


default search action
Shafiullah Khan
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j47]Shafi Ullah Khan
, Carla E. Garcia
, Taewoong Hwang
, Insoo Koo
:
Radio Environment Map Construction Based on Privacy-Centric Federated Learning. IEEE Access 12: 28109-28121 (2024) - [j46]Shafiullah Khan, Muhammad Altaf Khan
, Noha Alnazzawi
:
Artificial Neural Network-Based Mechanism to Detect Security Threats in Wireless Sensor Networks. Sensors 24(5): 1641 (2024) - 2023
- [j45]Noor Mast
, Shafiullah Khan
, Muhammad Irfan Uddin
, Yazeed Yasin Ghadi
, Hend Khalid Alkahtani
, Samih Mohemmed Mostafa
:
A Cross-Layer Solution for Contention Control to Enhance TCP Performance in Wireless Ad-Hoc Networks. IEEE Access 11: 24875-24893 (2023) - [j44]Shah Fahad
, Shoaib Ahmed Khan
, Shiyou Yang
, Shafi Ullah Khan, Mustafa Tahir
, Muhammad Salman
:
Optimizing Multi-Modal Electromagnetic Design Problems Using Quantum Particle Swarm Optimization With Differential Evolution. IEEE Access 11: 101760-101775 (2023) - [j43]Syed Musanif Shah, Shafiullah Khan, Ghulam Saddiq, Naveed Abbas
, Muhammad Wasim
, Amjad Rehman
, Sarah Alotaibi
, Saeed Ali Bahaj
, Tanzila Saba
:
A Hybridized Optimal Algorithm for Multimodal Optimal Design of Inverse Problems. IEEE Access 11: 125159-125170 (2023) - [j42]Shafi Ullah Khan
, Sana Ullah Jan
, Insoo Koo
:
Robust Epileptic Seizure Detection Using Long Short-Term Memory and Feature Fusion of Compressed Time-Frequency EEG Images. Sensors 23(23): 9572 (2023) - 2022
- [j41]Muhammad Roman
, Abdul Shahid
, Shafiullah Khan
, Lisu Yu
, Muhammad Asif
, Yazeed Ghadi
:
Investigating Maps of Science Using Contextual Proximity of Citations Based on Deep Contextualized Word Representation. IEEE Access 10: 31397-31419 (2022) - [j40]Shah Fahad
, Shiyou Yang
, Shafi Ullah Khan, Shoaib Ahmed Khan
, Rehan Ali Khan
:
A Hybrid Smart Quantum Particle Swarm Optimization for Multimodal Electromagnetic Design Problems. IEEE Access 10: 72339-72347 (2022) - [j39]Muhammad Altaf Khan
, Moustafa M. Nasralla
, Muhammad Muneer Umar
, Ghani Ur Rehman, Shafiullah Khan, Nikumani Choudhury
:
An Efficient Multilevel Probabilistic Model for Abnormal Traffic Detection in Wireless Sensor Networks. Sensors 22(2): 410 (2022) - [j38]Wooseong Kim
, Muhammad Muneer Umar
, Shafiullah Khan
, Muhammad Altaf Khan
:
Novel Scoring for Energy-Efficient Routing in Multi-Sensored Networks. Sensors 22(4): 1673 (2022) - [j37]Saif-Ur Rehman, Noha Alnazzawi
, Jawad Ashraf
, Javed Iqbal, Shafiullah Khan:
Efficient Top-K Identical Frequent Itemsets Mining without Support Threshold Parameter from Transactional Datasets Produced by IoT-Based Smart Shopping Carts. Sensors 22(20): 8063 (2022) - [j36]Wali Ullah Khan
, Muhammad Awais Javed
, Tu N. Nguyen
, Shafiullah Khan, Basem M. ElHalawany
:
Energy-Efficient Resource Allocation for 6G Backscatter-Enabled NOMA IoV Networks. IEEE Trans. Intell. Transp. Syst. 23(7): 9775-9785 (2022) - [c2]Junaid Ur Rahman, Asfandyar Khan, Javed Iqbal Bangash, Abdullah Khan, Dzati Athiar Ramli, Shafiullah Khan:
An Efficient Smart Streamlet Management System Using Internet of Thing. KES 2022: 1743-1753 - 2021
- [j35]Muhammad Roman
, Abdul Shahid
, Shafiullah Khan
, Anis Koubaa, Lisu Yu
:
Citation Intent Classification Using Word Embedding. IEEE Access 9: 9982-9995 (2021) - [j34]Rehan Ali Khan
, Shiyou Yang
, Shah Fahad
, Shafi Ullah Khan
, Kalimullah:
A Modified Particle Swarm Optimization With a Smart Particle for Inverse Problems in Electromagnetic Devices. IEEE Access 9: 99932-99943 (2021) - [j33]Yanqing Cui
, Islam Zada, Sara Shahzad, Shah Nazir
, Shafi Ullah Khan, Naveed Hussain, Muhammad Asshad
:
Analysis of Service-Oriented Architecture and Scrum Software Development Approach for IIoT. Sci. Program. 2021: 6611407:1-6611407:14 (2021) - [j32]Rui Shang
, Balqees Ara, Islam Zada, Shah Nazir
, Zaid Ullah, Shafi Ullah Khan:
Analysis of Simple K-Mean and Parallel K-Mean Clustering for Software Products and Organizational Performance Using Education Sector Dataset. Sci. Program. 2021: 9988318:1-9988318:20 (2021) - 2020
- [j31]Shanshan Tu
, Obaid Ur Rehman
, Sadaqat ur Rehman, Shafi Ullah Khan
, Muhammad Waqas
, Ran Zhu
:
A Novel Quantum Inspired Particle Swarm Optimization Algorithm for Electromagnetic Applications. IEEE Access 8: 21909-21916 (2020) - [j30]Khalid Khan
, Amjad Mehmood
, Shafiullah Khan, Muhammad Altaf Khan, Zeeshan Iqbal
, Wali Khan Mashwani
:
A survey on intrusion detection and prevention in wireless ad-hoc networks. J. Syst. Archit. 105: 101701 (2020) - [j29]Wali Ullah Khan
, Furqan Jameel, Muhammad Ali Jamshed, Haris Pervaiz
, Shafiullah Khan, Ju Liu:
Efficient power allocation for NOMA-enabled IoT networks in 6G era. Phys. Commun. 39: 101043 (2020) - [j28]Wali Ullah Khan
, Furqan Jameel
, Tapani Ristaniemi
, Shafiullah Khan, Guftaar Ahmad Sardar Sidhu
, Ju Liu
:
Joint Spectral and Energy Efficiency Optimization for Downlink NOMA Networks. IEEE Trans. Cogn. Commun. Netw. 6(2): 645-656 (2020)
2010 – 2019
- 2019
- [j27]Naeem Khan, Khushal Khan, Asfandyar Khan, Imtiaz Alam, Faheem Ullah Khan, Shafi Ullah Khan, Amjad Ali:
Accommodate Data Loss in Monitoring Vital Signs Through Autoregressive Model. J. Medical Imaging Health Informatics 9(6): 1205-1214 (2019) - [j26]Munir Hussain, Amjad Mehmood
, Shafiullah Khan, Muhammad Altaf Khan, Zeeshan Iqbal
:
Authentication Techniques and Methodologies used in Wireless Body Area Networks. J. Syst. Archit. 101 (2019) - [j25]Muhammad Sohail
, Shafiullah Khan, Rashid Ahmad
, Dhananjay Singh
, Jaime Lloret
:
Game Theoretic Solution for Power Management in IoT-Based Wireless Sensor Networks. Sensors 19(18): 3835 (2019) - 2018
- [j24]Muhammad Muneer Umar
, Shafiullah Khan
, Rashid Ahmad
, Dhananjay Singh
:
Game Theoretic Reward Based Adaptive Data Communication in Wireless Sensor Networks. IEEE Access 6: 28073-28084 (2018) - [j23]Obaid Ur Rehman
, Sadaqat ur Rehman, Shan-Shan Tu, Shafiullah Khan, Muhammad Waqas
, Shiyou Yang:
A Quantum Particle Swarm Optimization Method With Fitness Selection Methodology for Electromagnetic Inverse Problems. IEEE Access 6: 63155-63163 (2018) - [j22]Shafiullah Khan, M. Kamran, Obaid Ur Rehman
, Lei Liu, Shiyou Yang:
A modified PSO algorithm with dynamic parameters for solving complex engineering design problem. Int. J. Comput. Math. 95(11): 2308-2329 (2018) - [j21]Muhammad Asif, Shafiullah Khan, Rashid Ahmad
, Dhananjay Singh
:
Game-Theoretic Solutions for Data Offloading in Next Generation Networks. Symmetry 10(8): 299 (2018) - 2017
- [j20]Muhammad Asif
, Shafiullah Khan
, Rashid Ahmad
, Muhammad Sohail
, Dhananjay Singh
:
Quality of Service of Routing Protocols in Wireless Sensor Networks: A Review. IEEE Access 5: 1846-1871 (2017) - [j19]Shafiullah Khan
, Jaime Lloret
, Houbing Song
, Qinghe Du
:
QoS Based Cooperative Communications and Security Mechanisms for Ad Hoc Sensor Networks. J. Sensors 2017: 9768421:1-9768421:2 (2017) - 2016
- [j18]Zeeshan Iqbal
, Shafiullah Khan
, Amjad Mahmood
, Jaime Lloret
, Nabil Ali Alrajeh
:
Adaptive Cross-Layer Multipath Routing Protocol for Mobile Ad Hoc Networks. J. Sensors 2016: 5486437:1-5486437:18 (2016) - [j17]Muhammad Altaf Khan, Shafiullah Khan, Bilal Shams, Jaime Lloret
:
Distributed flood attack detection mechanism using artificial neural network in wireless mesh networks. Secur. Commun. Networks 9(15): 2715-2729 (2016) - 2015
- [j16]Amjad Mehmood
, Shafiullah Khan, Bilal Shams, Jaime Lloret Mauri:
Energy-efficient multi-level and distance-aware clustering mechanism for WSNs. Int. J. Commun. Syst. 28(5): 972-989 (2015) - [j15]Shafiullah Khan, Jaime Lloret
, Elsa María Macías López
:
Bio-Inspired Mechanisms in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 173419:1-173419:2 (2015) - [j14]Sandra Sendra
, Lorena Parra
, Jaime Lloret
, Shafiullah Khan:
Systems and Algorithms for Wireless Sensor Networks Based on Animal and Natural Behavior. Int. J. Distributed Sens. Networks 11: 625972:1-625972:19 (2015) - 2014
- [j13]Nabil Ali Alrajeh, Shafiullah Khan, Jaime Lloret Mauri, Jonathan Loo:
Artificial Neural Network Based Detection of Energy Exhaustion Attacks in Wireless Sensor Networks Capable of Energy Harvesting. Ad Hoc Sens. Wirel. Networks 22(1-2): 109-133 (2014) - [j12]Shafiullah Khan, Jaime Lloret, Jonathan Loo
:
Intrusion Detection and Security Mechanisms for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j11]Fawaz S. Al-Anzi
, Shafiullah Khan
:
Wireless Mesh Network Cross-Layer Intrusion Detection. J. Comput. Sci. 10(12): 2366-2373 (2014) - 2013
- [j10]Nabil Ali Alrajeh
, Shafiullah Khan, Jaime Lloret
, Jonathan Loo
:
Secure Routing Protocol Using Cross-Layer Design and Energy Harvesting in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j9]Nabil Ali Alrajeh
, Shafiullah Khan, Bilal Shams:
Intrusion Detection Systems in Wireless Sensor Networks: A Review. Int. J. Distributed Sens. Networks 9 (2013) - [e1]Shafiullah Khan, Al-Sakib Khan Pathan
:
Wireless Networks and Security, Issues, Challenges and Research Trends. Springer 2013, ISBN 978-3-642-36168-5 [contents] - 2012
- [j8]Shafiullah Khan, Nabil Ali Alrajeh, Kok-Keong Loo
:
Secure route selection in wireless mesh networks. Comput. Networks 56(2): 491-503 (2012) - [j7]Shafiullah Khan, Jonathan Loo
:
Cross Layer Secure and Resource-Aware On-Demand Routing Protocol for Hybrid Wireless Mesh Networks. Wirel. Pers. Commun. 62(1): 201-214 (2012) - 2011
- [j6]Carlene E.-A. Campbell, Kok-Keong Loo, Heba A. Kurdi, Shafiullah Khan:
Comparison of IEEE 802.11 and IEEE 802.15.4 for Future Green Multichannel Multi-radio Wireless Sensor Networks. Int. J. Commun. Networks Inf. Secur. 3(1) (2011) - [j5]Carlene E.-A. Campbell, Kok-Keong Loo
, Orhan Gemikonakli
, Shafiullah Khan, Dhananjay Singh
:
Multi-Channel Distributed Coordinated Function over Single Radio in Wireless Sensor Networks. Sensors 11(1): 964-991 (2011) - [j4]Carlene E.-A. Campbell, Shafiullah Khan, Dhananjay Singh
, Kok-Keong Loo
:
Multi-Channel Multi-Radio Using 802.11 Based Media Access for Sink Nodes in Wireless Sensor Networks. Sensors 11(5): 4917-4942 (2011) - 2010
- [j3]Shafiullah Khan, Kok-Keong Loo, Zia Ud Din:
Framework for intrusion detection in IEEE 802.11 wireless mesh networks. Int. Arab J. Inf. Technol. 7(4): 435-440 (2010) - [j2]Shafiullah Khan, Kok-Keong Loo, Noor Mast, Tahir Naeem:
SRPM: Secure Routing Protocol for IEEE 802.11 Infrastructure Based Wireless Mesh Networks. J. Netw. Syst. Manag. 18(2): 190-209 (2010)
2000 – 2009
- 2008
- [j1]Shafiullah Khan, Noor Mast, Kok-Keong Loo, Ayesha Salahuddin:
Passive Security Threats and Consequences in IEEE 802.11 Wireless Mesh Networks. J. Digit. Content Technol. its Appl. 2(3): 4-8 (2008) - 2005
- [c1]Mohamad Saraee, Shafiullah Khan, Sertan Yamaner:
Data Mining Approach to Implement a Recommendation System for Electronic Tour Guides. CSREA EEE 2005: 215-218
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint