Your selections:
A cloud-based IoMT data sharing scheme with conditional anonymous source authentication
- Wang, Yan-Ping, Wang, Xiao-Fen, Dai, Hong-Ning, Zhang, Xiao-Song, Su, Yu, Imran, Muhammad, Nasser, Nidal
- Sahraoui, Yesin, Kerrache, Chaker, Amadeo, Marica, Vegni, Anna, Korichi, Ahmed, Nebhen, Jamel, Imran, Muhammad
- Nasser, Nasser, Fadlullah, Zubair, Fouda, Mostafa, Ali, Asmaa, Imran, Muhammad
A privacy-preserving framework for smart context-aware healthcare applications
- Azad, Muhammad, Arshad, Junaid, Mahmoud, Shazia, Salah, Khaled, Imran, Muhammad
An automatic detection of breast cancer diagnosis and prognosis based on machine learning using ensemble of classifiers
- Naseem, Usman, Rashid, Junaid, Ali, Liaqat, Kim, Jungeun, Haq, Qazi, Awan, Mazhar, Imran, Muhammad
An effective data-collection scheme with AUV path planning in underwater wireless sensor networks
- Khan, Wahab, Hua, Wang, Anwar, Muhammad, Alharbi, Abdullah, Imran, Muhammad, Khan, Javed
An efficient network intrusion detection and classification system
- Ahmad, Iftikhar, Haq, Qazi, Imran, Muhammad, Alassafi, Madini, Alghamdi, Rayed
An intelligent and efficient network intrusion detection system using deep learning
- Qazi, Emad-ul-Haq, Imran, Muhammad, Haider, Noman, Shoaib, Muhammad, Razzak, Imran
An IoT-based smart healthcare system to detect dysphonia
- Ali, Zulfiqar, Imran, Muhammad, Shoaib, Muhammad
Clustering-based real-time anomaly detection—a breakthrough in big data technologies
- Habeeb, Riyaz, Nasaruddin, Fariza, Gani, Abdullah, Amanullah, Mohamed, Hashem, Ibrahim, Ahmed, Ejaz, Imran, Muhammad
Contrastive GNN-based traffic anomaly analysis against imbalanced dataset in IoT-based ITS
- Wang, Yang, Lin, Xi, Wu, Jun, Bashir, Ali, Yang, Wu, Li, Jianhua, Imran, Muhammad
Energy harvesting in underwater acoustic wireless sensor networks : design, taxonomy, applications, challenges and future directions
- Khan, Anwar, Imran, Muhammad, Alharbi, Abdullah, Mohamed, Ehab, Fouda, Mostafa
Extracting built-up areas from spectro-textural information using machine learning
- Maqsoom, Ahsen, Aslam, Bilal, Yousafzai, Arbaz, Ullah, Fahim, Ullah, Sami, Imran, Muhammad
Formal modeling and verification of a blockchain-based crowdsourcing consensus protocol
- Afzaal, Hamra, Imran, Muhammad, Janjua, Muhammad, Gochhayat, Sarada
- Afzaal, Hamra, Imran, Muhammad, Janjua, Muhammad
- Khan, Anwar, Imran, Muhammad, Shoaib, Muhammad, Rahman, Atiq, Sama, Najmus
Metric learning-based few-shot malicious node detection for IoT backhaul/fronthaul networks
- Zhou, Ke, Lin, Xi, Wu, Jun, Bashir, Ali, Li, Jianhua, Imran, Muhammad
- Ali, Sajid, El-Sappagh, Shaker, Ali, Farman, Imran, Muhammad, Abuhmed, Tamer
Water quality management using hybrid machine learning and data mining algorithms : an indexing approach
- Aslam, Bilal, Maqsoom, Ahsen, Cheema, Ali, Ullah, Fahim, Alharbi, Abdullah, Imran, Muhammad
When technology-based learning is the only option : evaluating perceived usefulness of social media
- Hanif, Aamer, Imran, Muhammad
Are you sure you would like to clear your session, including search history and login status?