5G for Vehicular Communications
- Shah, Syed, Ahmed, Ejaz, Imran, Muhammad, Zeadally, Sherali
A blockchain-based solution for enhancing security and privacy in smart factory
- Wan, Jafu, Li, Jiapeng, Imran, Muhammad, Li, Di
A critical analysis of mobility management related issues of wireless sensor networks in cyber physical systems
- Al-Muhtadi, Jalal, Qiang, Ma, Zeb, Khan, Chaudhry, Junaid, Imran, Muhammad
- Li, Xiaomin, Wan, Jiafu, Dai, Hong-Ning, Imran, Muhammad, Xia, Min, Celesti, Antonio
- Baig, Imran, Farooq, Umer, Ahmed, Ejaz, Imran, Muhammad, Shoaib, Muhammad
A Joint Filtering and Precoding Based Uplink MC-NOMA
- Baig, Imran, Farooq, U., Ul Hasan, N., Zghaibeh, M., Imran, Muhammad
A multivariant stream analysis approach to detect and mitigate DDoS attacks in vehicular ad hoc networks
- Kolandaisamy, Raenu, Md Noor, Rafidah, Ahmedy, Ismail, Ahmad, Iftikhar, Imran, Muhammad
A new insight towards buffer-aided relaying in cooperative wireless networks
- Nasir, Hina, Javaid, Nadeem, Raza, Waseem, Imran, Muhammad, Shoaib, Muhammad
A novel countermeasure technique for reactive jamming attack in internet of things
- Fadele, Alaba, Othman, Mazliza, Hashem, Ibrahim, Yaqoob, Ibrar, Imran, Muhammad, Shoaib, Muhammad
- Imran, Muhammad, Bakhsh, Sheikh, Tahir, Sabeen, Basheri, Mohammed, Shoaib, Muhammad
A zero-watermarking algorithm for privacy protection in biomedical signals
- Ali, Zulfiqar, Imran, Muhammad, Alsulaiman, Mansour, Zia, Tanveer, Shoaib, Muhammad
An improved mechanism for flow rule installation in In-band SDN
- Awan, Israr, Shah, Nadir, Imran, Muhammad, Shoaib, Muhammad, Saeed, Nasir
An innovative algorithm for privacy protection in a voice disorder detection system
- Ali, Zulfiqar, Imran, Muhammad, Abdul, Wadood, Shoaib, Muhammad
Assessing nitrate contamination risks in groundwater : a machine learning approach
- Awais, Muhammad, Aslam, Bilal, Maqsoom, Ahsen, Khalil, Umer, Imran, Muhammad
Big data analytics in industrial IoT using a concentric computing model
- Rehman, Muhammad, Ahmed, Ejaz, Yaqoob, Ibrar, Hashem, Ibrahim, Imran, Muhammad, Ahmad, Shafiq
Blind detection of copy-move forgery in digital audio forensics
- Imran, Muhammad, Ali, Zulfiqar, Bakhsh, Sheikh, Akram, Sheeraz
Bringing Computation Closer toward the User Network: Is Edge Computing the Solution?
- Ahmed, Ejaz, Ahmed, Arif, Yaqoob, Ibrar, Shuja, Junaid, Imran, Muhammad
Buffer occupancy based link prioritization for cooperative wireless networks
- Raza, Waseem, Javaid, Nadeem, Nasir, Hina, Imran, Muhammad, Yasar, Ansar
Channel clustering and QoS level identification scheme for multi-channel cognitive radio networks
- Ali, Amjad, Yaqoob, Ibrar, Ahmed, Adnan, Imran, Muhammad, Kwak, Kyung
Chaos-based robust method of zero-watermarking for medical signals
- Ali, Zulfiqar, Imran, Muhammad, Alsulaiman, Mansour, Shoaib, Muhammad, Ullah, Sana
Are you sure you would like to clear your session, including search history and login status?