Your selections:
- Rafique, Wajid, Qi, Lianyong, Yaqoob, Ibrar, Imran, Muhammad, Rasool, Raojan, Dou, Wanchun
Conditional anonymity enabled blockchain-based ad dissemination in vehicular ad-hoc network
- Javed, Muhammad, Jamal, Abid, Javaid, Nadeem, Haider, Noman, Imran, Muhammad
Countering stasistical attacks in cloud-based searchable encryption
- Ahsan, M., Ali, Ihsan, Bin Idris, Mohd, Imran, Muhammad, Shoaib, Muhammad
Data-driven prognosis method using hybrid deep recurrent neural network
- Xia, Min, Zheng, Xi, Imran, Muhammad, Shoaib, Muhammad
DE-RUSBoost : an efficient electricity theft detection scheme with additive communication layer
- Mujeeb, Sana, Javaid, Nadeem, Khalid, Rabiya, Imran, Muhammad, Naseer, Nidal
Deep learning and big data technologies for IoT security
- Amanullah, Mohamed, Habeeb, Riyaz, Nasaruddin, Fariza, Gani, Abdullah, Ahmed, Ejaz, Nainar, Abdul, Akim, Nazihah, Imran, Muhammad
Efficient data trading and storage in internet of vehicles using consortium blockchain
- Sadiq, Ayesha, Javaid, Nadeem, Samuel, Omaji, Khalid, Adia, Haider, Noman, Imran, Muhammad
Electric Load Forecasting using EEMD and machine learning techniques
- Naz, Aqdas, Javaid, Nadeem, Khalid, Adia, Shoaib, Muhammad, Imran, Muhammad
Electricity theft detection using pipeline in machine learning
- Anwar, Mubbashra, Javaid, Nadeem, Khalid, Adia, Imran, Muhammad, Shoaib, Muhammad
Establishing effective communications in disaster affected areas and artificial intelligence based detection using social media platform
- Raza, Mohsin, Awais, Muhammad, Ali, Kamran, Aslam, Nauman, Paranthaman, Vishnu, Imran, Muhammad, Ali, Farman
Flow-aware elephant flow detection for software-defined networks
- Hamdan, Mosab, Mohammed, Bushra, Humayun, Usman, Abdelaziz, Ahmed, Khan, Suleman, Ali, M., Imran, Muhammad, Marsono, M.
Have you been a victim of COVID-19-related cyber incidents? Survey, taxonomy, and mitigation strategies
- Hakak, Saqib, Khan, Wazir, Imran, Muhammad, Choo, Kim-Kwang, Shoaib, Muhammad
Impact of feature selection on non-technical loss detection
- Ghori, Khawaja, Rabeeh Ayaz, Abbasi, Awais, Muhammad, Imran, Muhammad, Ullah, Atta, Szathmary, Laszlo
Implicit feedback-based group recommender system for internet of things applications
- Guo, Zhiwei, Yu, Keping, Guo, Tan, Bashir, Ali, Imran, Muhammad, Guizani, Mohsen
Investigating smart home security : is blockchain the answer?
- Arif, Samrah, Khan, M. Arif, Rehman, Sabih, Kabir, Muhammad, Imran, Muhammad
Model compression for IoT applications in industry 4.0 via multiscale knowledge transfer
- Fu, Shipeng, Li, Zhen, Liu, Kai, Din, Sadia, Imran, Muhammad, Yang, Xiaomin
Novel one time signatures (NOTS) : a compact post-quantum digital signature scheme
- Shahid, Furqan, Ahmad, Iftikhar, Imran, Muhammad, Shoaib, Muhammad
Performance analysis of different types of machine learning classifiers for non-technical loss detection
- Ghori, Khawaja, Abbasi, Rabeeh, Awais, Muhammad, Imran, Muhammad, Ullah, Ata, Szathmary, Laszlo
- Yousafzai, Abdullah, Yaqoob, Ibrar, Imran, Muhammad, Gani, Abdullah, Md Noor, Rafidah
- Razzak, Imran, Zafar, Khurram, Imran, Muhammad, Xu, Guandong
Are you sure you would like to clear your session, including search history and login status?