Your selections:
Big data management in participatory sensing : issues, trends and future directions
- Karim, Ahmad, Siddiqa, Aisha, Safdar, Zanab, Razzaq, Maham, Imran, Muhammad
Bio-inspired network security for 5G-enabled IoT applications
- Saleem, Kashif, Alabduljabbar, Ghadah, Alrowais, Nouf, Al-Muhtadi, Jalal, Imran, Muhammad, Rodrigues, Joel
Blending big data analytics : review on challenges and a recent study
- Amalina, Fairuz, Targio Hashem, Ibrahim, Azizul, Zati, Fong, Ang, Imran, Muhammad
Blockchain for cloud exchange : a survey
- Xie, Shaoan, Zheng, Zibin, Chen, Weili, Wu, Jiajing, Dai, Hong-Ning, Imran, Muhammad
Blockchain for digital twins : recent advances and future research challenges
- Yaqoob, Ibrar, Salah, Khaled, Uddin, Mueen, Jayaraman, Raja, Omar, Mohammed, Imran, Muhammad
Blockchain-based data privacy management with Nudge theory in open banking
- Wang, Hao, Ma, Shenglan, Dai, Hong-Ning, Imran, Muhammad, Wang, Tongsen
- Rafique, Wajid, Qi, Lianyong, Yaqoob, Ibrar, Imran, Muhammad, Rasool, Raojan, Dou, Wanchun
Countering stasistical attacks in cloud-based searchable encryption
- Ahsan, M., Ali, Ihsan, Bin Idris, Mohd, Imran, Muhammad, Shoaib, Muhammad
Data-driven prognosis method using hybrid deep recurrent neural network
- Xia, Min, Zheng, Xi, Imran, Muhammad, Shoaib, Muhammad
Deep learning and big data technologies for IoT security
- Amanullah, Mohamed, Habeeb, Riyaz, Nasaruddin, Fariza, Gani, Abdullah, Ahmed, Ejaz, Nainar, Abdul, Akim, Nazihah, Imran, Muhammad
Establishing effective communications in disaster affected areas and artificial intelligence based detection using social media platform
- Raza, Mohsin, Awais, Muhammad, Ali, Kamran, Aslam, Nauman, Paranthaman, Vishnu, Imran, Muhammad, Ali, Farman
Flow-aware elephant flow detection for software-defined networks
- Hamdan, Mosab, Mohammed, Bushra, Humayun, Usman, Abdelaziz, Ahmed, Khan, Suleman, Ali, M., Imran, Muhammad, Marsono, M.
Have you been a victim of COVID-19-related cyber incidents? Survey, taxonomy, and mitigation strategies
- Hakak, Saqib, Khan, Wazir, Imran, Muhammad, Choo, Kim-Kwang, Shoaib, Muhammad
Investigating smart home security : is blockchain the answer?
- Arif, Samrah, Khan, M. Arif, Rehman, Sabih, Kabir, Muhammad, Imran, Muhammad
Model compression for IoT applications in industry 4.0 via multiscale knowledge transfer
- Fu, Shipeng, Li, Zhen, Liu, Kai, Din, Sadia, Imran, Muhammad, Yang, Xiaomin
Novel one time signatures (NOTS) : a compact post-quantum digital signature scheme
- Shahid, Furqan, Ahmad, Iftikhar, Imran, Muhammad, Shoaib, Muhammad
Performance analysis of different types of machine learning classifiers for non-technical loss detection
- Ghori, Khawaja, Abbasi, Rabeeh, Awais, Muhammad, Imran, Muhammad, Ullah, Ata, Szathmary, Laszlo
- Yousafzai, Abdullah, Yaqoob, Ibrar, Imran, Muhammad, Gani, Abdullah, Md Noor, Rafidah
- Razzak, Imran, Zafar, Khurram, Imran, Muhammad, Xu, Guandong
Refining Parkinson’s neurological disorder identification through deep transfer learning
- Naseer, Amina, Rani, Monai, Naz, Saeeda, Razzak, Muhammad, Imran, Muhammad, Xu, Guandong
Are you sure you would like to clear your session, including search history and login status?