default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 18 matches
- 2024
- Abdullah Al Shaheer, Syed Mohammad Hammad, Adil Sarwar, Mohammad Zaid, Shafiq Ahmad, Hwa-Dong Liu:
A Single Phase Five Level Switched Capacitor Inverter With Common Ground Configuration. IEEE Access 12: 101814-101828 (2024) - 2020
- M. Hammad Mazhar, Zubair Shafiq:
Characterizing Smart Home IoT Traffic in the Wild. IoTDI 2020: 203-215 - M. Hammad Mazhar, Zubair Shafiq:
Characterizing Smart Home IoT Traffic in the Wild. CoRR abs/2001.08288 (2020) - 2019
- Muhammad Noman Javed, Hammad Shafiq, Khubaib Amjad Alam, Abid Jamil, Muhammad Umar Sattar:
VANET's Security Concerns and Solutions: A Systematic Literature Review. ICFNDS 2019: 40:1-40:12 - Faiq Khalid, Hassan Ali, Hammad Tariq, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique:
QuSecNets: Quantization-based Defense Mechanism for Securing Deep Neural Network against Adversarial Attacks. IOLTS 2019: 182-187 - 2018
- Beenish A. Akram, Ali Hammad Akbar, M. Omair Shafiq:
HybLoc: Hybrid Indoor Wi-Fi Localization Using Soft Clustering-Based Random Decision Forest Ensembles. IEEE Access 6: 38251-38272 (2018) - Hammad Shafiq, Rana Asif Rehman, Byung-Seo Kim:
Services and Security Threats in SDN Based VANETs: A Survey. Wirel. Commun. Mob. Comput. 2018 (2018) - M. Hammad Mazhar, Zubair Shafiq:
Real-time Video Quality of Experience Monitoring for HTTPS and QUIC. INFOCOM 2018: 1331-1339 - Hassan Ali, Hammad Tariq, Muhammad Abdullah Hanif, Faiq Khalid, Semeen Rehman, Rehan Ahmed, Muhammad Shafique:
QuSecNets: Quantization-based Defense Mechanism for Securing Deep Neural Network against Adversarial Attacks. CoRR abs/1811.01437 (2018) - Hammad Tariq, Hassan Ali, Muhammad Abdullah Hanif, Faiq Khalid, Semeen Rehman, Rehan Ahmed, Muhammad Shafique:
SSCNets: A Selective Sobel Convolution-based Technique to Enhance the Robustness of Deep Neural Networks against Security Attacks. CoRR abs/1811.01443 (2018) - 2008
- Hamid Mukhtar, Kang-Myo Kim, Shafique Ahmad Chaudhry, Ali Hammad Akbar, Ki-Hyung Kim, Seung-Wha Yoo:
LNMP- Management architecture for IPv6 based low-power wireless Personal Area Networks (6LoWPAN). NOMS 2008: 417-424 - 2007
- Shafique Ahmad Chaudhry, Ali Hammad Akbar, Ki-Hyung Kim:
On the Interplay of Service Proximity and Ubiquity. IEICE Trans. Commun. 90-B(12): 3470-3479 (2007) - 2006
- Shafique Ahmad Chaudhry, Faysal Adeem Siddiqui, Ali Hammad Akbar, Ki-Hyung Kim:
NETSAQ: Network State Adaptive QoS Provisioning for MANETs. APNOMS 2006: 170-179 - Shafique Ahmad Chaudhry, Ali Hammad Akbar, Ki-Hyung Kim, Suk-Kyo Hong, Won-Sik Yoon:
HYWINMARC: An Autonomic Management Architecture for Hybrid Wireless Networks. EUC Workshops 2006: 193-202 - Shafique Ahmad Chaudhry, Won-Do Jung, Chaudhary Sajjad Hussain, Ali Hammad Akbar, Ki-Hyung Kim:
A Proxy-Enabled Service Discovery Architecture to Find Proximity-Based Services in 6LoWPAN. EUC 2006: 956-965 - Shafique Ahmad Chaudhry, Ali Hammad Akbar, Faisal Siddiqui, Ki-Hyung Kim:
Autonomic Network Management for Wireless Mesh and MANETs. IWSOS/EuroNGI 2006: 259 - Shafique Ahmad Chaudhry, Won-Do Jung, Ali Hammad Akbar, Ki-Hyung Kim:
Proxy-Based Service Discovery and Network Selection in 6LoWPAN. HPCC 2006: 525-534 - Shoaib Mukhtar, Ali Hammad Akbar, Shafique Ahmad Chaudhry, Won-Sik Yoon, Ki-Hyung Kim, Suk-Kyo Hong:
Mitigating Broadcast Storms in Stateless Address Auto-configuring MANETs. ICCSA (2) 2006: 847-855
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-05 20:11 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint