default search action
Sajjad Hussain Chauhdary
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Himanshu Dhumras, Prashant Kumar Shukla, Rakesh Kumar Bajaj, Wadii Boulila, Varun Shukla, Piyush Kumar Shukla, Vinodh Kumar Minchula, Sajjad Hussain Chauhdary:
Industry 5.0 Enablers in Consumer Electronics Market Assessment Under T-Spherical Fuzzy Integrated Decision-Making Approach. IEEE Trans. Consumer Electron. 70(1): 1443-1451 (2024) - 2023
- [j21]Faiza Babar Khan, Muhammad Hanif Durad, Asifullah Khan, Farrukh Aslam Khan, Sajjad Hussain Chauhdary, Mohammed A. Alqarni:
Detection of Data Scarce Malware Using One-Shot Learning With Relation Network. IEEE Access 11: 74438-74457 (2023) - [j20]Sajjad Hussain Chauhdary, Mohammed Saeed Alkatheiri, Mohammed A. Alqarni, Sajid Saleem:
An efficient evolutionary deep learning-based attack prediction in supply chain management systems. Comput. Electr. Eng. 109(Part A): 108768 (2023) - 2021
- [j19]Rayan Ayed Alsolami, Sajjad Hussain Chauhdary, Abdulrahman A. Alshdadi:
Interoperable access framework for internet of things backhauled heterogeneous applications. Microprocess. Microsystems 82: 103835 (2021) - [c9]Mohammed Ahmed Sayemaldahar, Sajjad Hussain Chauhdary:
An integrated smart wheelchair model: IW Smart Wheelchair with Embedded Smart Home, Navigation and Obstacle Avoidance Systems. ICFNDS 2021: 93-99 - 2020
- [j18]Mohammed A. Alqarni, Sajjad Hussain Chauhdary, Maryam Naseer Malik, Muhammad Ehatisham-ul-Haq, Muhammad Awais Azam:
Identifying smartphone users based on how they interact with their phones. Hum. centric Comput. Inf. Sci. 10: 7 (2020) - [j17]Zhigao Zheng, Tao Wang, Jinming Wen, Shahid Mumtaz, Ali Kashif Bashir, Sajjad Hussain Chauhdary:
Differentially Private High-Dimensional Data Publication in Internet of Things. IEEE Internet Things J. 7(4): 2640-2650 (2020) - [j16]Rajakumar Arul, Gunasekaran Raja, Alaa Omran Almagrabi, Mohammed Saeed Alkatheiri, Sajjad Hussain Chauhdary, Ali Kashif Bashir:
A Quantum-Safe Key Hierarchy and Dynamic Security Association for LTE/SAE in 5G Scenario. IEEE Trans. Ind. Informatics 16(1): 681-690 (2020)
2010 – 2019
- 2019
- [j15]Svitlana Kutia, Sajjad Hussain Chauhdary, Celestine Iwendi, Lin Liu, Wang Yong, Ali Kashif Bashir:
Socio-Technological Factors Affecting User's Adoption of eHealth Functionalities: A Case Study of China and Ukraine eHealth Systems. IEEE Access 7: 90777-90788 (2019) - [j14]Marium Azhar, Hassan Dawood, Hussain Dawood, Gulraiz Iqbal Choudhary, Ali Kashif Bashir, Sajjad Hussain Chauhdary:
Detail-preserving switching algorithm for the removal of random-valued impulse noise. J. Ambient Intell. Humaniz. Comput. 10(10): 3925-3945 (2019) - [j13]Adnan Ali, Hamaad Rafique, Talha Arshad, Mohammed A. Alqarni, Sajjad Hussain Chauhdary, Ali Kashif Bashir:
A Fractal-Based Authentication Technique Using Sierpinski Triangles in Smart Devices. Sensors 19(3): 678 (2019) - [j12]P. M. Durai Raj Vincent, Natarajan Deepa, Dhivya Elavarasan, Kathiravan Srinivasan, Sajjad Hussain Chauhdary, Celestine Iwendi:
Sensors Driven AI-Based Agriculture Recommendation Model for Assessing Land Suitability. Sensors 19(17): 3667 (2019) - [c8]Gunasekaran Raja, Aishwarya Ganapathisubramaniyan, Gayatri Iyer Sethuraman, Sajjad Hussain Chauhdary, Ali Hassan:
Secured LTE-Wi-Fi Offloading Using RTT Based Evading Malicious Access Point (EMAP) Algorithm. ICCCS 2019: 527-532 - [c7]Shajina Anand, Gunasekaran Raja, Gokul Anand, Sajjad Hussain Chauhdary, Ali Kashif Bashir:
Mirage: A Protocol for Decentralized and Secured Communication of IoT Devices. UEMCON 2019: 1074-1080 - [i1]Rajakumar Arul, Gunasekaran Raja, Alaa Omran Almagrabi, Mohammed Saeed Alkatheiri, Sajjad Hussain Chauhdary, Ali Kashif Bashir:
A Quantum Safe Key Hierarchy and Dynamic Security Association for LTE/SAE in 5G Scenario. CoRR abs/1911.00692 (2019) - 2018
- [j11]Muhammad Ahmad, Mohammed A. Alqarni, Asad Khan, Adil Khan, Sajjad Hussain Chauhdary, Manuel Mazzara, Tariq Umer, Salvatore Distefano:
Smartwatch-Based Legitimate User Identification for Cloud-Based Secure Services. Mob. Inf. Syst. 2018: 5107024:1-5107024:14 (2018) - [j10]Shalli Rani, Sajjad Hussain Chauhdary:
A Novel Framework and Enhanced QoS Big Data Protocol for Smart City Applications. Sensors 18(11): 3980 (2018) - [j9]Ramkumar Jayaraman, Gunasekaran Raja, Ali Kashif Bashir, Sajjad Hussain Chauhdary, Ali Hassan, Mohammed A. Alqarni:
Interference Mitigation Based on Radio Aware Channel Assignment for Wireless Mesh Networks. Wirel. Pers. Commun. 101(3): 1539-1557 (2018) - 2017
- [j8]Hyun-Jung Lee, Myat Thida Soe, Sajjad Hussain Chauhdary, Soyeon Rhee, Myong-Soon Park:
A data aggregation scheme for boundary detection and tracking of continuous objects in WSN. Intell. Autom. Soft Comput. 23(1): 135-147 (2017) - [c6]Gunasekaran Raja, Kottilingam Kottursamy, Sajjad Hussain Chauhdary, Ali Hassan, Mohammed A. Alqarni:
SDN assisted middlebox synchronization mechanism for next generation mobile data management system. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-7 - 2015
- [j7]Ramsha Rizwan, Farrukh Aslam Khan, Haider Abbas, Sajjad Hussain Chauhdary:
Anomaly Detection in Wireless Sensor Networks Using Immune-Based Bioinspired Mechanism. Int. J. Distributed Sens. Networks 11: 684952:1-684952:10 (2015) - 2014
- [c5]Sayed Chhattan Shah, Sajjad Hussain Chauhdary, Muhammad Bilal, Myong-Soon Park:
Network Aware and Power-Based Resource Allocation in Mobile Ad Hoc Computational Grid. HPCC/CSS/ICESS 2014: 428-435 - 2013
- [j6]Sajjad Hussain Chauhdary, Myong-Soon Park, Ali Kashif Bashir, Sayed Chhattan Shah, Jeongjoon Lee:
A collaborative scheme for boundary detection and tracking of continuous objects in WSNs. Intell. Autom. Soft Comput. 19(3): 439-456 (2013) - [c4]Sayed Chhattan Shah, Myong-Soon Park, Wan Sik Choi, Sajjad Hussain Chauhdary, Ali Kashif Bashir:
Network Aware Resource Allocation Scheme for Mobile Ad Hoc Computational Grid. ICIRA (1) 2013: 105-116 - 2012
- [j5]Sayed Chhattan Shah, Myong-Soon Park, Wan Sik Choi, Zeeshan Hameed Mir, Sajjad Hussain Chauhdary, Ali Kashif Bashir, Fida Hussain Chandio:
An Adaptive Distance-based Resource Allocation Scheme for Interdependent Tasks in Mobile Ad Hoc Computational Grids. Inf. Technol. Control. 41(4): 307-317 (2012) - [j4]Sajjad Hussain Chauhdary, Jeongjoon Lee, Sayed Chhattan Shah, Myong-Soon Park:
EBCO - Efficient Boundary Detection and Tracking Continuous Objects in WSNs. KSII Trans. Internet Inf. Syst. 6(11): 2901-2919 (2012) - [j3]Sayed Chhattan Shah, Qurat ul Ain Nizamani, Sajjad Hussain Chauhdary, Myong-Soon Park:
An effective and robust two-phase resource allocation scheme for interdependent tasks in mobile ad hoc computational Grids. J. Parallel Distributed Comput. 72(12): 1664-1679 (2012) - 2011
- [j2]Ali Kashif Bashir, Se-Jung Lim, Sajjad Hussain Chauhdary, Myong-Soon Park:
Energy Efficient In-network RFID Data Filtering Scheme in Wireless Sensor Networks. Sensors 11(7): 7004-7021 (2011)
2000 – 2009
- 2008
- [j1]Jung-Hwan Kim, Kee-Bum Kim, Sajjad Hussain Chauhdary, WenCheng Yang, Myong-Soon Park:
DEMOCO: Energy-Efficient Detection and Monitoring for Continuous Objects in Wireless Sensor Networks. IEICE Trans. Commun. 91-B(11): 3648-3656 (2008) - [c3]Jung-Hwan Kim, Sajjad Hussain Chauhdary, WenCheng Yang, Dong-Sub Kim, Myong-Soon Park:
PRODUCE: A Probability-Driven Unequal Clustering Mechanism for Wireless Sensor Networks. AINA Workshops 2008: 928-933 - [c2]Sajjad Hussain Chauhdary, Ali Kashif Bashir, Myong-Soon Park:
[ETCTR] Efficient Target Localization by Controlling the Transmission Range in Wireless Sensor Networks. NCM (1) 2008: 3-7 - [c1]Jung-Hwan Kim, Kee-Bum Kim, Sajjad Hussain Chauhdary, Min-Woo Cui, Myong-Soon Park:
Energy-Efficient Tracking of Continuous Objects in Wireless Sensor Networks. UIC 2008: 323-337
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-11 17:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint