


default search action
Muhammad Asad Khan
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Mazhar Islam
, Muhammad Ikram, Musaed A. Alhussein
, Muhammad Sohaib Ayub
, Muhammad Asad Khan
, Khursheed Aurangzeb
:
A Component-Based Localization Algorithm for Sparse 3-D Wireless Sensor Networks. IEEE Access 12: 51904-51918 (2024) - [j10]Muhammad Sohaib Ayub
, Naimat Ullah, Sarwan Ali, Imdadullah Khan
, Mian Muhammad Awais, Muhammad Asad Khan, Safiullah Faizullah:
CAMP: A context-aware cricket players performance metric. J. Oper. Res. Soc. 75(6): 1140-1156 (2024) - [j9]Sarwan Ali, Muhammad Ahmad, Maham Anwer Beg, Imdad Ullah Khan, Safiullah Faizullah, Muhammad Asad Khan:
SsAG: Summarization and Sparsification of Attributed Graphs. ACM Trans. Knowl. Discov. Data 18(6): 141:1-141:22 (2024) - 2023
- [j8]Haris Mansoor
, Sarwan Ali
, Imdad Ullah Khan
, Naveed Arshad, Muhammad Asad Khan, Safiullah Faizullah:
Short-Term Load Forecasting Using AMI Data. IEEE Internet Things J. 10(24): 22040-22050 (2023) - [j7]Nazia Asghar, Ghulam Mustafa, Nawishta Jabeen
, Asadullah Dawood, Rida, Zeenat Jabeen, Qaiser Hameed Malik, Muhammad Asad Khan, Muhammad Usman Khan:
Fabrication of Efficient and Non-Enzymatic Electrochemical Sensors for the Detection of Sucrose. Sensors 23(4): 2008 (2023) - [j6]Muhammad Shoaib Farooq
, Shamyla Riaz, Ibtesam Ur Rehman, Muhammad Asad Khan, Bilal Hassan
:
A Blockchain-Based Framework to Make the Rice Crop Supply Chain Transparent and Reliable in Agriculture. Syst. 11(9): 476 (2023) - [j5]Sarwan Ali
, Bikram Sahoo, Muhammad Asad Khan, Alexander Zelikovsky
, Imdad Ullah Khan
, Murray Patterson
:
Efficient Approximate Kernel Based Spike Sequence Classification. IEEE ACM Trans. Comput. Biol. Bioinform. 20(6): 3376-3388 (2023) - [c9]Shafiq Alam
, Rohit Pande
, Muhammad Sohaib Ayub
, Muhammad Asad Khan
:
Towards Developing an Automated Chatbot for Predicting Legal Case Outcomes: A Deep Learning Approach. ACIIDS (1) 2023: 163-174 - [i14]Muhammad Sohaib Ayub, Naimat Ullah, Sarwan Ali, Imdad Ullah Khan, Mian Muhammad Awais, Muhammad Asad Khan, Safiullah Faizullah:
CAMP: A Context-Aware Cricket Players Performance Metric. CoRR abs/2307.13700 (2023) - 2022
- [j4]Mazhar Javed Awan, Muhammad Asad Khan, Zain Khalid Ansari, Awais Yasin, Hafiz Muhammad Faisal Shehzad
:
Fake profile recognition using big data analytics in social media platforms. Int. J. Comput. Appl. Technol. 68(3): 215-222 (2022) - [c8]Sarwan Ali, Muhammad Ahmad, Umair ul Hassan, Muhammad Asad Khan, Shafiq Alam
, Imdadullah Khan
:
Efficient Data Analytics on Augmented Similarity Triplets. IEEE Big Data 2022: 5871-5880 - [c7]Haris Mansoor, Sarwan Ali, Shafiq Alam
, Muhammad Asad Khan, Umair ul Hassan, Imdadullah Khan
:
Impact Of Missing Data Imputation On The Fairness And Accuracy Of Graph Node Classifiers. IEEE Big Data 2022: 5988-5997 - [i13]Sarwan Ali, Bikram Sahoo, Muhammad Asad Khan, Alexander Zelikovsky, Imdad Ullah Khan
, Murray Patterson:
Efficient Approximate Kernel Based Spike Sequence Classification. CoRR abs/2209.04952 (2022) - [i12]Haris Mansoor, Sarwan Ali, Shafiq Alam
, Muhammad Asad Khan, Umair ul Hassan, Imdadullah Khan
:
Impact Of Missing Data Imputation On The Fairness And Accuracy Of Graph Node Classifiers. CoRR abs/2211.00783 (2022) - 2021
- [j3]Sarwan Ali
, Muhammad Haroon Shakeel, Imdadullah Khan
, Safiullah Faizullah, Muhammad Asad Khan:
Predicting Attributes of Nodes Using Network Structure. ACM Trans. Intell. Syst. Technol. 12(2): 21:1-21:23 (2021) - [c6]Nimrah Mustafa, Imdadullah Khan
, Muhammad Asad Khan, Zartash Afzal Uzmi
:
Social Groups Based Content Caching in Wireless Networks. MobiWac 2021: 133-136 - [i11]Sarwan Ali, Tamkanat E. Ali, Muhammad Asad Khan, Imdadullah Khan
, Murray Patterson:
Effective and scalable clustering of SARS-CoV-2 sequences. CoRR abs/2108.08143 (2021) - [i10]Muhammad Ahmad, Maham Anwar Beg, Imdadullah Khan
, Arif Zaman, Muhammad Asad Khan:
SsAG: Summarization and sparsification of Attributed Graphs. CoRR abs/2109.15111 (2021) - [i9]Nimrah Mustafa, Imdadullah Khan, Muhammad Asad Khan, Zartash Afzal Uzmi:
Social Groups Based Content Caching in Wireless Networks. CoRR abs/2110.03818 (2021) - 2020
- [c5]Asad Ullah, Sarwan Ali
, Imdadullah Khan
, Muhammad Asad Khan, Safiullah Faizullah:
Effect of Analysis Window and Feature Selection on Classification of Hand Movements Using EMG Signal. IntelliSys (3) 2020: 400-415 - [c4]Sarwan Ali
, Haris Mansoor, Imdadullah Khan
, Naveed Arshad, Safiullah Faizullah, Muhammad Asad Khan:
Fair Allocation Based Soft Load Shedding. IntelliSys (2) 2020: 407-424 - [i8]Safi Faizullah, Muhammad Asad Khan, Ali Alzahrani, Imdadullah Khan:
Permissioned Blockchain-Based Security for SDN in IoT Cloud Networks. CoRR abs/2002.00456 (2020) - [i7]Asad Ullah, Sarwan Ali
, Imdadullah Khan, Muhammad Asad Khan, Safiullah Faizullah:
Effect of Analysis Window and Feature Selection on Classification of Hand Movements Using EMG Signal. CoRR abs/2002.00461 (2020)
2010 – 2019
- 2019
- [i6]Muhammad Asad Khan, Sajid Saleem, Amir Ali Khan:
CRT Based Spectral Convolution in Binary Fields. CoRR abs/1911.11437 (2019) - [i5]Abdullah M. Alshanqiti, Safi Faizullah, Sarwan Ali
, Maria Khalid Alvi, Muhammad Asad Khan, Imdadullah Khan:
Detecting DDoS Attack on SDN Due to Vulnerabilities in OpenFlow. CoRR abs/1912.12221 (2019) - [i4]Sarwan Ali
, Muhammad Haroon Shakeel, Imdadullah Khan
, Safiullah Faizullah, Muhammad Asad Khan:
Predicting Attributes of Nodes Using Network Structure. CoRR abs/1912.12264 (2019) - [i3]Sarwan Ali
, Haris Mansoor, Imdadullah Khan
, Naveed Arshad, Muhammad Asad Khan, Safiullah Faizullah:
Hour-Ahead Load Forecasting Using AMI Data. CoRR abs/1912.12479 (2019) - 2017
- [j2]Muhammad Asad Khan, Supeng Leng, Geyong Min, Xiaoyan Huang, Guanhua Qiao:
Cooperative backhaul sharing and caching for home cells. Comput. Electr. Eng. 61: 351-360 (2017) - 2015
- [j1]Jiechen Yin, Yuming Mao, Supeng Leng, Yuming Jiang
, Muhammad Asad Khan:
Access granularity control of multichannel random access in next-generation wireless LANs. Comput. Networks 91: 135-150 (2015) - [c3]Muhammad Asad Khan, Supeng Leng, Xiaoyan Huang, Jiechen Yin, Bo Fan:
Backhaul Aggregation for Smart Homes in Heterogeneous Wireless Networks. CIT/IUCC/DASC/PICom 2015: 2206-2211 - [i2]Muhammad Asad Khan, Amir Ali Khan, Fauzan Mirza:
Transform Domain Analysis of Sequences. CoRR abs/1503.00943 (2015) - [i1]Muhammad Asad Khan, Amir Ali Khan, Fauzan Mirza:
CRT and Fixed Patterns in Combinatorial Sequences. CoRR abs/1504.01099 (2015) - 2014
- [c2]Muhammad Asad Khan, Supeng Leng, Ahmer Khan Jadoon, Jiechen Yin:
Backup Backhaul for Femtocells. CSE 2014: 1752-1757 - 2010
- [c1]Muhammad Asad Khan, Tamleek Ali, Muhammad Irfan, Khurram Ali Shah, Farhan Ali:
A novel grid middleware architecture. FIT 2010: 29
Coauthor Index
aka: Imdad Ullah Khan

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-27 22:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint