Abid Khan (PhD)
Aberystwyth University
H-index: 31
Europe-United Kingdom
Top articles of Abid Khan (PhD)
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
A robust Internet of Drones security surveillance communication network based on IOTA | Internet of Things | Syeda Mahnoor Gilani Adeel Anjum Abid Khan Madiha Haider Syed Syed Atif Moqurrab | 2024/4/1 |
Privacy-preserving V2I communication and secure authentication using ECC with Physical unclonable function | Wireless Networks | Iqra Nawaz Munam Ali Shah Abid Khan Seunggil Jeon | 2024/4 |
Blockchain-based DDoS Attack Mitigation Protocol For Device-to-Device Interaction in Smart Home | Digital Communications and Networks | Bello Musa Majid Iqbal Abid Khan Farhana Jabeen Gwanggil Jeon | 2023/3 |
An Efficient and Privacy-preserving Blockchain-based Secure Data Aggregation in Smart Grids | Sustainable Energy Technologies and Assessments | Azhar Mahmood Abid Khan Adeel Anjum Carste Maple Gwanggil Jeon | 2023/8/14 |
A Privacy-Enabled Blockchain-Based Smart Marketplace | Applied Sciences | Bello Musa Majid Iqbal Abid Khan Adeel Anjum | 2023/2/24 |
Cohort-based Kernel Principal Component Analysis with Multi-path Service Routing in Federated Learning | Future Generation Computer Systems | Hira Sikandar Saif Rehman Adeel Anjum Abid Khan Gwanggil Jeon | 2023/8/1 |
Correction: Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger | Cluster Computing | Zainab Iftikhar Adeel Anjum Abid Khan Munam Ali Shah Gwanggil Jeon | 2023/12 |
Data Provenance in Healthcare: Approaches, Challenges, and Future Directions | Mansoor Ahmed Amil Rohani Dar Markus Helfert Abid Khan Jungsuk Kim | 2023/7/18 | |
A Secure and Privacy Preserved Infrastructure for VANETs based on Federated Learning with Local Differential Privacy | Information Sciences | Hajra Batool Adeel Anjum Abid Khan Izzo Stefano Mazzocca Carlo | 2023/10 |
Privacy Preservation in the Internet of Vehicles using Local Differential Privacy and IOTA Ledger | Cluster Computing | Zainab Iftikhar Adeel Anjum Abid Khan Munam Ali Shah Gwanggil Joen | 2023/5 |
Decentralized Receiver-based Link Stability-aware Forwarding Scheme for NDN-based VANETS | Computer Networks | Waseeq Ul Islam Zafar Muhammad Atif Ur Rehman Farhana Jabeen Rehmat Ullah Ghulam Abbas | 2023/11/1 |
Improved angelization technique against background knowledge attack for 1:M microdata | PeerJ Computer Science | Semeen Rehman Rabeeha Fazal Razaullah Khan Adeel Anjum Madiha Haider Syed Abid Khan | 2023/3/15 |
A Comprehensive Review of Computing Paradigms, enabling Computation Offloading and Task Execution in Vehicular Networks | Abdul Waheed Munam Ali Shah Syed Muhammad Mohsin Abid Khan Carsten Maple | 2022/1/10 | |
Investigating the Influence of Yarn Density and Seam Construction on the Seam Performance of Woven Linen Fabric | Adv Res Text Eng | MW Akram SH Mahmud MA Bin Habib A Khan BV Mondal | 2022 |
Energy Theft Detection in Smart Grids: Taxonomy, Comparative Analysis, Challenges, and Future Research Directions | IEEE/CAA Journal of Automatica Sinica | Mohsin Ahmed Abid Khan Mansoor Ahmed Mouzna Tahir Gwanggil Jeon Jeon | 2022/1 |
Authorization Schemes For Internet of Things: Requirements, Attacks, Future Challenges and Trends | Abid Khan Awais Ahmad Mansoor Ahmed Jadran Sessa Marco Anisetti | 2022/10 | |
Fault-tolerant secure data aggregation schemes in smart grids: Techniques, design challenges, and future trends | Hayat Mohammad Khan Abid Khan Basheir Khan Gwanggil Jeon | 2022/12/9 | |
Deep-Confidentiality: An IoT-enabled Privacy Preserving Framework for Unstructured Big Biomedical Data | ACM Transactions on Internet Technology (TOIT) | Syed Atif Moqurrab Adeel Anjum Abid Khan Mansoor Ahmed Awais Ahmad | 2021/11/10 |
BCALS: Blockchain‐based secure log management system for cloud computing | Transactions on Emerging Telecommunications Technologies | Ahmad Ali Abid Khan Mansoor Ahmed Gwanggil Jeon | 2022/4 |
Fuzz-Classification (p, l)-Angel: An enhanced Hybrid Artificial Intelligence based Fuzzy logic for Multiple Sensitive Attributes against Privacy Breaches | Digital Communications and Networks (DCN) | Tehsin Kanwal Hasina Attaullah Adeel Anjum Abid Khan Gwanggil Jeon | 2022/10 |