default search action
Abdullah Ayub Khan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j24]Faisal Mehmood, Abdullah Ayub Khan, Han Wang, Shahid Karim, Umara Khalid, Feng Zhao:
BLPCA-ledger: A lightweight plenum consensus protocols for consortium blockchain based on the hyperledger indy. Comput. Stand. Interfaces 91: 103876 (2025) - 2024
- [j23]Shahid Karim, Geng Tong, Yiting Yu, Asif Ali Laghari, Abdullah Ayub Khan, Muhammad Ibrar, Faisal Mehmood:
Developments in Brain Tumor Segmentation Using MRI: Deep Learning Insights and Future Perspectives. IEEE Access 12: 26875-26896 (2024) - [j22]Abdullah Ayub Khan, Asif Ali Laghari, Roobaea Alroobaea, Abdullah M. Baqasah, Majed Alsafyani, Rex Bacarra, Jamil Abedalrahim Jamil Alsayaydeh:
Secure Remote Sensing Data With Blockchain Distributed Ledger Technology: A Solution for Smart Cities. IEEE Access 12: 69383-69396 (2024) - [j21]Abdullah Ayub Khan, Sami Dhabi, Jing Yang, Wajdi Alhakami, Sami Bourouis, Lip Yee Por:
B-LPoET: A middleware lightweight Proof-of-Elapsed Time (PoET) for efficient distributed transaction execution and security on Blockchain using multithreading technology. Comput. Electr. Eng. 118: 109343 (2024) - [j20]Jiale Xiong, Jing Yang, Lei Yan, Muhammad Awais, Abdullah Ayub Khan, Roohallah Alizadehsani, U. Rajendra Acharya:
Efficient reinforcement learning-based method for plagiarism detection boosted by a population-based algorithm for pretraining weights. Expert Syst. Appl. 238(Part E): 122088 (2024) - [j19]Jing Yang, Mohammad Shokouhifar, Lip Yee Por, Abdullah Ayub Khan, Muhammad Awais, Zohreh Mousavi:
DT2F-TLNet: A novel text-independent writer identification and verification model using a combination of deep type-2 fuzzy architecture and Transfer Learning networks based on handwriting data. Expert Syst. Appl. 242: 122704 (2024) - [j18]Muhammad Saad Chughtai, Irfana Bibi, Shahid Karim, Syed Wajid Ali Shah, Asif Ali Laghari, Abdullah Ayub Khan:
Deep learning trends and future perspectives of web security and vulnerabilities. J. High Speed Networks 30(1): 115-146 (2024) - [j17]Abdullah Ayub Khan, Asif Ali Laghari, Abdullah M. Baqasah, Roobaea Alroobaea, Ahmad S. Almadhor, Gabriel Avelino R. Sampedro, Natalia Kryvinska:
Blockchain-enabled infrastructural security solution for serverless consortium fog and edge computing. PeerJ Comput. Sci. 10: e1933 (2024) - [j16]Abdullah Ayub Khan, Asif Ali Laghari, Abdullah M. Baqasah, Roobaea Alroobaea, Thippa Reddy Gadekallu, Gabriel Avelino R. Sampedro, Yaodong Zhu:
ORAN-B5G: A Next-Generation Open Radio Access Network Architecture With Machine Learning for Beyond 5G in Industrial 5.0. IEEE Trans. Green Commun. Netw. 8(3): 1026-1036 (2024) - 2023
- [j15]Mohammad Asad Abbasi, Yen-Lin Chen, Abdullah Ayub Khan, Zulfiqar A. Memon, Nouman M. Durrani, Jing Yang, Chin Soon Ku, Lip Yee Por:
Enabling IoT Service Classification: A Machine Learning-Based Approach for Handling Classification Issues in Heterogeneous IoT Services. IEEE Access 11: 89024-89037 (2023) - [j14]Abdullah Ayub Khan, Aftab Ahmed Shaikh, Asif Ali Laghari, Muhammad Malook Rind:
Cloud forensics and digital ledger investigation: a new era of forensics investigation. Int. J. Electron. Secur. Digit. Forensics 15(1): 1-23 (2023) - [j13]Aftab Ahmed Shaikh, Abdullah Ayub Khan:
Management of electronic ledger: a constraint programming approach for solving curricula scheduling problems. Int. J. Electron. Secur. Digit. Forensics 15(1): 88-99 (2023) - [j12]Muhammad Ameen Chhajro, Asharib Ahmed, Muhammad Ahmed Raza, Abdullah Ayub Khan, Asif Ali Wagan, Asif Ali Laghari:
A survey on electronic natural language applications: current challenges and limitations. Int. J. Electron. Secur. Digit. Forensics 15(2): 211-223 (2023) - [j11]Danella Patrick, Abdullah Ayub Khan, Fayyaz Ali, Irfan Ali Kandhro, Mahnoor Anwar, Asadullah Kehar, Anwar Ali Sanjrani:
A novel comparison of data analytics and business intelligence tools: an information preservation and ledger management solution. Int. J. Electron. Secur. Digit. Forensics 15(4): 387-412 (2023) - [j10]Abdullah Ayub Khan, Asif Ali Laghari, Anil Kumar, Zaffar Ahmed Shaikh, Umair Baig, Abdul Ahad Abro:
Cloud forensics-enabled chain of custody: a novel and secure modular architecture using Blockchain Hyperledger Sawtooth. Int. J. Electron. Secur. Digit. Forensics 15(4): 413-423 (2023) - [j9]Asif Ali Laghari, Hang Li, Shoulin Yin, Shahid Karim, Abdullah Ayub Khan, Muhammad Ibrar:
Blockchain applications for Internet of Things (IoT): A review. Multiagent Grid Syst. 19(4): 363-379 (2023) - 2022
- [j8]Abdullah Ayub Khan, Asif Ali Wagan, Asif Ali Laghari, Abdul Rehman Gilal, Izzatdin Abdul Aziz, Bandeh Ali Talpur:
BIoMT: A State-of-the-Art Consortium Serverless Network Architecture for Healthcare System Using Blockchain Smart Contracts. IEEE Access 10: 78887-78898 (2022) - [j7]Abdullah Ayub Khan, Asif Ali Laghari, Zaffar Ahmed Shaikh, Zdzislawa Dacko-Pikiewicz, Sebastian Kot:
Internet of Things (IoT) Security With Blockchain Technology: A State-of-the-Art Review. IEEE Access 10: 122679-122695 (2022) - [j6]Abdullah Ayub Khan, Aftab Ahmed Shaikh, Omar Cheikhrouhou, Asif Ali Laghari, Mamoon Rashid, Muhammad Shafiq, Habib Hamam:
IMG-forensics: Multimedia-enabled information hiding investigation using convolutional neural network. IET Image Process. 16(11): 2854-2862 (2022) - [j5]Abdullah Ayub Khan, Aftab Ahmed Shaikh, Asif Ali Laghari, Mazhar Ali Dootio, Muhammad Malook Rind, Shafique Ahmed Awan:
Digital forensics and cyber forensics investigation: security challenges, limitations, open issues, and future direction. Int. J. Electron. Secur. Digit. Forensics 14(2): 124-150 (2022) - [j4]Abdullah Ayub Khan, Aftab Ahmed Shaikh, Zaffar Ahmed Shaikh, Asif Ali Laghari, Shahid Karim:
IPM-Model: AI and metaheuristic-enabled face recognition using image partial matching for multimedia forensics investigation with genetic algorithm. Multim. Tools Appl. 81(17): 23533-23549 (2022) - 2021
- [j3]Abdullah Ayub Khan, Mueen Uddin, Aftab Ahmed Shaikh, Asif Ali Laghari, Adil E. Rajput:
MF-Ledger: Blockchain Hyperledger Sawtooth-Enabled Novel and Secure Multimedia Chain of Custody Forensic Investigation Architecture. IEEE Access 9: 103637-103650 (2021) - [j2]Abdullah Ayub Khan, Syed Asif Ali:
Network forensics investigation: behaviour analysis of distinct operating systems to detect and identify the host in IPv6 network. Int. J. Electron. Secur. Digit. Forensics 13(6): 600-611 (2021) - [j1]Abdullah Ayub Khan, Asif Ali Laghari, Shafique Ahmed Awan:
Machine Learning in Computer Vision: A Review. EAI Endorsed Trans. Scalable Inf. Syst. 8(32): e4 (2021)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint