![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Likely matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 24 matches
- 2024
- Inam Ul Haq, Asadur Rahman
, S. M. Suhail Hussain
:
Impact of network degradation on load frequency control of large interconnected power system. Comput. Electr. Eng. 118: 109394 (2024) - Ghani Ur Rehman, Muhammad Inam Ul Haq, Afzal Badshah, Muhammad Zubair, Amil Daraz, Salman A. AlQahtani, Atif M. Alamri:
Reliable community card system for detecting and isolating selfish vehicles in smart and connected communities-based VDTN's. Trans. Emerg. Telecommun. Technol. 35(6) (2024) - 2023
- Tehseen Mazhar
, Hafiz Muhammad Irfan, Sunawar Khan, Inayatul Haq
, Inam Ullah, Muhammad Iqbal, Habib Hamam
:
Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods. Future Internet 15(2): 83 (2023) - Ghani Ur Rehman
, Muhammad Inam Ul Haq
, Muhammad Zubair
, Zafar Mahmood, Madhusudan Singh
, Dhananjay Singh
:
Misbehavior of nodes in IoT based vehicular delay tolerant networks VDTNs. Multim. Tools Appl. 82(5): 7841-7859 (2023) - Inam ul Haq, Jian Wang, Youwen Zhu, Sheharyar Nasir:
An Anonymous Authenticated Key Agreement Protocol Secure in Partially Trusted Registration Server Scenario for Multi-Server Architectures. IACR Cryptol. ePrint Arch. 2023: 1193 (2023) - 2022
- Inam Ullah Khan
, Sami Azam
, Sidratul Montaha
, Abdullah Al Mahmud
, A. K. M. Rakibul Haque Rafid, Md. Zahid Hasan, Mirjam Jonkman:
An effective approach to address processing time and computational complexity employing modified CCT for lung disease classification. Intell. Syst. Appl. 16: 200147 (2022) - Mohib Ullah
, Rafiullah Khan
, Irfan Ullah Khan, Nida Aslam
, Sumayh S. Aljameel
, Muhammad Inam Ul Haq, Muhammad Arshad Islam
:
Profile Aware ObScure Logging (PaOSLo): A Web Search Privacy-Preserving Protocol to Mitigate Digital Traces. Secur. Commun. Networks 2022: 2109024:1-2109024:13 (2022) - Abdullah Al Mahmud
, Asif Karim, Inam Ullah Khan
, Pronab Ghosh, Sami Azam, Enamul Haque:
A Robust Deep Learning based Framework for High-Precision Detection of Liver Disease. ICCCM 2022: 9-18 - 2021
- Mohib Ullah
, Rafiullah Khan
, Muhammad Inam Ul Haq
, Atif Khan
, Wael Alosaimi
, Muhammad Irfan Uddin
, Abdullah Alharbi:
Multi-Group ObScure Logging (MG-OSLo) A Privacy-Preserving Protocol for Private Web Search. IEEE Access 9: 79005-79020 (2021) - Inam ul Haq
, Jian Wang, Youwen Zhu, Saad Maqbool:
An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation. Digit. Commun. Networks 7(1): 140-150 (2021) - Umer Farooq, Mohib Ullah
, Rafiullah Khan
, Abdullah Alharbi, Muhammad Irfan Uddin
, Muhammad Inam Ul Haq
, Wael Alosaimi:
IDBR: Iot Enabled Depth Base Routing Method for Underwater Wireless Sensor Network. J. Sensors 2021: 1-8 (2021) - 2020
- Inam Ul Haq, Qaisar Javaid
, Zahid Ullah, Zafar Zaheer, Mohsin Raza
, Muhammad Khalid
, Ghufran Ahmed
, Saleem Khan:
E2-MACH: Energy efficient multi-attribute based clustering scheme for energy harvesting wireless sensor networks. Int. J. Distributed Sens. Networks 16(10): 155014772096804 (2020) - Inam ul Haq
, Jian Wang, Youwen Zhu, Saad Maqbool:
A survey of authenticated key agreement protocols for multi-server architecture. J. Inf. Secur. Appl. 55: 102639 (2020) - Fakhri Alam Khan, Ateeq Ur Rehman Butt
, Muhammad Asif, Hanan Aljuaid, Awais Adnan, Sadaf Shaheen, Inam Ul Haq:
Burnt Human Skin Segmentation and Depth Classification Using Deep Convolutional Neural Network (DCNN). J. Medical Imaging Health Informatics 10(10): 2421-2429 (2020) - Inam ul Haq
, Jian Wang, Youwen Zhu:
Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks. J. Netw. Comput. Appl. 161: 102660 (2020) - 2019
- Fakhri Alam Khan
, Majid Khan, Muhammad Asif
, Afsheen Khalid, Inam Ul Haq:
Hybrid and Multi-Hop Advanced Zonal-Stable Election Protocol for Wireless Sensor Networks. IEEE Access 7: 25334-25346 (2019) - Inam ul Haq
, Jian Wang, Youwen Zhu
:
An Efficient Authenticated Key Agreement Scheme for Consumer USB MSDs Resilient to Unauthorized File Decryption. IEEE Trans. Consumer Electron. 65(1): 80-89 (2019) - 2016
- Nasir Saeed, Dost Muhammad Saqib Bhatti, Muhammad Inam Ul Haq:
Efficient Localization Algorithm for Wireless Sensor Networks Using Levenberg-Marquardt Refinement. Ad Hoc Sens. Wirel. Networks 34(1-4): 245-256 (2016) - Muhammad Qasim Khan, Steinar Hidle Andresen, Muhammad Inamul Inam Ul Haq:
Handover Architectures for Heterogeneous Networks Using the Media Independent Information Handover (MIH). Comput. Informatics 35(1): 177-202 (2016) - 2013
- Muhammad Nawaz, John Cosmas, Awais Adnan, Muhammad Inam Ul Haq, Eman Alazawi:
Foreground detection using background subtraction with histogram. BMSB 2013: 1-5 - 2010
- Inam Ul-Haque, Erwin Prassler:
Experimental Evaluation of a Low-cost Mobile Robot Localization Technique for Large Indoor Public Environments. ISR/ROBOTIK 2010: 1-7 - 2007
- Mohammad Inam ul Haq, Abdul Muhamin Naeem, Irshad Ahmad, Muhammad Arshad Islam
:
Radon Transform Based Real-Time Weed Classifier. CGIV 2007: 245-249 - 1977
- Mohammad Inam ul Haq:
On Safeguarding Statistical Disclosure by Giving Approximate Answers to Queries. International Computing Symposium 1977: 491-495 - 1975
- Mohammed Inam Ul Haq:
Insuring individual's privacy from statistical data base users. AFIPS National Computer Conference 1975: 941-946
loading more results
failed to load more results, please try again later
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-08-06 18:19 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint