default search action
Assad Abbas
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Amber Murtaza, Abdul Rehman, Saif Ur Rehman Malik, Gouher Ahmed, Assad Abbas, Muhammad Adnan Khan:
A Model-Based Approach to Enhance the Communication Between the Participants of Collaborative Business Processes. IEEE Access 12: 121780-121791 (2024) - 2023
- [j28]Kamran Sattar Awaisi, Assad Abbas, Hasan Ali Khattak, Arsalan Ahmad, Mazhar Ali, Abbas Khalid:
Deep reinforcement learning approach towards a smart parking architecture. Clust. Comput. 26(1): 255-266 (2023) - 2022
- [j27]Kamran Sattar Awaisi, Assad Abbas, Hasan Ali Khattak, Abbas Khalid, Hafiz Tayyab Rauf, Seifedine Kadry:
A dynamic load balancing mechanism for fog computing environment. Int. J. Web Grid Serv. 18(3): 337-360 (2022) - [j26]Sagheer Ahmed Jan, Noor Ul Amin, Junaid Shuja, Assad Abbas, Mohammed Maray, Mazhar Ali:
SELWAK: A Secure and Efficient Lightweight and Anonymous Authentication and Key Establishment Scheme for IoT Based Vehicular Ad hoc Networks. Sensors 22(11): 4019 (2022) - [j25]Mohammad Aazam, Saif ul Islam, Salman Tariq Lone, Assad Abbas:
Cloud of Things (CoT): Cloud-Fog-IoT Task Offloading for Sustainable Internet of Things. IEEE Trans. Sustain. Comput. 7(1): 87-98 (2022) - [c12]Junaid Sajid, Bareera Anam, Hasan Ali Khattak, Asad Waqar Malik, Assad Abbas, Samee U. Khan:
Preventing Adversarial Attacks on Autonomous Driving Models. WiCON 2022: 3-13 - [c11]Zahid Khan, Hasan Ali Khattak, Assad Abbas, Samee U. Khan:
Fog Resource Sharing to Enable Pay-Per-Use Model. WiCON 2022: 134-143 - 2021
- [j24]Anam Asghar, Assad Abbas, Hasan Ali Khattak, Samee U. Khan:
Fog Based Architecture and Load Balancing Methodology for Health Monitoring Systems. IEEE Access 9: 96189-96200 (2021) - [j23]Zeyad A. Al-Odat, Mazhar Ali, Assad Abbas, Samee U. Khan:
Secure Hash Algorithms and the Corresponding FPGA Optimization Techniques. ACM Comput. Surv. 53(5): 97:1-97:36 (2021) - [j22]Muhammad Usman Shahid Khan, Assad Abbas, Attiqa Rehman, Raheel Nawaz:
HateClassify: A Service Framework for Hate Speech Identification on Social Media. IEEE Internet Comput. 25(1): 40-49 (2021) - [j21]Sara Sajid, Muhammad Jawad, Kanza Hamid, Muhammad Usman Shahid Khan, Sahibzada Muhammad Ali, Assad Abbas, Samee U. Khan:
Blockchain-based decentralized workload and energy management of geo-distributed data centers. Sustain. Comput. Informatics Syst. 29(Part): 100461 (2021) - [j20]Mazhar Ali, Assad Abbas, Muhammad Usman Shahid Khan, Samee U. Khan:
SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud. IEEE Trans. Cloud Comput. 9(1): 347-359 (2021) - [j19]Mubeen Ghafoor, Syed Ali Tariq, Tehseen Zia, Imtiaz Ahmad Taj, Assad Abbas, Ali Hassan, Albert Y. Zomaya:
Fingerprint Identification With Shallow Multifeature View Classifier. IEEE Trans. Cybern. 51(9): 4515-4527 (2021) - [c10]Neeli Khan, Duaa Baig, Muhammad Usman Shahid Khan, Assad Abbas, Mazhar Ali:
Malware Detection in Android via Neural Network using Entropy Features. FIT 2021: 240-245 - [c9]Duaa Baig, Muhammad Usman Shahid Khan, Darren Dancey, Assad Abbas, Mazhar Ali, Raheel Nawaz:
Malware Detection and Classification along with Trade-off Analysis for Number of Features, Feature Types, and Speed. FIT 2021: 246-251 - [p3]Kamran Sattar Awaisi, Assad Abbas, Samee U. Khan, Md. Redowan Mahmud, Rajkumar Buyya:
Simulating Fog Computing Applications Using iFogSim Toolkit. Mobile Edge Computing 2021: 565-590 - 2020
- [j18]Danish Iqbal, Assad Abbas, Mazhar Ali, Muhammad Usman Shahid Khan, Raheel Nawaz:
Requirement Validation for Embedded Systems in Automotive Industry Through Modeling. IEEE Access 8: 8697-8719 (2020) - [j17]Mohsin Shafiq, Imtiaz A. Taj, Mubeen Ghafoor, Syed Ali Tariq, Assad Abbas, Albert Y. Zomaya:
Accelerating fingerprint identification using FPGA for large-scale applications. J. Parallel Distributed Comput. 141: 35-48 (2020) - [j16]Tehseen Zia, Assad Abbas, Usman Habib, Muhammad Sajid Khan:
Learning deep hierarchical and temporal recurrent neural networks with residual learning. Int. J. Mach. Learn. Cybern. 11(4): 873-882 (2020) - [j15]Hafsa Arshad, Hasan Ali Khattak, Zoobia Ameer, Assad Abbas, Samee U. Khan:
Estimation of fog utility pricing: a bio-inspired optimisation techniques' perspective. Int. J. Parallel Emergent Distributed Syst. 35(3): 309-322 (2020)
2010 – 2019
- 2019
- [j14]Faiza Masood, Ghana Ammad, Ahmad Almogren, Assad Abbas, Hasan Ali Khattak, Ikram Ud Din, Mohsen Guizani, Mansour Zuair:
Spammer Detection and Fake User Identification on Social Networks. IEEE Access 7: 68140-68152 (2019) - [j13]Muhammad Hammad Waseem, Malik Sajjad Ahmed Nadeem, Assad Abbas, Aliya Shaheen, Wajid Aziz, Adeel Anjum, Umar Manzoor, Muhammad A. Balubaid, Seong-O Shim:
On the Feature Selection Methods and Reject Option Classifiers for Robust Cancer Prediction. IEEE Access 7: 141072-141082 (2019) - [j12]Kamran Sattar Awaisi, Assad Abbas, Mahdi Zareei, Hasan Ali Khattak, Muhammad Usman Shahid Khan, Mazhar Ali, Ikram Ud Din, Sajid Shah:
Towards a Fog Enabled Efficient Car Parking Architecture. IEEE Access 7: 159100-159111 (2019) - [j11]Muhammad Azeem Sarwar, Tahir Bashir, Owais Shahzad, Assad Abbas:
Cloud-Based Architecture to Implement Electronic Health Record (EHR) System in Pakistan. IT Prof. 21(3): 49-54 (2019) - [c8]Komal Minhas, Munazza Tabassam, Rida Rasheed, Assad Abbas, Hasan Ali Khattak, Samee U. Khan:
A Framework for Dengue Surveillance and Data Collection in Pakistan. COMPSAC (2) 2019: 275-280 - [c7]Zeyad A. Al-Odat, Assad Abbas, Samee U. Khan:
Randomness Analyses of the Secure Hash Algorithms, SHA-1, SHA-2 and Modified SHA. FIT 2019: 316-321 - [c6]Sahibzada Muhammad Shuja, Raja Farhat Makhdoom Khan, Munam Ali Shah, Hasan Ali Khattak, Assad Abbas, Samee U. Khan:
On Efficiency of Scrambled Image Forensics Service Using Support Vector Machine. SERVICES 2019: 16-30 - [c5]Hasan Ali Khattak, Muhammad Imran, Assad Abbas, Samee U. Khan:
Maintaining Fog Trust Through Continuous Assessment. SERVICES 2019: 129-137 - 2018
- [j10]Shuja Mughal, Assad Abbas, Naveed Ahmad, Samee U. Khan:
A Social Network Based Process to Minimize In-Group Biasedness During Requirement Engineering. IEEE Access 6: 66870-66885 (2018) - [j9]Muhammad Usman Shahid Khan, Assad Abbas, Mazhar Ali, Muhammad Jawad, Samee U. Khan, Keqin Li, Albert Y. Zomaya:
On the Correlation of Sensor Location and Human Activity Recognition in Body Area Networks (BANs). IEEE Syst. J. 12(1): 82-91 (2018) - [j8]Muhammad Usman Shahid Khan, Mazhar Ali, Assad Abbas, Samee U. Khan, Albert Y. Zomaya:
Segregating Spammers and Unsolicited Bloggers from Genuine Experts on Twitter. IEEE Trans. Dependable Secur. Comput. 15(4): 551-560 (2018) - [c4]Nasir Ayub, Nadeem Javaid, Assad Abbas, Adnan Ishaq, Anam Yousaf, Muhammad Awais Ishtiaq:
Demand Side Management Scheduling of Appliances Using Meta Heuristic Algorithms. BWCCA 2018: 405-417 - [c3]Muhammad Usman Shahid Khan, Assad Abbas, Mazhar Ali, Muhammad Jawad, Samee U. Khan:
Convolutional Neural Networks as Means to Identify Apposite Sensor Combination for Human Activity Recognition. CHASE 2018: 45-50 - [c2]Hafsa Arshad, Munam Ali Shah, Hasan Ali Khattak, Zoobia Ameer, Assad Abbas, Samee Ullah Khan:
Evaluating Bio-Inspired Optimization Techniques for Utility Price Estimation in Fog Computing. SmartCloud 2018: 84-89 - 2017
- [p2]Assad Abbas, Samee U. Khan, Albert Y. Zomaya:
Introduction to Large-Scale Distributed Computing in Smart Healthcare. Handbook of Large-Scale Distributed Computing in Smart Healthcare 2017: 1-7 - [e1]Samee U. Khan, Albert Y. Zomaya, Assad Abbas:
Handbook of Large-Scale Distributed Computing in Smart Healthcare. Springer 2017, ISBN 978-3-319-58279-5 [contents] - 2016
- [j7]Muhammad Habib Ur Rehman, Chee Sun Liew, Assad Abbas, Prem Prakash Jayaraman, Teh Ying Wah, Samee U. Khan:
Big Data Reduction Methods: A Survey. Data Sci. Eng. 1(4): 265-284 (2016) - [j6]Assad Abbas, Mazhar Ali, Muhammad Usman Shahid Khan, Samee U. Khan:
Personalized healthcare cloud services for disease risk assessment and wellness management using social media. Pervasive Mob. Comput. 28: 81-99 (2016) - 2015
- [j5]Assad Abbas, Limin Zhang, Samee Ullah Khan:
A survey on context-aware recommender systems based on computational intelligence techniques. Computing 97(7): 667-690 (2015) - [j4]Assad Abbas, Kashif Bilal, Limin Zhang, Samee Ullah Khan:
A cloud based health insurance plan recommendation system: A user centered approach. Future Gener. Comput. Syst. 43-44: 99-109 (2015) - [c1]Assad Abbas, Muhammad Usman Shahid Khan, Mazhar Ali, Samee U. Khan, Laurence T. Yang:
A Cloud Based Framework for Identification of Influential Health Experts from Twitter. UIC/ATC/ScalCom 2015: 831-838 - [p1]Assad Abbas, Samee U. Khan:
e-Health Cloud: Privacy Concerns and Mitigation Strategies. Medical Data Privacy Handbook 2015: 389-421 - 2014
- [j3]Assad Abbas, Mazhar Ali, Ahmad Fayyaz, Ankan Ghosh, Anshul Kalra, Samee Ullah Khan, Muhammad Usman Shahid Khan, Thiago De Menezes, Sayantica Pattanayak, Alarka Sanyal, Saeeda Usman:
A survey on energy-efficient methodologies and architectures of network-on-chip. Comput. Electr. Eng. 40(8): 333-347 (2014) - [j2]Kashif Bilal, Saif Ur Rehman Malik, Osman Khalid, Abdul Hameed, Enrique Alvarez, Vidura Wijaysekara, Rizwana Irfan, Sarjan Shrestha, Debjyoti Dwivedy, Mazhar Ali, Usman Shahid Khan, Assad Abbas, Nauman Jalil, Samee Ullah Khan:
A taxonomy and survey on Green Data Center Networks. Future Gener. Comput. Syst. 36: 189-208 (2014) - [j1]Assad Abbas, Samee Ullah Khan:
A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds. IEEE J. Biomed. Health Informatics 18(4): 1431-1441 (2014)
Coauthor Index
aka: Usman Shahid Khan
aka: Samee U. Khan
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint