default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 156 matches
- 2024
- Habib Ullah Khan, Muhammad Zain Malik, Shah Nazir:
Identifying the AI-based solutions proposed for restricting Money Laundering in Financial Sectors: Systematic Mapping. Appl. Artif. Intell. 38(1) (2024) - Muhammad Adil, Habib Ullah Khan, Mohammad Arif, Mian Shah Nawaz, Faheem Khan:
New Dimensions for Physical Layer Secret Key Generation: Excursion Lengths-Based Key Generation. IEEE Access 12: 82972-82983 (2024) - Habib Ullah Khan, Muhammad Abbas, Omar Alruwaili, Shah Nazir, Muhammad Hameed Siddiqi, Saad Awadh Alanazi:
Selection of a smart and secure education school system based on the internet of things using entropy and TOPSIS approaches. Comput. Hum. Behav. 159: 108346 (2024) - Habib Ullah Khan, Muhammad Abbas, Faheem Khan, Shah Nazir, Adel Binbusayyis, Abdulatif Alabdultif, Whangbo Taekeun:
Multi-criteria decision-making methods for the evaluation of the social internet of things for the potential of defining human behaviors. Comput. Hum. Behav. 157: 108230 (2024) - Inam Ullah, Farhad Ali, Habib Khan, Faheem Khan, Xiaoshan Bai:
Ubiquitous computation in internet of vehicles for human-centric transport systems. Comput. Hum. Behav. 161: 108394 (2024) - Inam Ullah, Deepak Adhikari, Habib Khan, Muhammad Shahid Anwar, Shabir Ahmad, Xiaoshan Bai:
Mobile robot localization: Current challenges and future prospective. Comput. Sci. Rev. 53: 100651 (2024) - Habib Khan, Tanveer Hussain, Samee Ullah Khan, Zulfiqar Ahmad Khan, Sung Wook Baik:
Deep multi-scale pyramidal features network for supervised video summarization. Expert Syst. Appl. 237(Part C): 121288 (2024) - Habib Ullah Khan, V. V. Madhavi Lalitha, Mahmood A. Awan:
Possible impact of video lecture capture as an e-learning tool: a case study of higher education of Republic of Korea. Int. J. Bus. Inf. Syst. 45(2): 172-191 (2024) - Habib Khan, Inam Ullah, Mohammad Shabaz, Muhammad Faizan Omer, Muhammad Talha Usman, Mohammed Seghir Guellil, Jakeoung Koo:
Visionary vigilance: Optimized YOLOV8 for fallen person detection with large-scale benchmark dataset. Image Vis. Comput. 149: 105195 (2024) - Syed Ale Hassan, Shahzad Akbar, Habib Ullah Khan:
Detection of central serous retinopathy using deep learning through retinal images. Multim. Tools Appl. 83(7): 21369-21396 (2024) - Muhammad Ilyas, Siffat Ullah Khan, Habib Ullah Khan, Nasir Rashid:
Software integration model: An assessment tool for global software development vendors. J. Softw. Evol. Process. 36(4) (2024) - Habib Ullah Khan, Farhad Ali, Shah Nazir:
Systematic analysis of software development in cloud computing perceptions. J. Softw. Evol. Process. 36(2) (2024) - Habib Ullah Khan, Anwar Hussain, Faheem Khan, Faiz Abdullah Alotaibi, Mrim M. Alnfiai:
An Optimized Location-Based System for the Improvement of E-Commerce Systems. IEEE Trans. Consumer Electron. 70(2): 4998-5006 (2024) - Bakht Sher Ali, Inam Ullah, Tamara Al Shloul, Izhar Ahmed Khan, Ijaz Khan, Yazeed Yasin Ghadi, Akmalbek Abdusalomov, Rashid Nasimov, Khmaies Ouahada, Habib Hamam:
ICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networks. J. Supercomput. 80(6): 7876-7905 (2024) - Habib Ullah Khan, Nasir Ali, Farhad Ali, Shah Nazir:
Transforming future technology with quantum-based IoT. J. Supercomput. 80(15): 22362-22396 (2024) - Habib Ullah Khan, Waseem Afsar, Shah Nazir, Asra Noor, Mahwish Kundi, Mashael S. Maashi, Haya Mesfer Alshahrani:
Revolutionizing software developmental processes by utilizing continuous software approaches. J. Supercomput. 80(7): 9579-9608 (2024) - Inam Ullah, Deepak Adhikari, Habib Khan, Shabir Ahmad, Christian Esposito, Chang Choi:
Optimizing Mobile Robot Localization: Drones-Enhanced Sensor Fusion with Innovative Wireless Communication. INFOCOM (Workshops) 2024: 1-6 - Asifullah Khan, Anabia Sohail, Mustansar Fiaz, Mehdi Hassan, Tariq Habib Afridi, Sibghat Ullah Marwat, Farzeen Munir, Safdar Ali, Hannan Naseem, Muhammad Zaigham Zaheer, Kamran Ali, Tangina Sultana, Ziaurrehman Tanoli, Naeem Akhter:
A Survey of the Self Supervised Learning Mechanisms for Vision Transformers. CoRR abs/2408.17059 (2024) - 2023
- Habib Ullah Khan, Muhammad Zain Malik, Shah Nazir, Faheem Khan:
Utilizing Bio Metric System for Enhancing Cyber Security in Banking Sector: A Systematic Analysis. IEEE Access 11: 80181-80198 (2023) - Yasir Ali, Habib Ullah Khan:
A Survey on harnessing the Applications of Mobile Computing in Healthcare during the COVID-19 Pandemic: Challenges and Solutions. Comput. Networks 224: 109605 (2023) - Md Rahat Ibne Sattar, Md. Thowhid Bin Hossain Efty, Taiyaba Shadaka Rafa, Tusar Das, Md Sharif Samad, Abhijit Pathak, Mayeen Uddin Khandaker, Md Habib Ullah:
An advanced and secure framework for conducting online examination using blockchain method. Cyber Secur. Appl. 1: 100005 (2023) - Tehseen Mazhar, Hafiz Muhammad Irfan, Sunawar Khan, Inayatul Haq, Inam Ullah, Muhammad Iqbal, Habib Hamam:
Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods. Future Internet 15(2): 83 (2023) - Habib Ullah, Qunsheng Cao, Saeed Ur Rahman, Ijaz Khan, Inam Ullah:
Design and performance evaluation of SWB MIMO antenna with tri-notch functionality and mutual coupling suppression. IEICE Electron. Express 20(17): 20230246 (2023) - Habib Ullah Khan, Alimi Ademola Christopher, Mohammad Kamel Alomari:
Role of e-voting system for void of errors in the electoral manipulations: a case study of Nigeria. Int. J. Bus. Inf. Syst. 42(3/4): 478-502 (2023) - Habib Ullah Khan, Anwar Hussain, Shah Nazir, Farhad Ali, Muhammad Zubair Khan, Inam Ullah:
A Service-Efficient Proxy Mobile IPv6 Extension for IoT Domain. Inf. 14(8): 459 (2023) - Sangeen Khan, Sehat Ullah, Habib Ullah Khan, Inam Ur Rehman:
Digital-Twins-Based Internet of Robotic Things for Remote Health Monitoring of COVID-19 Patients. IEEE Internet Things J. 10(18): 16087-16098 (2023) - Yasir Ali, Habib Ullah Khan, Muhammad Khalid:
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review. J. Big Data 10(1): 128 (2023) - Habib Ullah Khan, Muhammad Sohail, Shah Nazir, Tariq Hussain, Babar Shah, Farman Ali:
Role of authentication factors in Fin-tech mobile transaction security. J. Big Data 10(1): 138 (2023) - Abdul Rehman Javed, Muhammad Usman Sarwar, Saif ur Rehman, Habib Ullah Khan, Yasser D. Al-Otaibi, Waleed S. Alnumay:
PP-SPA: Privacy Preserved Smartphone-Based Personal Assistant to Improve Routine Life Functioning of Cognitive Impaired Individuals. Neural Process. Lett. 55(1): 35-52 (2023) - Habib Ullah Khan, Muhammad Sohail, Farhad Ali, Shah Nazir, Yazeed Yasin Ghadi, Inam Ullah:
Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices. Phys. Commun. 59: 102084 (2023)
skipping 126 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-07 14:17 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint