default search action
Mazhar Ali
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j36]Mazhar Ali, Huma Amir:
Understanding consumer herding behavior in online purchases and its implications for online retailers and marketers. Electron. Commer. Res. Appl. 64: 101356 (2024) - [c12]Mazhar Ali, Ajit Kumar, Bong Jun Choi:
Power Quality Forecasting of Microgrids Using Adaptive Privacy-Preserving Machine Learning. ACNS Workshops (1) 2024: 235-245 - [c11]Syed Saqib Ali, Ajit Kumar, Mazhar Ali, Ankit Kumar Singh, Bong Jun Choi:
Temporal Adaptive Clustering for Heterogeneous Clients in Federated Learning. ICOIN 2024: 11-16 - [c10]Md Moshiur Rahman, Mazhar Ali, Airin Rahman, Wei Sun:
A Real-Time Cyber-Physical HIL Testbed for Cybersecurity in Distribution Grids with DERs. ISGT 2024: 1-5 - 2023
- [j35]Kamran Sattar Awaisi, Assad Abbas, Hasan Ali Khattak, Arsalan Ahmad, Mazhar Ali, Abbas Khalid:
Deep reinforcement learning approach towards a smart parking architecture. Clust. Comput. 26(1): 255-266 (2023) - [j34]Mazhar Ali:
Partial transpose moments, principal minors and entanglement detection. Quantum Inf. Process. 22(5): 207 (2023) - 2022
- [j33]Adil Adeel, Mazhar Ali, Abdul Nasir Khan, Tauqeer Khalid, Faisal Rehman, Yaser Jararweh, Junaid Shuja:
A multi-attack resilient lightweight IoT authentication scheme. Trans. Emerg. Telecommun. Technol. 33(3) (2022) - [j32]Sagheer Ahmed Jan, Noor Ul Amin, Junaid Shuja, Assad Abbas, Mohammed Maray, Mazhar Ali:
SELWAK: A Secure and Efficient Lightweight and Anonymous Authentication and Key Establishment Scheme for IoT Based Vehicular Ad hoc Networks. Sensors 22(11): 4019 (2022) - 2021
- [j31]Sagheer Ahmed Jan, Noor Ul Amin, Mohamed Othman, Mazhar Ali, Arif Iqbal Umar, Abdul Basir:
A Survey on Privacy-Preserving Authentication Schemes in VANETs: Attacks, Challenges and Open Issues. IEEE Access 9: 153701-153726 (2021) - [j30]Zeyad A. Al-Odat, Mazhar Ali, Assad Abbas, Samee U. Khan:
Secure Hash Algorithms and the Corresponding FPGA Optimization Techniques. ACM Comput. Surv. 53(5): 97:1-97:36 (2021) - [j29]Tauqeer Khalid, Muhammad Abbas Khan Abbasi, Maria Zuraiz, Abdul Nasir Khan, Mazhar Ali, Raja Wasim Ahmad, Joel J. P. C. Rodrigues, Mudassar Aslam:
A survey on privacy and access control schemes in fog computing. Int. J. Commun. Syst. 34(2) (2021) - [j28]Mazhar Ali:
Genuinely entangling uncorrelated atoms via Jaynes-Cummings interactions. Quantum Inf. Process. 20(9): 311 (2021) - [j27]Mazhar Ali, Assad Abbas, Muhammad Usman Shahid Khan, Samee U. Khan:
SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud. IEEE Trans. Cloud Comput. 9(1): 347-359 (2021) - [c9]Neeli Khan, Duaa Baig, Muhammad Usman Shahid Khan, Assad Abbas, Mazhar Ali:
Malware Detection in Android via Neural Network using Entropy Features. FIT 2021: 240-245 - [c8]Duaa Baig, Muhammad Usman Shahid Khan, Darren Dancey, Assad Abbas, Mazhar Ali, Raheel Nawaz:
Malware Detection and Classification along with Trade-off Analysis for Number of Features, Feature Types, and Speed. FIT 2021: 246-251 - [i1]Mazhar Ali, Elena N. Gryazina, Anatoly Dymarsky, Petr Vorobev:
Voltage Feasibility Boundaries for Power System Security Assessment. CoRR abs/2103.00168 (2021) - 2020
- [j26]Danish Iqbal, Assad Abbas, Mazhar Ali, Muhammad Usman Shahid Khan, Raheel Nawaz:
Requirement Validation for Embedded Systems in Automotive Industry Through Modeling. IEEE Access 8: 8697-8719 (2020) - [j25]Faisal Rehman, Osman Khalid, Nuhman ul Haq, Tahir Maqsood, Mazhar Ali, Raja Wasim Ahmad, Junaid Shuja, Shahzad Sarwar, Sajjad Ahmad Madani:
A scalable model for real-time venue recommendations using MapReduce. Concurr. Comput. Pract. Exp. 32(21) (2020) - [c7]Wajid Khan, Sara Ali, Muhammad Usman Shahid Khan, Muhammad Jawad, Mazhar Ali, Raheel Nawaz:
AdaDiffGrad: An Adaptive Batch Size Implementation Technique for DiffGrad Optimization Method. IIT 2020: 209-214
2010 – 2019
- 2019
- [j24]Kamran Sattar Awaisi, Assad Abbas, Mahdi Zareei, Hasan Ali Khattak, Muhammad Usman Shahid Khan, Mazhar Ali, Ikram Ud Din, Sajid Shah:
Towards a Fog Enabled Efficient Car Parking Architecture. IEEE Access 7: 159100-159111 (2019) - [j23]Anum Khurshid, Abdul Nasir Khan, Fiaz Gul Khan, Mazhar Ali, Junaid Shuja, Atta ur Rehman Khan:
Secure-CamFlow: A device-oriented security model to assist information flow control systems in cloud environments for IoTs. Concurr. Comput. Pract. Exp. 31(8) (2019) - [j22]Sardar Khaliq uz Zaman, Tahir Maqsood, Mazhar Ali, Kashif Bilal, Sajjad Ahmad Madani, Atta ur Rehman Khan:
A load balanced task scheduling heuristic for large-scale computing systems. Comput. Syst. Sci. Eng. 34(2) (2019) - [j21]Tauqeer Khalid, Abdul Nasir Khan, Mazhar Ali, Adil Adeel, Atta ur Rehman Khan, Junaid Shuja:
A fog-based security framework for intelligent traffic light control system. Multim. Tools Appl. 78(17): 24595-24615 (2019) - [c6]Sajjad Asefi, Mazhar Ali, Elena N. Gryazina:
Optimal Energy Management for Off-Grid Hybrid System using Hybrid Optimization Technique. ISGT Europe 2019: 1-5 - 2018
- [j20]Muhammad Usman Shahid Khan, Assad Abbas, Mazhar Ali, Muhammad Jawad, Samee U. Khan, Keqin Li, Albert Y. Zomaya:
On the Correlation of Sensor Location and Human Activity Recognition in Body Area Networks (BANs). IEEE Syst. J. 12(1): 82-91 (2018) - [j19]Mazhar Ali, Kashif Bilal, Samee U. Khan, Bharadwaj Veeravalli, Keqin Li, Albert Y. Zomaya:
DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security. IEEE Trans. Cloud Comput. 6(2): 303-315 (2018) - [j18]Muhammad Usman Shahid Khan, Mazhar Ali, Assad Abbas, Samee U. Khan, Albert Y. Zomaya:
Segregating Spammers and Unsolicited Bloggers from Genuine Experts on Twitter. IEEE Trans. Dependable Secur. Comput. 15(4): 551-560 (2018) - [c5]Muhammad Usman Shahid Khan, Assad Abbas, Mazhar Ali, Muhammad Jawad, Samee U. Khan:
Convolutional Neural Networks as Means to Identify Apposite Sensor Combination for Human Activity Recognition. CHASE 2018: 45-50 - [c4]Tanvir Ahmed, Mazhar Ali, Dawar Awan:
Techno-Economic Study of Electricity Generation from Wind at Kallar-Kahar Region in Pakistan. FIT 2018: 275-280 - [c3]Zeyad A. Al-Odat, Mazhar Ali, Samee U. Khan:
Mitigation and Improving SHA-1 Standard Using Collision Detection Approach. FIT 2018: 333-338 - 2017
- [j17]Abdul Nasir Khan, Mazhar Ali, Atta ur Rehman Khan, Fiaz Gul Khan, Iftikhar Ahmed Khan, Waqas Jadoon, Shahab Shamshirband, Anthony T. Chronopoulos:
A comparative study and workload distribution model for re-encryption schemes in a mobile cloud computing environment. Int. J. Commun. Syst. 30(16) (2017) - [j16]Mazhar Ali, Revathi Dhamotharan, Eraj Khan, Samee U. Khan, Athanasios V. Vasilakos, Keqin Li, Albert Y. Zomaya:
SeDaSC: Secure Data Sharing in Clouds. IEEE Syst. J. 11(2): 395-404 (2017) - [j15]Mazhar Ali, Saif Ur Rehman Malik, Samee U. Khan:
DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party. IEEE Trans. Cloud Comput. 5(4): 642-655 (2017) - 2016
- [j14]Mazhar Ali, Samee U. Khan, Albert Y. Zomaya:
Security and Dependability of Cloud-Assisted Internet of Things. IEEE Cloud Comput. 3(2): 24-26 (2016) - [j13]Assad Abbas, Mazhar Ali, Muhammad Usman Shahid Khan, Samee U. Khan:
Personalized healthcare cloud services for disease risk assessment and wellness management using social media. Pervasive Mob. Comput. 28: 81-99 (2016) - [c2]Zahid Mahmood, Muhammad Nazeer, Muhammad Arif Mughal, Imran Shahzad, Fahad Khan, Mazhar Ali, Uzair Khan, Samee U. Khan:
Boosting the Accuracy of AdaBoost for Object Detection and Recognition. FIT 2016: 105-110 - 2015
- [j12]Shahbaz Akhtar Abid, Mazliza Othman, Nadir Shah, Mazhar Ali, Atta ur Rehman Khan:
3D-RP: A DHT-Based Routing Protocol for MANETs. Comput. J. 58(2): 258-279 (2015) - [j11]Shahbaz Akhtar Abid, Mazliza Othman, Nadir Shah, Osama Sabir, Atta ur Rehman Khan, Mazhar Ali, Jawad Shafi, Saleem Ullah:
Merging of DHT-based logical networks in MANETs. Trans. Emerg. Telecommun. Technol. 26(12): 1347-1367 (2015) - [j10]Abdul Nasir Khan, Miss Laiha Mat Kiah, Mazhar Ali, Shahaboddin Shamshirband, Atta ur Rehman Khan:
A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach. J. Grid Comput. 13(4): 651-675 (2015) - [j9]Mazhar Ali, Samee U. Khan, Athanasios V. Vasilakos:
Security in cloud computing: Opportunities and challenges. Inf. Sci. 305: 357-383 (2015) - [c1]Assad Abbas, Muhammad Usman Shahid Khan, Mazhar Ali, Samee U. Khan, Laurence T. Yang:
A Cloud Based Framework for Identification of Influential Health Experts from Twitter. UIC/ATC/ScalCom 2015: 831-838 - 2014
- [j8]Assad Abbas, Mazhar Ali, Ahmad Fayyaz, Ankan Ghosh, Anshul Kalra, Samee Ullah Khan, Muhammad Usman Shahid Khan, Thiago De Menezes, Sayantica Pattanayak, Alarka Sanyal, Saeeda Usman:
A survey on energy-efficient methodologies and architectures of network-on-chip. Comput. Electr. Eng. 40(8): 333-347 (2014) - [j7]Kashif Bilal, Saif Ur Rehman Malik, Osman Khalid, Abdul Hameed, Enrique Alvarez, Vidura Wijaysekara, Rizwana Irfan, Sarjan Shrestha, Debjyoti Dwivedy, Mazhar Ali, Usman Shahid Khan, Assad Abbas, Nauman Jalil, Samee Ullah Khan:
A taxonomy and survey on Green Data Center Networks. Future Gener. Comput. Syst. 36: 189-208 (2014) - [j6]Mazhar Ali:
Evolution of Genuine Multipartite Entanglement of Specific and Random States Under non-Markovian Noise. Open Syst. Inf. Dyn. 21(4) (2014) - [j5]Abdul Nasir Khan, Miss Laiha Mat Kiah, Sajjad Ahmad Madani, Mazhar Ali, Atta ur Rehman Khan, Shahaboddin Shamshirband:
Incremental proxy re-encryption scheme for mobile cloud computing environment. J. Supercomput. 68(2): 624-651 (2014) - [j4]Atta ur Rehman Khan, Mazliza Othman, Mazhar Ali, Abdul Nasir Khan, Sajjad Ahmad Madani:
Pirax: framework for application piracy control in mobile cloud environment. J. Supercomput. 68(2): 753-776 (2014) - [j3]Abdul Nasir Khan, Miss Laiha Mat Kiah, Mazhar Ali, Sajjad Ahmad Madani, Atta ur Rehman Khan, Shahaboddin Shamshirband:
BSS: block-based sharing scheme for secure data storage services in mobile cloud environment. J. Supercomput. 70(2): 946-976 (2014) - 2013
- [j2]Abdul Nasir Khan, Miss Laiha Mat Kiah, Sajjad Ahmad Madani, Atta ur Rehman Khan, Mazhar Ali:
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J. Supercomput. 66(3): 1687-1706 (2013)
2000 – 2009
- 2007
- [j1]Kedar S. Ranade, Mazhar Ali:
The Jamiołkowski Isomorphism and a Simplified Proof for the Correspondence Between Vectors Having Schmidt Number k and k-Positive Maps. Open Syst. Inf. Dyn. 14(4): 371-378 (2007)
Coauthor Index
aka: Usman Shahid Khan
aka: Samee U. Khan
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint