default search action
Muhammad Khurram Khan
Person information
- affiliation: King Saud University, Center of Excellence in Information Assurance, Riyadh, Saudi Arabia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j384]Praneetha Surapaneni, Sriramulu Bojjagani, V. C. Bharathi, Mahesh Kumar Morampudi, Anup Kumar Maurya, Muhammad Khurram Khan:
A Systematic Review on Blockchain-Enabled Internet of Vehicles (BIoV): Challenges, Defenses, and Future Research Directions. IEEE Access 12: 123529-123560 (2024) - [j383]Xingxia Wang, Jing Yang, Yuhang Liu, Yutong Wang, Fei-Yue Wang, Mengzhen Kang, Yonglin Tian, Imre J. Rudas, Lingxi Li, Maria Pia Fanti, Bassam Alrifaee, Muhammet Deveci, Deepak Mishra, Muhammad Khurram Khan, Long Chen, Philippe de Reffye:
Parallel intelligence in three decades: a historical review and future perspective on ACP and cyber-physical-social systems. Artif. Intell. Rev. 57(9): 255 (2024) - [j382]Junpeng He, Lingfeng Yao, Xiong Li, Muhammad Khurram Khan, Weina Niu, Xiaosong Zhang, Fagen Li:
Model-agnostic generation-enhanced technology for few-shot intrusion detection. Appl. Intell. 54(4): 3181-3204 (2024) - [j381]Rashad Elhabob, Mazin Taha, Hu Xiong, Muhammad Khurram Khan, Saru Kumari, Pradeep Chaudhary:
Pairing-free certificateless public key encryption with equality test for Internet of Vehicles. Comput. Electr. Eng. 116: 109140 (2024) - [j380]Hareem Kibriya, Ayesha Siddiqa, Wazir Zada Khan, Muhammad Khurram Khan:
Towards safer online communities: Deep learning and explainable AI for hate speech detection and classification. Comput. Electr. Eng. 116: 109153 (2024) - [j379]Reem Alrawili, Ali Abdullah S. AlQahtani, Muhammad Khurram Khan:
Comprehensive survey: Biometric user authentication application, evaluation, and discussion. Comput. Electr. Eng. 119: 109485 (2024) - [j378]Muhammad Adil, Muhammad Khurram Khan, Ahmed Farouk, Mian Ahmad Jan, Adnan Anwar, Zhanpeng Jin:
AI-Driven EEC for Healthcare IoT: Security Challenges and Future Research Directions. IEEE Consumer Electron. Mag. 13(1): 39-47 (2024) - [j377]Sibi Chakkaravarthy Sethuraman, Devi Priya V. S, Tarun Reddi, Mulka Sai Tharun Reddy, Muhammad Khurram Khan:
A comprehensive examination of email spoofing: Issues and prospects for email security. Comput. Secur. 137: 103600 (2024) - [j376]Yanlu Li, Yufeng Xiao, Wei Liang, Jiahong Cai, Ronglin Zhang, Kuan-Ching Li, Muhammad Khurram Khan:
The security and privacy challenges toward cybersecurity of 6G networks: A comprehensive review. Comput. Sci. Inf. Syst. 21(3): 851-897 (2024) - [j375]Nauman Khan, Zahid Khan, Anis Koubaa, Muhammad Khurram Khan, Rosli Bin Salleh:
Global insights and the impact of generative AI-ChatGPT on multidisciplinary: a systematic review and bibliometric analysis. Connect. Sci. 36(1) (2024) - [j374]Muhammad Adil, Houbing Song, Mian Ahmad Jan, Muhammad Khurram Khan, Xiangjian He, Ahmed Farouk, Zhanpeng Jin:
UAV-Assisted IoT Applications, QoS Requirements and Challenges with Future Research Directions. ACM Comput. Surv. 56(10): 251 (2024) - [j373]Sathish Kumar, Velliangiri Sarveshwaran, Periyasami Karthikeyan, Saru Kumari, Sachin Kumar, Muhammad Khurram Khan:
A survey on the blockchain techniques for the Internet of Vehicles security. Trans. Emerg. Telecommun. Technol. 35(4) (2024) - [j372]Giuseppe Varone, Wadii Boulila, Maha Driss, Saru Kumari, Muhammad Khurram Khan, Thippa Reddy Gadekallu, Amir Hussain:
Finger pinching and imagination classification: A fusion of CNN architectures for IoMT-enabled BCI applications. Inf. Fusion 101: 102006 (2024) - [j371]Ayesha Siddiqa, Wazir Zada Khan, Monagi H. Alkinani, Eman Aldhahri, Muhammad Khurram Khan:
Edge-assisted federated learning framework for smart crowd management. Internet Things 27: 101253 (2024) - [j370]Chien-Ming Chen, Qingkai Miao, Saru Kumari, Muhammad Khurram Khan, Joel J. P. C. Rodrigues:
A Privacy-Preserving Authentication Protocol for Electric Vehicle Battery Swapping Based on Intelligent Blockchain. IEEE Internet Things J. 11(10): 17538-17551 (2024) - [j369]Muhammad Adil, Muhammad Khurram Khan, Neeraj Kumar, Muhammad Attique, Ahmed Farouk, Mohsen Guizani, Zhanpeng Jin:
Healthcare Internet of Things: Security Threats, Challenges, and Future Research Directions. IEEE Internet Things J. 11(11): 19046-19069 (2024) - [j368]Chien-Ming Chen, Zhaoting Chen, Saru Kumari, Mohammad S. Obaidat, Joel J. P. C. Rodrigues, Muhammad Khurram Khan:
Blockchain-Based Mutual Authentication Protocol for IoT-Enabled Decentralized Healthcare Environment. IEEE Internet Things J. 11(14): 25394-25412 (2024) - [j367]Sana Nasim Karam, Kashif Bilal, Junaid Shuja, Latif U. Khan, Muhammad Bilal, Muhammad Khurram Khan:
Intelligent IoT- and UAV-Assisted Architecture for Pipeline Monitoring in OGI. IT Prof. 26(3): 46-54 (2024) - [j366]Mohamad-Hani Temsah, Abdullah N. Alhuzaimi, Mohammed Almansour, Fadi Aljamaan, Khalid Alhasan, Munirah A. Batarfi, Ibraheem Altamimi, Amani Alharbi, Adel Abdulaziz Alsuhaibani, Leena Alwakeel, Abdulrahman Abdulkhaliq Alzahrani, Khaled B. Alsulaim, Amr Jamal, Afnan Khayat, Mohammed Hussien Alghamdi, Rabih Halwani, Muhammad Khurram Khan, Ayman Al-Eyadhy, Rakan Nazer:
Art or Artifact: Evaluating the Accuracy, Appeal, and Educational Value of AI-Generated Imagery in DALL·E 3 for Illustrating Congenital Heart Diseases. J. Medical Syst. 48(1): 54 (2024) - [j365]Ruijin Wang, Jinshan Lai, Xiong Li, Donglin He, Muhammad Khurram Khan:
RPIFL: Reliable and Privacy-Preserving Federated Learning for the Internet of Things. J. Netw. Comput. Appl. 221: 103768 (2024) - [j364]Muhammad Adil, Houbing Song, Muhammad Khurram Khan, Ahmed Farouk, Zhanpeng Jin:
5G/6G-enabled metaverse technologies: Taxonomy, applications, and open security challenges with future research directions. J. Netw. Comput. Appl. 223: 103828 (2024) - [j363]Dipanwita Sadhukhan, Sangram Ray, Mou Dasgupta, Muhammad Khurram Khan:
Development of a provably secure and privacy-preserving lightweight authentication scheme for roaming services in global mobility network. J. Netw. Comput. Appl. 224: 103831 (2024) - [j362]Ehzaz Mustafa, Junaid Shuja, Faisal Rehman, Ahsan Riaz, Mohammed Maray, Muhammad Bilal, Muhammad Khurram Khan:
Deep Neural Networks meet computation offloading in mobile edge networks: Applications, taxonomy, and open issues. J. Netw. Comput. Appl. 226: 103886 (2024) - [j361]Hongyan Liu, Xi Sun, Xiang Chen, Qun Huang, Dong Zhang, Haifeng Zhou, Chunming Wu, Xuan Liu, Muhammad Khurram Khan:
Terra: Low-latency and reliable event collection in network measurement. J. Netw. Comput. Appl. 228: 103904 (2024) - [j360]Diana Hawashin, Mohamed Nemer, Senay A. Gebreab, Khaled Salah, Raja Jayaraman, Muhammad Khurram Khan, Ernesto Damiani:
Blockchain applications in UAV industry: Review, opportunities, and challenges. J. Netw. Comput. Appl. 230: 103932 (2024) - [j359]Jitesh Pradhan, Ashish Singh, Abhinav Kumar, Muhammad Khurram Khan:
Skin lesion classification using modified deep and multi-directional invariant handcrafted features. J. Netw. Comput. Appl. 231: 103949 (2024) - [j358]Ruijin Wang, Jinbo Wang, Xiong Li, Jinshan Lai, Fengli Zhang, Xikai Pei, Muhammad Khurram Khan:
CESA: Communication efficient secure aggregation scheme via sparse graph in federated learning. J. Netw. Comput. Appl. 231: 103997 (2024) - [j357]Sanjeev Kumar Dwivedi, Mohammad Abdussami, Ruhul Amin, Muhammad Khurram Khan:
D³APTS: Design of ECC-Based Authentication Protocol and Data Storage for Tactile Internet Enabled IoD System With Blockchain. IEEE Trans. Consumer Electron. 70(1): 4239-4248 (2024) - [j356]Wajiha Shahid, Bahman Jamshidi, Saqib Hakak, Haruna Isah, Wazir Zada Khan, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
Detecting and Mitigating the Dissemination of Fake News: Challenges and Future Research Opportunities. IEEE Trans. Comput. Soc. Syst. 11(4): 4649-4662 (2024) - [j355]Zhengyan Zhou, Hanze Chen, Lingfei Chen, Dong Zhang, Chunming Wu, Xuan Liu, Muhammad Khurram Khan:
NetDP: In-Network Differential Privacy for Large-Scale Data Processing. IEEE Trans. Green Commun. Netw. 8(3): 1076-1089 (2024) - [j354]Jiachen Yang, Houbing Song, Muhammad Khurram Khan:
Guest Editorial XAI Based Biomedical Big Data Privacy and Security. IEEE J. Biomed. Health Informatics 28(6): 3203-3205 (2024) - [j353]Yu Wang, Wenfang Zhang, Xiaomin Wang, Muhammad Khurram Khan, Pingzhi Fan:
Security Enhanced Authentication Protocol for Space-Ground Integrated Railway Networks. IEEE Trans. Intell. Transp. Syst. 25(1): 370-385 (2024) - [j352]Hong Qin, Debiao He, Qi Feng, Muhammad Khurram Khan, Min Luo, Kim-Kwang Raymond Choo:
Cryptographic Primitives in Privacy-Preserving Machine Learning: A Survey. IEEE Trans. Knowl. Data Eng. 36(5): 1919-1934 (2024) - [j351]Junqin Huang, Linghe Kong, Jingwei Wang, Guihai Chen, Jianhua Gao, Gang Huang, Muhammad Khurram Khan:
Secure Data Sharing over Vehicular Networks Based on Multi-sharding Blockchain. ACM Trans. Sens. Networks 20(2): 31:1-31:23 (2024) - [j350]Xiangwei Meng, Wei Liang, Zisang Xu, Kuanching Li, Muhammad Khurram Khan, Xiaoyan Kui:
An Anonymous Authenticated Group Key Agreement Scheme for Transfer Learning Edge Services Systems. ACM Trans. Sens. Networks 20(3): 75:1-75:23 (2024) - [j349]Praneetha Surapaneni, Sriramulu Bojjagani, Muhammad Khurram Khan:
VESecure: Verifiable authentication and efficient key exchange for secure intelligent transport systems deployment. Veh. Commun. 49: 100822 (2024) - [i6]Saif Al-Dean Qawasmeh, Ali Abdullah S. AlQahtani, Muhammad Khurram Khan:
Navigating Cybersecurity Training: A Comprehensive Review. CoRR abs/2401.11326 (2024) - 2023
- [j348]Tengfei Wu, Lu Leng, Muhammad Khurram Khan:
A multi-spectral palmprint fuzzy commitment based on deep hashing code with discriminative bit selection. Artif. Intell. Rev. 56(7): 6169-6186 (2023) - [j347]Chinmay Chakraborty, Muhammad Khurram Khan:
Big Data-Driven Futuristic Fabric System in Societal Digital Transformation. Big Data 11(5): 321-322 (2023) - [j346]Wazir Zada Khan, Muhammad Khurram Khan, Qurat-ul-Ain Arshad:
Cybersecurity Digital Labels for Connected and Autonomous Vehicles. IEEE Consumer Electron. Mag. 12(1): 87-93 (2023) - [j345]Anay Ghosh, Saiyed Umer, Muhammad Khurram Khan, Ranjeet Kumar Rout, Bibhas Chandra Dhara:
Smart sentiment analysis system for pain detection using cutting edge techniques in a smart healthcare framework. Clust. Comput. 26(1): 119-135 (2023) - [j344]Uddalak Chatterjee, Sangram Ray, Sharmistha Adhikari, Muhammad Khurram Khan, Mou Dasgupta:
An improved authentication and key management scheme in context of IoT-based wireless sensor network using ECC. Comput. Commun. 209: 47-62 (2023) - [j343]Wenfang Zhang, Heng Jiao, Zhuoqun Yan, Xiaomin Wang, Muhammad Khurram Khan:
Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing. Comput. Secur. 125: 103019 (2023) - [j342]Devi Priya V. S, Sibi Chakkaravarthy Sethuraman, Muhammad Khurram Khan:
Container security: Precaution levels, mitigation strategies, and research perspectives. Comput. Secur. 135: 103490 (2023) - [j341]Suleman Khan, Muhammad Khurram Khan, Rizwan Khan:
Harnessing intelligent technologies to curb COVID-19 pandemic: taxonomy and open challenges. Computing 105(4): 811-830 (2023) - [j340]Somayeh Samsamian, Aliakbar Hasani, Saqib Hakak, Fatemeh Esmaeilnezhad Tanha, Muhammad Khurram Khan:
Comprehensive risk assessment and analysis of blockchain technology implementation using fuzzy cognitive mapping. Comput. Sci. Inf. Syst. 20(3): 977-996 (2023) - [j339]Xiang Chen, Chunming Wu, Xuan Liu, Qun Huang, Dong Zhang, Haifeng Zhou, Qiang Yang, Muhammad Khurram Khan:
Empowering Network Security With Programmable Switches: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 25(3): 1653-1704 (2023) - [j338]Linghe Kong, Jinlin Tan, Junqin Huang, Guihai Chen, Shuaitian Wang, Xi Jin, Peng Zeng, Muhammad Khurram Khan, Sajal K. Das:
Edge-computing-driven Internet of Things: A Survey. ACM Comput. Surv. 55(8): 174:1-174:41 (2023) - [j337]Li Chen, Ke Zhang, Saru Kumari, Muhammad Khurram Khan, Zhiying Kong, Pradeep Chaudhary:
An efficient certificateless key exchange protocol for heterogeneous networks in human-centered IoT systems. Int. J. Commun. Syst. 36(12) (2023) - [j336]Jiachen Yang, Houbing Song, Muhammad Khurram Khan:
Editor's Note. Int. J. Interact. Multim. Artif. Intell. 8(1): 4 (2023) - [j335]Xin Chen, Debiao He, Muhammad Khurram Khan, Min Luo, Cong Peng:
A Secure Certificateless Signcryption Scheme Without Pairing for Internet of Medical Things. IEEE Internet Things J. 10(10): 9136-9147 (2023) - [j334]Jiahong Cai, Wei Liang, Xiong Li, Kuan-Ching Li, Zhenwen Gui, Muhammad Khurram Khan:
GTxChain: A Secure IoT Smart Blockchain Architecture Based on Graph Neural Network. IEEE Internet Things J. 10(24): 21502-21514 (2023) - [j333]Gaurang Bansal, Vinay Chamola, Amir Hussain, Muhammad Khurram Khan:
Cracking the Anonymous IoT Routing Networks: A Deep Learning Approach. IEEE Internet Things Mag. 6(1): 120-126 (2023) - [j332]Sriramulu Bojjagani, V. N. Sastry, Chien-Ming Chen, Saru Kumari, Muhammad Khurram Khan:
Systematic survey of mobile payments, protocols, and security infrastructure. J. Ambient Intell. Humaniz. Comput. 14(1): 609-654 (2023) - [j331]Chinmay Chakraborty, Mohammad Reza Khosravi, Muhammad Khurram Khan, Houbing Herbert Song:
Editorial: Multimodality, Multidimensional Representation, and Multimedia Quality Assessment Toward Information Quality in Social Web of Things. ACM J. Data Inf. Qual. 15(3): 30:1-30:3 (2023) - [j330]Nauman Khan, Rosli Bin Salleh, Anis Koubaa, Zahid Khan, Muhammad Khurram Khan, Ihsan Ali:
Data plane failure and its recovery techniques in SDN: A systematic literature review. J. King Saud Univ. Comput. Inf. Sci. 35(3): 176-201 (2023) - [j329]Rajdeep Chatterjee, Ankita Chatterjee, SK Hafizul Islam, Muhammad Khurram Khan:
An object detection-based few-shot learning approach for multimedia quality assessment. Multim. Syst. 29(5): 2899-2912 (2023) - [j328]Ashish Singh, Adnan Gutub, Anand Nayyar, Muhammad Khurram Khan:
Redefining food safety traceability system through blockchain: findings, challenges and open issues. Multim. Tools Appl. 82(14): 21243-21277 (2023) - [j327]Uddalak Chatterjee, Sangram Ray, Sharmistha Adhikari, Muhammad Khurram Khan, Mou Dasgupta:
Efficient and secure e-voting scheme using elliptic curve cryptography. Secur. Priv. 6(3) (2023) - [j326]Yinyan Gong, Kuan-Ching Li, Lijun Xiao, Jiahong Cai, Jiahong Xiao, Wei Liang, Muhammad Khurram Khan:
VASERP: An Adaptive, Lightweight, Secure, and Efficient RFID-Based Authentication Scheme for IoV. Sensors 23(11): 5198 (2023) - [j325]Qurat-ul-Ain Arshad, Wazir Zada Khan, Faisal Azam, Muhammad Khurram Khan:
Deep-Learning-Based COVID-19 Detection: Challenges and Future Directions. IEEE Trans. Artif. Intell. 4(2): 210-228 (2023) - [j324]Alamgir Sardar, Saiyed Umer, Ranjeet Kumar Rout, Muhammad Khurram Khan:
A Secure and Efficient Biometric Template Protection Scheme for Palmprint Recognition System. IEEE Trans. Artif. Intell. 4(5): 1051-1063 (2023) - [j323]Muhammad Khurram Khan:
AI-enabled transformations in telecommunications industry. Telecommun. Syst. 82(1): 1-2 (2023) - [j322]Xiang Chen, Hongyan Liu, Qun Huang, Dong Zhang, Haifeng Zhou, Chunming Wu, Xuan Liu, Muhammad Khurram Khan:
Stalker Attacks: Imperceptibly Dropping Sketch Measurement Accuracy on Programmable Switches. IEEE Trans. Inf. Forensics Secur. 18: 5832-5847 (2023) - [j321]Ashish Singh, Abhinav Kumar, Zahid Akhtar, Muhammad Khurram Khan:
Guest Editorial: Cybersecurity Intelligence in the Healthcare System. IEEE Trans. Ind. Informatics 19(1): 809-812 (2023) - [j320]Zijian Bao, Debiao He, Muhammad Khurram Khan, Min Luo, Qi Xie:
PBidm: Privacy-Preserving Blockchain-Based Identity Management System for Industrial Internet of Things. IEEE Trans. Ind. Informatics 19(2): 1524-1534 (2023) - [j319]Minghao Cheng, Di Li, Nan Zhou, Hao Tang, Ge Wang, Shipeng Li, Uzair Aslam Bhatti, Muhammad Khurram Khan:
Vision-Motion Codesign for Low-Level Trajectory Generation in Visual Servoing Systems. IEEE Trans. Instrum. Meas. 72: 1-14 (2023) - [j318]Yongshuai Duan, Junqin Huang, Jiale Lei, Linghe Kong, Yibin Lv, Zhiliang Lin, Guihai Chen, Muhammad Khurram Khan:
AISChain: Blockchain-Based AIS Data Platform With Dynamic Bloom Filter Tree. IEEE Trans. Intell. Transp. Syst. 24(2): 2332-2343 (2023) - [j317]Khalid Mahmood, Salman Shamshad, Muhammad Faizan Ayub, Zahid Ghaffar, Muhammad Khurram Khan, Ashok Kumar Das:
Design of Provably Secure Authentication Protocol for Edge-Centric Maritime Transportation System. IEEE Trans. Intell. Transp. Syst. 24(12): 14536-14545 (2023) - [j316]Yulin Liu, Debiao He, Zijian Bao, Huaqun Wang, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
An Efficient Multilayered Linkable Ring Signature Scheme With Logarithmic Size for Anonymous Payment in Vehicle-to-Grid Networks. IEEE Trans. Intell. Veh. 8(4): 2998-3011 (2023) - [j315]Zahid Ghaffar, Salman Shamshad, Khalid Mahmood, Mohammad S. Obaidat, Saru Kumari, Muhammad Khurram Khan:
A Lightweight and Efficient Remote Data Authentication Protocol Over Cloud Storage Environment. IEEE Trans. Netw. Sci. Eng. 10(1): 103-112 (2023) - [j314]Muhammad Adil, Muhammad Khurram Khan, Muhammad Mohsin Jadoon, Muhammad Attique, Houbing Song, Ahmed Farouk:
An AI-Enabled Hybrid Lightweight Authentication Scheme for Intelligent IoMT Based Cyber-Physical Systems. IEEE Trans. Netw. Sci. Eng. 10(5): 2719-2730 (2023) - [j313]Sanjeev Kumar Dwivedi, Ruhul Amin, Satyanarayana Vollala, Muhammad Khurram Khan:
B-HAS: Blockchain-Assisted Efficient Handover Authentication and Secure Communication Protocol in VANETs. IEEE Trans. Netw. Sci. Eng. 10(6): 3491-3504 (2023) - [j312]Xiaotong Zhou, Debiao He, Muhammad Khurram Khan, Wei Wu, Kim-Kwang Raymond Choo:
An Efficient Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for VANETs. IEEE Trans. Veh. Technol. 72(1): 81-92 (2023) - [e9]Yuan Tian, Tinghuai Ma, Qingshan Jiang, Qi Liu, Muhammad Khurram Khan:
Big Data and Security - 4th International Conference, ICBDS 2022, Xiamen, China, December 8-12, 2022, Proceedings. Communications in Computer and Information Science 1796, Springer 2023, ISBN 978-981-99-3299-3 [contents] - [i5]Muhammad Adil, Houbing Song, Muhammad Khurram Khan, Ahmed Farouk, Zhanpeng Jin:
5G/6G-Enabled Metaverse Technologies: Taxonomy, Applications, and Open Security Challenges with Future Research Directions. CoRR abs/2305.16473 (2023) - [i4]Reem Alrawili, Ali Abdullah S. AlQahtani, Muhammad Khurram Khan:
Comprehensive Survey: Biometric User Authentication Application, Evaluation, and Discussion. CoRR abs/2311.13416 (2023) - 2022
- [j311]Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das, Sachin Shetty, Muhammad Khurram Khan, Joel J. P. C. Rodrigues:
ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things. IEEE Access 10: 57990-58004 (2022) - [j310]Shidrokh Goudarzi, Seyed Ahmad Soleymani, Mohammad Hossein Anisi, Mohammad Abdollahi Azgomi, Zeinab Movahedi, Nazri Kama, Hazlifah Mohd Rusli, Muhammad Khurram Khan:
A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled VANET. Ad Hoc Networks 128: 102782 (2022) - [j309]Chinmay Chakraborty, Muhammad Khurram Khan, Ishfaq Ahmad:
Call for Special Issue Papers: Big Data-Driven Futuristic Fabric System in Societal Digital Transformation: Deadline for Manuscript Submission: March 31, 2022. Big Data 10(1): 81-82 (2022) - [j308]Uddalak Chatterjee, Sangram Ray, Muhammad Khurram Khan, Mou Dasgupta, Chien-Ming Chen:
An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing. Computing 104(6): 1359-1395 (2022) - [j307]Sajid Hussain, Khalid Mahmood, Muhammad Khurram Khan, Chien-Ming Chen, Bander A. Alzahrani, Shehzad Ashraf Chaudhry:
Designing secure and lightweight user access to drone for smart city surveillance. Comput. Stand. Interfaces 80: 103566 (2022) - [j306]Basudeb Bera, Anusha Vangala, Ashok Kumar Das, Pascal Lorenz, Muhammad Khurram Khan:
Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment. Comput. Stand. Interfaces 80: 103567 (2022) - [j305]Suman Majumder, Sangram Ray, Dipanwita Sadhukhan, Muhammad Khurram Khan, Mou Dasgupta:
ESOTP: ECC-based secure object tracking protocol for IoT communication. Int. J. Commun. Syst. 35(3) (2022) - [j304]Awais Manzoor, Munam Ali Shah, Hasan Ali Khattak, Ikram Ud Din, Muhammad Khurram Khan:
Multi-tier authentication schemes for fog computing: Architecture, security perspective, and challenges. Int. J. Commun. Syst. 35(12) (2022) - [j303]Christos Xenofontos, Ioannis Zografopoulos, Charalambos Konstantinou, Alireza Jolfaei, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
Consumer, Commercial, and Industrial IoT (In)Security: Attack Taxonomy and Case Studies. IEEE Internet Things J. 9(1): 199-221 (2022) - [j302]Cong Peng, Min Luo, Huaqun Wang, Muhammad Khurram Khan, Debiao He:
An Efficient Privacy-Preserving Aggregation Scheme for Multidimensional Data in IoT. IEEE Internet Things J. 9(1): 589-600 (2022) - [j301]Muhammad Usman Younus, Muhammad Khurram Khan, Abdul Rauf Bhatti:
Improving the Software-Defined Wireless Sensor Networks Routing Performance Using Reinforcement Learning. IEEE Internet Things J. 9(5): 3495-3508 (2022) - [j300]Zeeshan Siddiqui, Jiechao Gao, Muhammad Khurram Khan:
An Improved Lightweight PUF-PKI Digital Certificate Authentication Scheme for the Internet of Things. IEEE Internet Things J. 9(20): 19744-19756 (2022) - [j299]Xingbo Dong, Muhammad Khurram Khan, Lu Leng, Andrew Beng Jin Teoh:
Co-Learning to Hash Palm Biometrics for Flexible IoT Deployment. IEEE Internet Things J. 9(23): 23786-23794 (2022) - [j298]Yifan Wang, Xiaoying Jia, Yongbo Xia, Muhammad Khurram Khan, Debiao He:
A blockchain-based conditional privacy-preserving authentication scheme for edge computing services. J. Inf. Secur. Appl. 70: 103334 (2022) - [j297]Muhammad Adil, Muhammad Khurram Khan, Mona Jamjoom, Ahmed Farouk:
MHADBOR: AI-Enabled Administrative-Distance-Based Opportunistic Load Balancing Scheme for an Agriculture Internet of Things Network. IEEE Micro 42(1): 41-50 (2022) - [j296]Sumit Kumar, Jitesh Pradhan, Arup Kumar Pal, SK Hafizul Islam, Muhammad Khurram Khan:
Radiological image retrieval technique using multi-resolution texture and shape features. Multim. Tools Appl. 81(10): 13633-13660 (2022) - [j295]Mukul Majhi, Arup Kumar Pal, Jitesh Pradhan, SK Hafizul Islam, Muhammad Khurram Khan:
Computational intelligence based secure three-party CBIR scheme for medical data for cloud-assisted healthcare applications. Multim. Tools Appl. 81(29): 41545-41577 (2022) - [j294]Muhammad Khurram Khan:
Technology and telecommunications: a panacea in the COVID-19 crisis. Telecommun. Syst. 79(1): 1-2 (2022) - [j293]Imran Razzak, Guandong Xu, Muhammad Khurram Khan:
Guest Editorial: Privacy-Preserving Federated Machine Learning Solutions for Enhanced Security of Critical Energy Infrastructures. IEEE Trans. Ind. Informatics 18(5): 3449-3451 (2022) - [j292]Aman Ahmad Ansari, Bharavi Mishra, Poonam Gera, Muhammad Khurram Khan, Chinmay Chakraborty, Dheerendra Mishra:
Privacy-Enabling Framework for Cloud-Assisted Digital Healthcare Industry. IEEE Trans. Ind. Informatics 18(11): 8316-8325 (2022) - [j291]Xiong Li, Shanpeng Liu, Rongxing Lu, Muhammad Khurram Khan, Ke Gu, Xiaosong Zhang:
An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based Medical Storage System. IEEE J. Biomed. Health Informatics 26(5): 2020-2031 (2022) - [j290]Yu Wang, Wenfang Zhang, Xiaomin Wang, Wei Guo, Muhammad Khurram Khan, Pingzhi Fan:
Improving the Security of LTE-R for High-Speed Railway: From the Access Authentication View. IEEE Trans. Intell. Transp. Syst. 23(2): 1332-1346 (2022) - [j289]Abdelouahid Derhab, Mohamed Belaoued, Irfan Mohiuddin, Fajri Kurniawan, Muhammad Khurram Khan:
Histogram-Based Intrusion Detection and Filtering Framework for Secure and Safe In-Vehicle Networks. IEEE Trans. Intell. Transp. Syst. 23(3): 2366-2379 (2022) - [j288]Jiale Lei, Junqin Huang, Linghe Kong, Guihai Chen, Muhammad Khurram Khan:
DeFLoc: Deep Learning Assisted Indoor Vehicle Localization Atop FM Fingerprint Map. IEEE Trans. Intell. Transp. Syst. 23(10): 19795-19806 (2022) - [j287]