default search action
Muhammad Sajjad Khan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c5]Muhammad Uzair Khan, Muhammad Sajjad Khan, Musyyab Yousufi, Junsu Kim, Noor Gul, Su Min Kim:
Design and Comparison of Single Band Rectangular, Cylindrical, and Triangular DRA of C and X-Band Frequency. ICTC 2022: 2341-2345 - [c4]Ahmed Salem, Marc St-Hilaire, Muhammad Sajjad Khan:
Mathematical Models for Task Assignment with Service Level Agreement in Fog Computing. SmartNets 2022: 1-8 - 2021
- [j18]Ihsan Ullah, Muhammad Sajjad Khan, Marc St-Hilaire, Mohammad Faisal, Junsu Kim, Su Min Kim:
Task Priority-Based Cached-Data Prefetching and Eviction Mechanisms for Performance Optimization of Edge Computing Clusters. Secur. Commun. Networks 2021: 5541974:1-5541974:10 (2021) - 2020
- [j17]Ihsan Ullah, Muhammad Sajjad Khan, Muhammad Amir, Junsu Kim, Su Min Kim:
LSTPD: Least Slack Time-Based Preemptive Deadline Constraint Scheduler for Hadoop Clusters. IEEE Access 8: 111751-111762 (2020) - [j16]Mohammad Faisal, Ikram Ali, Muhammad Sajjad Khan, Su Min Kim, Junsu Kim:
Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges. Complex. 2020: 6612919:1-6612919:9 (2020) - [j15]Mohammad Faisal, Ikram Ali, Muhammad Sajjad Khan, Junsu Kim, Su Min Kim:
Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges. Complex. 2020: 6619498:1-6619498:9 (2020) - [j14]Noor Gul, Muhammad Sajjad Khan, Junsu Kim, Su Min Kim:
Robust Spectrum Sensing via Double-Sided Neighbor Distance Based on Genetic Algorithm in Cognitive Radio Networks. Mob. Inf. Syst. 2020: 8876824:1-8876824:10 (2020) - [j13]Noor Gul, Muhammad Sajjad Khan, Su Min Kim, Marc St-Hilaire, Ihsan Ullah, Junsu Kim:
Particle Swarm Optimization in the Presence of Malicious Users in Cognitive IoT Networks with Data. Sci. Program. 2020: 8844083:1-8844083:11 (2020) - [j12]Muhammad Sajjad Khan, Noor Gul, Junsu Kim, Ijaz Mansoor Qureshi, Su Min Kim:
A Genetic Algorithm-Based Soft Decision Fusion Scheme in Cognitive IoT Networks with Malicious Users. Wirel. Commun. Mob. Comput. 2020: 2509081:1-2509081:10 (2020) - [j11]Arshed Ahmed, Muhammad Sajjad Khan, Noor Gul, Irfan Uddin, Su Min Kim, Junsu Kim:
A Comparative Analysis of Different Outlier Detection Techniques in Cognitive Radio Networks with Malicious Users. Wirel. Commun. Mob. Comput. 2020: 8832191:1-8832191:18 (2020) - [j10]Muhammad Sajjad Khan, Liaqat Khan, Noor Gul, Muhammad Amir, Junsu Kim, Su Min Kim:
Support Vector Machine-Based Classification of Malicious Users in Cognitive Radio Networks. Wirel. Commun. Mob. Comput. 2020: 8846948:1-8846948:11 (2020) - [j9]Noor Gul, Ijaz Mansoor Qureshi, Muhammad Sajjad Khan, Atif Elahi, Sadiq Akbar:
Differential Evolution Based Reliable Cooperative Spectrum Sensing in the Presence of Malicious Users. Wirel. Pers. Commun. 114(1): 123-147 (2020) - [c3]Muhammad Sajjad Khan, Liaqat Khan, Junsu Kim, Eung Hyuk Lee, Su Min Kim:
Cognitive User Selection Based on Throughput Estimation in Cognitive Radio Networks. ICTC 2020: 154-156
2010 – 2019
- 2019
- [j8]Muhammad Sajjad Khan, Muhammad Jibran, Insoo Koo, Su Min Kim, Junsu Kim:
A Double Adaptive Approach to Tackle Malicious Users in Cognitive Radio Networks. Wirel. Commun. Mob. Comput. 2019: 2350694:1-2350694:9 (2019) - [j7]Muhammad Sajjad Khan, Junsu Kim, Eung Hyuk Lee, Su Min Kim:
An Efficient Contention-Window Based Reporting for Internet of Things Features in Cognitive Radio Networks. Wirel. Commun. Mob. Comput. 2019: 8475020:1-8475020:9 (2019) - [c2]Muhammad Sajjad Khan, Su Min Kim, Eung Hyuk Lee, Junsu Kim:
Genetic Algorithm Based Cooperative Spectrum Sensing Optimization in the Presence of Malicious Users in Cognitive Radio Networks. ICTC 2019: 207-209 - [c1]Muhammad Sajjad Khan, Mi Ji Kim, Junsu Kim, Eung Hyuk Lee, Su Min Kim:
Improving Spectrum Sensing and Reporting via Multi-Antenna in Cognitive Radio Networks. ICUFN 2019: 321-325 - 2018
- [j6]Atif Elahi, Ijaz Mansoor Qureshi, Noor Gul, Muhammad Sajjad Khan, Hayat Ullah:
A Nature-Inspired Hybrid Technique for Interference Reduction in Cognitive Radio Networks. Cogn. Comput. 10(5): 805-815 (2018) - 2017
- [j5]Muhammad Sajjad Khan, Muhammad Usman, Hiep-Vu Van, Insoo Koo:
Efficient Selection of Users' Pair in Cognitive Radio Network to Maximize Throughput Using Simultaneous Transmit-Sense Approach. IEICE Trans. Commun. 100-B(2): 380-389 (2017) - 2016
- [j4]Muhammad Sajjad Khan, Insoo Koo:
The Effect of Multiple Energy Detector on Evidence Theory Based Cooperative Spectrum Sensing Scheme for Cognitive Radio Networks. J. Inf. Process. Syst. 12(2): 295-309 (2016) - 2015
- [j3]Muhammad Sajjad Khan, Insoo Koo:
Mitigation of Adverse Effects of Malicious Users on Cooperative Spectrum Sensing by Using Hausdorff Distance in Cognitive Radio Networks. J. Inform. and Commun. Convergence Engineering 13(2) (2015) - [j2]Muhammad Usman, Muhammad Sajjad Khan, Hiep-Vu Van, Insoo Koo:
Energy-Efficient Channel Handoff for Sensor Network-Assisted Cognitive Radio Network. Sensors 15(8): 18012-18039 (2015) - 2013
- [j1]Muhammad Sajjad Khan, Insoo Koo:
Performance Analysis of Amplify and Forward (AF)-based Cooperative Spectrum Sensing in Cognitive Radio Networks. J. Inform. and Commun. Convergence Engineering 11(4): 223-228 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint