default search action
Muhammad Yousaf
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Shahzada Fahad, Sami Ur Rahman, Fakhre Alam, Muhammad Yousaf, Faten S. Alamri, Naveed Abbas, Saeed Ali Bahaj, Amjad Rehman Khan:
A Modified Singular Value Decomposition (MSVD) Approach for the Enhancement of CCTV Low-Quality Images. IEEE Access 12: 20138-20151 (2024) - [j26]Muhammad Yousaf, Muhammad Farhan, Yousaf Saeed, Muhammad Jamshaid Iqbal, Farhan Ullah, Gautam Srivastava:
Enhancing driver attention and road safety through EEG-informed deep reinforcement learning and soft computing. Appl. Soft Comput. 167: 112320 (2024) - [j25]Sabir Ali Changazi, Asim Dilawar Bakhshi, Muhammad Yousaf, Syed Muhammad Mohsin, Syed Muhammad Abrar Akber, Mohammed B. Abazeed, Mohammed Ali:
Optimization of network topology robustness in IoTs: A systematic review. Comput. Networks 250: 110568 (2024) - [j24]Faisal Fiaz, Syed Muhammad Sajjad, Zafar Iqbal, Muhammad Yousaf, Zia Muhammad:
MetaSSI: A Framework for Personal Data Protection, Enhanced Cybersecurity and Privacy in Metaverse Virtual Reality Platforms. Future Internet 16(5): 176 (2024) - 2023
- [j23]Saqib Mazher Qurashi, Bander N. Almutairi, Rani Sumaira Kanwal, Mladen Krstic, Muhammad Yousaf:
Rough Substructures Based on Overlaps of Successor in Quantales Under Serial Fuzzy Relations. IEEE Access 11: 88778-88794 (2023) - [j22]Zeeshan Ashraf, Adnan Sohail, Muhammad Yousaf:
Robust and lightweight symmetric key exchange algorithm for next-generation IoE. Internet Things 22: 100703 (2023) - [j21]Zeeshan Ashraf, Adnan Sohail, Muhammad Yousaf:
Lightweight and authentic symmetric session key cryptosystem for client-server mobile communication. J. Supercomput. 79(14): 16181-16205 (2023) - [c24]Ramakrishna P. Pammi, Shehzad Afzal, Hari Prasad Dasari, Muhammad Yousaf, Sohaib Ghani, Murali Sankar Venkatraman, Ibrahim Hoteit:
A Visual Analytics Framework for Renewable Energy Profiling and Resource Planning. EuroVA@EuroVis 2023: 49-54 - 2022
- [j20]Naeem Abbas, Abdul Basir, Amjad Iqbal, Muhammad Yousaf, Adeel Akram, Hyoungsuk Yoo:
Ultra-Miniaturized Antenna for Deeply Implanted Biomedical Devices. IEEE Access 10: 54563-54571 (2022) - [j19]Wasiq Ullah, Faisal Khan, Shahid Hussain, Muhammad Yousaf, Siddique Akbar:
Analytical Modeling and Optimization of Partitioned Permanent Magnet Consequent Pole Switched Flux Machine With Flux Barrier. IEEE Access 10: 123905-123919 (2022) - [j18]Sabir Ali Changazi, Asim Dilawar Bakhshi, Muhammad Yousaf, Muhammad Hasan Islam, Syed Muhammad Mohsin, Shahab S. Band, Abdulmajeed Alsufyani, Sami Bourouis:
GA-based geometrically optimized topology robustness to improve ambient intelligence for future internet of things. Comput. Commun. 193: 109-117 (2022) - [j17]Wenbo Wang, Muhammad Yousaf, Ding Liu, Ayesha Sohail:
A Comparative Study of the Genetic Deep Learning Image Segmentation Algorithms. Symmetry 14(10): 1977 (2022) - 2021
- [j16]Muhammad Yousaf, Ismail Ben Mabrouk, Muhammad Zada, Adeel Akram, Yasar Amin, Mourad Nedil, Hyoungsuk Yoo:
An Ultra-Miniaturized Antenna With Ultra-Wide Bandwidth Characteristics for Medical Implant Systems. IEEE Access 9: 40086-40097 (2021) - [j15]Umer Waqas, Shazia Afzal, Mubeen Akhtar Mir, Muhammad Yousaf:
Cryptographic strength evaluation of AES s-box variants. Int. J. Inf. Comput. Secur. 14(3/4): 263-280 (2021) - [j14]Khuda Bux Jalbani, Muhammad Yousaf, Muhammad Shahzad Sarfraz, Rozita Jamili Oskouei, Akhtar Hussain, Zojan Memon:
Poor Coding Leads to DoS Attack and Security Issues in Web Applications for Sensors. Secur. Commun. Networks 2021: 5523806:1-5523806:11 (2021) - [c23]Muhammad Yousaf, Amin Jalilian, Kashem M. Muttaqi, Danny Sutanto:
An Adaptive Protection Scheme for Dual-Setting Directional Recloser and Fuse Coordination for Distribution Grids with Distributed Generation. IAS 2021: 1-7 - [c22]Muhammad Yousaf, Kashem M. Muttaqi, Danny Sutanto:
Risk of Loss of Protection Coordination in Distribution Grids with High Penetration of Distributed Energy Resources. IAS 2021: 1-7 - [c21]Muhammad Yousaf, Kashem M. Muttaqi, Danny Sutanto:
Improvement of Transient Stability of the Power Grids by a Judicious Auto-Reclosing Scheme in the Presence of Synchronous-Based DGs. IAS 2021: 1-7 - 2020
- [j13]Syed Muhammad Sajjad, Muhammad Yousaf, Humaira Afzal, Muhammad Rafiq Mufti:
eMUD: Enhanced Manufacturer Usage Description for IoT Botnets Prevention on Home WiFi Routers. IEEE Access 8: 164200-164213 (2020) - [j12]Iftikhar Ahmad, Muhammad Yousaf, Suhail Yousaf, Muhammad Ovais Ahmad:
Fake News Detection Using Machine Learning Ensemble Methods. Complex. 2020: 8885861:1-8885861:11 (2020) - [j11]Safdar Hussain Shaheen, Muhammad Yousaf, Mudassar Jalil:
A smart card oriented secure electronic voting machine built on NTRU. Int. Arab J. Inf. Technol. 17(3): 386-393 (2020) - [j10]Shazia Afzal, Muhammad Yousaf, Humaira Afzal, Nawaf Alharbe, Muhammad Rafiq Mufti:
Cryptographic Strength Evaluation of Key Schedule Algorithms. Secur. Commun. Networks 2020: 3189601:1-3189601:9 (2020) - [c20]Muhammad Yousaf, Kashem M. Muttaqi, Danny Sutanto:
A Control Strategy to Mitigate the Sensitivity Deterioration of Overcurrent Protection in Distribution Networks with the Higher Concentration of Synchronous and Inverter Based DG Units. IAS 2020: 1-6
2010 – 2019
- 2019
- [j9]Jia-Bao Liu, Muhammad Younas, Mustafa Habib, Muhammad Yousaf, Waqas Nazeer:
M-Polynomials and Degree-Based Topological Indices of VC5C7[p, q] and HC5C7[p, q] Nanotubes. IEEE Access 7: 41125-41132 (2019) - [j8]Humaira Afzal, Muhammad Rafiq Mufti, Irfan Awan, Muhammad Yousaf:
Performance analysis of radio spectrum for cognitive radio wireless networks using discrete time Markov chain. J. Syst. Softw. 151: 1-7 (2019) - [j7]Zeeshan Kaleem, Muhammad Yousaf, Aamir Qamar, Ayaz Ahmad, Trung Q. Duong, Wan Choi, Abbas Jamalipour:
UAV-Empowered Disaster-Resilient Edge Architecture for Delay-Sensitive Communication. IEEE Netw. 33(6): 124-132 (2019) - [c19]Muhammad Yousaf, Naeem Abbas, Farooq Ali, Muhammad Munwar Iqbal, Yasar Amin, Adeel Akram:
Miniaturized High Gain Antenna for Biomedical Application. ICFNDS 2019: 48:1-48:7 - [c18]Naeem Abbas, Bilal Manzoor, Muhammad Yousaf, Muhammad Zahid, Zubair Bashir, Adeel Akram, Yasar Amin:
A Compact Wide Band Implantable Antenna for Biotelemetry. INTELLECT 2019: 1-5 - [c17]Zubair Bashir, Muhammad Zahid, Naeem Abbas, Muhammad Yousaf, Sultan Shoaib, Muhammad Adeel Asghar, Yasar Amin:
A Miniaturized Wide Band Implantable Antenna for Biomedical Application. UCET 2019: 1-4 - 2018
- [c16]Muhammad Zeeshan Sabir, Muhammad Yousaf:
Design and Implementation of an End-to-End Web based Trusted Email System. EUSPN/ICTH 2018: 231-238 - [c15]Abdullah Sadam, Nadeem Javaid, Muhammad Usman Sharif, Abdul Wasi Zia, Muhammad Yousaf, Syed Muhammad Saleh Arfi:
Effective Resource Allocation in Fog for Efficient Energy Distribution. NBiS 2018: 248-259 - [c14]Zeeshan Kaleem, Muhammad Yousaf, Syed Ali Hassan, Nguyen-Son Vo, Trung Quang Duong:
Priority-Based Device Discovery in Public Safety D2D Networks with Full Duplexing. QSHINE 2018: 102-108 - [c13]Syed Muhammad Sajjad, Muhammad Yousaf:
UCAM: Usage, Communication and Access Monitoring Based Detection System for IoT Botnets. TrustCom/BigDataSE 2018: 1547-1550 - [i2]Zeeshan Kaleem, Muhammad Yousaf, Aamir Qamar, Ayaz Ahmad, Trung Quang Duong, Wan Choi, Abbas Jamalipour:
Public-Safety LTE: Communication Services, Standardization Status, and Disaster-Resilient Architecture. CoRR abs/1809.09617 (2018) - 2017
- [j6]Muhammad Yousaf, Tahir Mahmood:
Protection coordination for a distribution system in the presence of distributed generation. Turkish J. Electr. Eng. Comput. Sci. 25: 408-421 (2017) - 2015
- [c12]Syed Muhammad Sajjad, Safdar Hussain Bouk, Muhammad Yousaf:
Neighbor Node Trust based Intrusion Detection System for WSN. EUSPN/ICTH 2015: 183-188 - 2014
- [c11]Sheneela Naz, Tariq Siraj, Muhammad Sajjad Akbar, Muhammad Yousaf, Amir Qayyum, Mudassir Tufail:
Performance Analysis of IPv6 QoS for Multimedia Applications Using Real Testbed. ANT/SEIT 2014: 182-189 - [c10]Muhammad Sajjad Akbar, Muhammad Saleem Khan, Kishwer Abdul Khaliq, Amir Qayyum, Muhammad Yousaf:
Evaluation of IEEE 802.11n for Multimedia Application in VANET. ANT/SEIT 2014: 953-958 - [c9]Tariq Saraj, Muhammad Yousaf, Muhammad Sajjad Akbar, Amir Qayyum, Mudassir Tufail:
ISP Independent Architecture (IIA) for IPv6 Packet Traversing and Inter-connectivity over Hybrid (IPv4/IPv6) Internet. ANT/SEIT 2014: 973-978 - [c8]Umer Waqas, Shazia Afzal, Mubeen Akhtar Mir, Muhammad Yousaf:
Generation of AES-Like S-Boxes by Replacing Affine Matrix. FIT 2014: 159-164 - [c7]Safdar Hussain Shaheen, Muhammad Yousaf:
Security Analysis of DTLS Structure and Its Application to Secure Multicast Communication. FIT 2014: 165-169 - [c6]Tayyaba Zeb, Abdul Ghafoor Abbasi, Muhammad Awais Shibli, Muhammad Yousaf:
A Secure Architecture for Inter-cloud Virtual Machine Migration. SecureComm (1) 2014: 24-35 - 2013
- [j5]Shamsul Qamar, Muhammad Yousaf:
Application of a discontinuous Galerkin finite element method to special relativistic hydrodynamic models. Comput. Math. Appl. 65(8): 1220-1232 (2013) - 2012
- [j4]Shamsul Qamar, Muhammad Yousaf:
The space-time CESE method for solving special relativistic hydrodynamic equations. J. Comput. Phys. 231(10): 3928-3945 (2012) - [j3]Peer Azmat Shah, Muhammad Yousaf, Amir Qayyum, Halabi Hasbullah:
Performance comparison of end-to-end mobility management protocols for TCP. J. Netw. Comput. Appl. 35(6): 1657-1673 (2012) - [j2]Muhammad Yousaf, Amir Qayyum, Shahzad Ali Malik:
An Architecture for Exploiting Multihoming in Mobile Devices for Vertical Handovers & Bandwidth Aggregation. Wirel. Pers. Commun. 66(1): 57-79 (2012) - 2011
- [j1]Shamsul Qamar, Muhammad Yousaf, Sidrah Mudasser:
The space-time CE/SE method for solving ultra-relativistic Euler equations. Comput. Phys. Commun. 182(4): 994-1004 (2011) - [i1]Nadeem Javaid, Muhammad Yousaf, Aamir Ahmad, Arshad Naveed, Karim Djouani:
Evaluating Impact of Mobility on Wireless Routing Protocols. CoRR abs/1108.3708 (2011) - 2010
- [c5]Sadaf Yasmin, Muhammad Yousaf, Amir Qayyum:
Security issues related with DNS dynamic updates for mobile nodes: a survey. FIT 2010: 17 - [c4]Ehsan Elahi, Muhammad Yousaf, Ambreen Sheikh, Muhammad Maaz Rehan, Muhammad Omer Chughtai, Amir Qayyum:
On the implementation of End-to-End Mobility Management Framework (EMF). WiMob 2010: 458-465
2000 – 2009
- 2009
- [c3]Muhammad Yousaf, Sohail Bhatti, Maaz Rehan, Amir Qayyum, Shahzad Ali Malik:
An Intelligent Prediction Model for Generating LGD Trigger of IEEE 802.21 MIH. ICIC (1) 2009: 413-422 - [c2]Peer Azmat Shah, Muhammad Yousaf, Amir Qayyum, Shahzad Ali Malik:
An analysis of service disruption time for TCP applications using end-to-end mobility management protocols. MoMM 2009: 360-364 - [c1]Maaz Rehan, Muhammad Yousaf, Amir Qayyum, Shahzad Ali Malik:
A Cross-Layer User Centric Vertical Handover Decision Approach Based on MIH Local Triggers. WMNC/PWC 2009: 359-369
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint