default search action
Saif Ur Rehman Malik
- > Home > Persons > Saif Ur Rehman Malik
Publications
- 2023
- [j62]Hira S. Sikandar, Saif Ur Rehman Malik, Adeel Anjum, Abid Khan, Gwanggil Jeon:
Cohort-based kernel principal component analysis with Multi-path Service Routing in Federated Learning. Future Gener. Comput. Syst. 149: 518-530 (2023) - [j61]Najam U. Saqib, Saif Ur Rehman Malik, Adeel Anjum, Madiha Haider Syed, Syed Atif Moqurrab, Gautam Srivastava, Jerry Chun-Wei Lin:
Preserving Privacy in Internet of Vehicles (IoV): A Novel Group-Leader-Based Shadowing Scheme Using Blockchain. IEEE Internet Things J. 10(24): 21421-21430 (2023) - 2022
- [j59]Saif Ur Rehman Malik, Adeel Anjum, Syed Atif Moqurrab, Gautam Srivastava:
Towards enhanced threat modelling and analysis using a Markov Decision Process. Comput. Commun. 194: 282-291 (2022) - [j56]Razaullah Khan, Xiaofeng Tao, Adeel Anjum, Saif Ur Rehman Malik, Shui Yu, Abid Khan, Waheed ur Rehman, Hassan Malik:
(τ, m)-slicedBucket privacy model for sequential anonymization for improving privacy and utility. Trans. Emerg. Telecommun. Technol. 33(6) (2022) - [j55]Mazzamal Aslam, Saira Beg, Adeel Anjum, Zakria Qadir, Shawal Khan, Saif Ur Rehman Malik, M. A. Parvez Mahmud:
A strong construction of S-box using Mandelbrot set an image encryption scheme. PeerJ Comput. Sci. 8: e892 (2022) - [j54]Ayesha Shaukat, Adeel Anjum, Saif Ur Rehman Malik, Munam Ali Shah, Carsten Maple:
A Novel Privacy Paradigm for Improving Serial Data Privacy. Sensors 22(7): 2811 (2022) - [j53]Syed Atif Moqurrab, Noshina Tariq, Adeel Anjum, Alia Asheralieva, Saif Ur Rehman Malik, Hassan Malik, Haris Pervaiz, Sukhpal Singh Gill:
A Deep Learning-Based Privacy-Preserving Model for Smart Healthcare in Internet of Medical Things Using Fog Computing. Wirel. Pers. Commun. 126(3): 2379-2401 (2022) - 2021
- [j51]Saira Beg, Adeel Anjum, Mansoor Ahmed, Saif Ur Rehman Malik, Hassan Malik, Navuday Sharma, Omer Waqar:
Dynamic Parameters-Based Reversible Data Transform (RDT) Algorithm in Recommendation System. IEEE Access 9: 110011-110025 (2021) - [j50]Tehsin Kanwal, Adeel Anjum, Saif Ur Rehman Malik, Sajjad Haider, Abid Khan, Umar Manzoor, Alia Asheralieva:
A robust privacy preserving approach for electronic health records using multiple dataset with multiple sensitive attributes. Comput. Secur. 105: 102224 (2021) - [j49]Tehsin Kanwal, Adeel Anjum, Saif Ur Rehman Malik, Abid Khan, Muazzam Ali Khan Khattak:
Privacy preservation of electronic health records with adversarial attacks identification in hybrid cloud. Comput. Stand. Interfaces 78: 103522 (2021) - [j48]Hasina Attaullah, Adeel Anjum, Tehsin Kanwal, Saif Ur Rehman Malik, Alia Asheralieva, Hassan Malik, Ahmed Zoha, Kamran Arshad, Muhammad Ali Imran:
F-Classify: Fuzzy Rule Based Classification Method for Privacy Preservation of Multiple Sensitive Attributes. Sensors 21(14): 4933 (2021) - [j47]Faheem Zafar, Abid Khan, Saif Ur Rehman Malik, Mansoor Ahmed, Carsten Maple, Adeel Anjum:
MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus. Sensors 21(15): 5096 (2021) - [j44]Saeed Akbar, Saif Ur Rehman Malik, Kim-Kwang Raymond Choo, Samee U. Khan, Naveed Ahmad, Adeel Anjum:
A Game-based Thermal-Aware Resource Allocation Strategy for Data Centers. IEEE Trans. Cloud Comput. 9(3): 845-853 (2021) - 2020
- [j43]Junaid Haseeb, Naveed Ahmad, Saif Ur Rehman Malik, Adeel Anjum:
Application of formal methods to modelling and analysis aspects of business process reengineering. Bus. Process. Manag. J. 26(2): 548-569 (2020) - [j39]Iqra Fatima, Adeel Anjum, Saif Ur Rehman Malik, Naveed Ahmad:
Cyber Physical Systems and IoT: Architectural Practices, Interoperability, and Transformation. IT Prof. 22(3): 46-54 (2020) - [j38]Razaullah Khan, Xiaofeng Tao, Adeel Anjum, Sajjad Haider, Saif Ur Rehman Malik, Abid Khan, Fatemeh Amiri:
Privacy Preserving for Multiple Sensitive Attributes against Fingerprint Correlation Attack Satisfying c-Diversity. Wirel. Commun. Mob. Comput. 2020: 8416823:1-8416823:18 (2020) - [i1]Faheem Zafar, Abid Khan, Saif Ur Rehman Malik, Adeel Anjum, Mansoor Ahmed:
MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus. CoRR abs/2011.08538 (2020) - 2019
- [j37]Malik Najmus Saqib, Junaid Kiani, Basit Shahzad, Adeel Anjum, Saif Ur Rehman Malik, Naveed Ahmad, Atta ur Rehman Khan:
Anonymous and formally verified dual signature based online e-voting protocol. Clust. Comput. 22(Suppl 1): 1703-1716 (2019) - [j35]Sajjad Haider, Tehsin Kanwal, Adeel Anjum, Saif Ur Rehman Malik, Ahmed Khan, Abid Khan, Umar Manzoor:
An efficient privacy preserving protocol for dynamic continuous data collection. Comput. Secur. 86: 358-371 (2019) - [j33]Muhammad Waqas, Saif Ur Rehman Malik, Saeed Akbar, Adeel Anjum, Naveed Ahmad:
Convergence time analysis of OSPF routing protocol using social network metrics. Future Gener. Comput. Syst. 94: 62-71 (2019) - [j32]Tehsin Kanwal, Ather Abdul Jabbar, Adeel Anjum, Saif Ur Rehman Malik, Abid Khan, Naveed Ahmad, Umar Manzoor, Muhammad Naeem Shehzad, Muhammad A. Balubaid:
Privacy-aware relationship semantics-based XACML access control model for electronic health records in hybrid cloud. Int. J. Distributed Sens. Networks 15(6) (2019) - [j31]Tehsin Kanwal, Sayed Ali Asjad Shaukat, Adeel Anjum, Saif Ur Rehman Malik, Kim-Kwang Raymond Choo, Abid Khan, Naveed Ahmad, Mansoor Ahmad, Samee U. Khan:
Privacy-preserving model and generalization correlation attacks for 1: M data with multiple sensitive attributes. Inf. Sci. 488: 238-256 (2019) - 2018
- [j30]Sunnia Amjad, Naveed Ahmad, Tanzila Saba, Adeel Anjum, Umar Manzoor, Muhammad A. Balubaid, Saif Ur Rehman Malik:
Calculating Completeness of Agile Scope in Scaled Agile Development. IEEE Access 6: 5822-5847 (2018) - [j28]Saba Yaseen, Syed M. Ali Abbas, Adeel Anjum, Tanzila Saba, Abid Khan, Saif Ur Rehman Malik, Naveed Ahmad, Basit Shahzad, Ali Kashif Bashir:
Improved Generalization for Secure Data Publishing. IEEE Access 6: 27156-27165 (2018) - [j27]Adeel Anjum, Saif Ur Rehman Malik, Kim-Kwang Raymond Choo, Abid Khan, Asma Haroon, Sangeen Khan, Samee U. Khan, Naveed Ahmad, Basit Raza:
An efficient privacy mechanism for electronic health records. Comput. Secur. 72: 196-211 (2018) - [j26]Basharat Mahmood, Naveed Ahmad, Saif Ur Rehman Malik, Adeel Anjum, Saif ul Islam:
Power-efficient scheduling of parallel real-time tasks on performance asymmetric multicore processors. Sustain. Comput. Informatics Syst. 17: 81-95 (2018) - [j25]Rahmat Ullah, Naveed Ahmad, Saif Ur Rehman Malik, Saeed Akbar, Adeel Anjum:
Simulator for modeling, analysis, and visualizations of thermal status in data centers. Sustain. Comput. Informatics Syst. 19: 324-340 (2018) - [j24]Adeel Anjum, Naveed Ahmad, Saif Ur Rehman Malik, Samiya Zubair, Basit Shahzad:
An efficient approach for publishing microdata for multiple sensitive attributes. J. Supercomput. 74(10): 5127-5155 (2018) - 2017
- [j22]Behjat Zuhaira, Naveed Ahmad, Tanzila Saba, Junaid Haseeb, Saif Ur Rehman Malik, Umar Manzoor, Muhammad A. Balubaid, Adeel Anjum:
Identifying Deviations in Software Processes. IEEE Access 5: 20319-20332 (2017) - [j19]Faheem Zafar, Abid Khan, Saif Ur Rehman Malik, Mansoor Ahmed, Adeel Anjum, Majid Iqbal Khan, Nadeem Javed, Masoom Alam, Fuzel Jamil:
A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends. Comput. Secur. 65: 29-49 (2017) - [j18]Adeel Anjum, Guillaume Raschia, Marc Gelgon, Abid Khan, Saif Ur Rehman Malik, Naveed Ahmad, Mansoor Ahmed, Sabah Suhail, Masoom Alam:
τ-safety: A privacy model for sequential publication with arbitrary updates. Comput. Secur. 66: 20-39 (2017) - [j14]Masoom Alam, Saif Ur Rehman Malik, Qaisar Javed, Abid Khan, Shamaila Bisma Khan, Adeel Anjum, Nadeem Javed, Adnan Akhunzada, Muhammad Khurram Khan:
Formal modeling and verification of security controls for multimedia systems in the cloud. Multim. Tools Appl. 76(21): 22845-22870 (2017)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-21 23:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint