multiple QoS metrics in MANETs.
Proceedings of the 18th IEEE Symposium on Communications and Vehicular Technology in the Benelux, 2011

Pseudonymised communication in delay tolerant networks.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

QoS assurance in MANETs using flow aware admission control - Multipath protocol.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011

2010
ID Based Cryptography and Anonymity in Delay/Disruption Tolerant Networks.
Proceedings of the Personal Satellite Services - Second International ICST Confernce, 2010


  Loading...