Journal Articles – Published
I. U. Khan, and M. U. S. Khan, "Social Media Profiling for Political Affiliation Detection," Hum-Cent Intell Syst, 2024 doi:10.1007/s44230-024-00078-y
W. Afandi, S. M. A. H. Bukhari, M. U. S. Khan, T. Maqsood, M. A. B. Fayyaz, A. R. Ansari, "Explainable YouTube Video identification using Sufficient Input Subsets," IEEE Access, vol. 11, pp. 33178 - 33188, 2023 doi:10.1109/ACCESS.2023.3261562 IF:3.367
M. A. Iqbal, Y. C. Yoon, M. U. S. Khan, S. K. Kim, " Improved Open World Object Detection Using Class-Wise Feature Space Learning," IEEE Access, vol. 11, pp. 131221 - 131236, 2023 doi:10.1109/ACCESS.2023.3335602 IF:3.367
S. M.A.H. Bukhari, W. Afandi, M. U.S. Khan, T. Maqsood, M. B Qureshi, M. A. B. Fayyaz, R. Nawaz, "E-Ensemble: A Novel Ensemble Classifier for Encrypted Video Identification," Electronics, vol. 11, pp. 4076, 2022 doi:10.3390/electronics11244076 IF:2.690
W. Afandi, S. M. A. H. Bukhari, M. U. S. Khan, T. Maqsood, S. U. Khan, "Fingerprinting Technique for YouTube Videos Identification in Network Traffic," IEEE Access, vol. 10, pp. 76731-76741, 2022 doi:10.1109/ACCESS.2022.3192458 IF:3.367
M. U. S. Khan, S. M. A. H. Bukhari, T. Maqsood, M. A.B. Fayyaz, D. Dancey, and R. Nawaz, "SCNN-Attack: A Side-Channel Attack to Identify YouTube Videos in a VPN and Non-VPN Network Traffic," Electronics, vol. 11, pp. 350, 2022 doi:10.3390/electronics11030350 IF:2.397
M. U. S. Khan, M. Jawad, and S. U. Khan, "Adadb: Adaptive Diff-batch Optimization Technique for Gradient Descent," IEEE Access, vol. 9, pp. 99581-99588, 2021 doi:10.1109/ACCESS.2021.3096976 IF:3.367
K. S. Zaidi, S. Hina, M. Jawad, A. N. Khan, M U. S. Khan, H. B. Pervaiz, and R. Nawaz, “Beyond the horizon, backhaul connectivity for offshore IOT devices,” Energies, vol. 14, no. 21, p. 6918, 2021 doi:10.3390/en14216918 IF:3.004
M. Jawad, M. B. Qureshi, M. U. S. Khan, S. M. Ali, A. Mehmood, B. Khan, X. Wang, and S. U. Khan, "A Robust Optimization Technique for Energy Cost Minimization of Cloud Data Centers," IEEE Transactions on Cloud Computing, vol. 9, no. 2, pp. 447-460, 2021 doi:10.1109/TCC.2018.2879948 IF:5.938
S. Sajid, M. Jawad, K. Hamid, M. U.S. Khan, S. M. Ali, A. Abbas, S. U. Khan, "Blockchain-based decentralized workload and energy management of geo-distributed data centers," Sustainable Computing: Informatics and Systems, Vol. 29, March 2021, 100461 doi:10.1016/j.suscom.2020.100461 IF:4.028
M. Ali, A. Abbas, M. U. S. Khan, S. U. Khan, "SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud," IEEE Transactions on Cloud Computing, Vol. 9, no. 1, Jan.-March 1, 2021 doi:10.1109/TCC.2018.2854790 IF:5.938
M.U. S. Khan, A. Abbas, A. Rehman and R. Nawaz, "HateClassify: A Service Framework for Hate Speech Identification on Social Media," IEEE Internet Computing, Volume: 25, Issue: 1, pp. 40-49, Jan.-Feb. 1 2021 doi:10.1109/MIC.2020.3037034 IF:4.231
S. A. Ali, M. Jawad, M. U. S. Khan, K. Bilal, J. Glower, S. C. Smith, S. U. Khan, K. Li, and A. Y. Zomaya, “An Ancillary Services Model for Data Centers and Power Systems,” IEEE Transactions on Cloud Computing, Vol. 8, Issue: 4, pp. 1176-1188, Oct.-Dec. 1 2020 doi:10.1109/TCC.2017.2700838 IF:4.714
W. Ahmed, H. Ansari, B. Khan, Z. Ullah, S.M. Ali, C. A. Mahmood, M. B. Qureshi, I. Hussain, M. Jawad, M.U.S. Khan, A. Ullah, and R. Nawaz, "Machine Learning Based Energy Management Model for Smart Grid and Renewable Energy Districts," IEEE Access, vol. 8, pp. 185059-185078, oct, 2020 doi:10.1109/ACCESS.2020.3029943 IF:4.098
M. Jawad, M. B. Qureshi, S. M. Ali, N. Shabbir, M.U.S. Khan, A. Aloraini, and R. Nawaz, “A Cost-Effective Electric Vehicle Intelligent Charge Scheduling Method for Commercial Smart Parking Lots Using a Simplified Convex Relaxation Technique,” Sensors, vol. 20, no. 17, p. 4842, 2020 doi:10.3390/s20174842 IF:3.03
D. Iqbal, A. Abbas, M. Ali, M.U.S. Khan, and R. Nawaz, "Requirement Validation for Embedded Systems in Automotive Industry Through Modeling," IEEE Access, vol. 8, pp. 8697-8719, 2020 doi:10.1109/ACCESS.2019.2963774 IF:4.098
M. A. Rustam, B. Khan, S. M. Ali, C. A. Mahmood, M.U.S. Khan, and R. Nawaz, "An Adaptive Distributed Averaging Integral Control Scheme for Micro-Grids With Renewable Intermittency and Varying Operating Cost," IEEE Access, vol. 8, pp. 455-464, 2020 doi:10.1109/ACCESS.2019.2960855 IF:4.098
H. Ahmed, I. Ullah, U. Khan, M. B. Qureshi, S. Manzoor, N. Muhammad, M.U.S. Khan, and R. Nawaz, "Adaptive Filtering on GPS-Aided MEMS-IMU for Optimal Estimation of Ground Vehicle Trajectory," Sensors, Vol.19 No. 24 p.5357, 2019 doi:10.3390/s19245357 IF:3.03
K. S Awaisi, A. Abbas, M. Zareei, H. A. Khattak, M.U.S. Khan, M. Ali, I. U. Din, and S. Shah, S, "Towards a Fog Enabled Efficient Car Parking Architecture,” IEEE Access, vol. 7, pp.159100-159111, 2019 doi:10.1109/ACCESS.2019.2950950 IF:4.098
R. Irfan, O. Khalid, M.U.S. Khan, F. Rehman, A. U. Khan, R. Nawaz, "SocialRec: A Context-Aware Recommendation Framework With Explicit Sentiment Analysis," IEEE Access, vol. 7, pp 116295-308, 2019 doi:10.1109/ACCESS.2019.2932500 IF:4.098
H. Qadir, O. Khalid,M.U.S. Khan, A. U. R. Khan and R. Nawaz, "An Optimal Ride Sharing Recommendation Framework for Carpooling Services," IEEE Access, vol. 6, pp. 62296-62313, 2018 doi:10.1109/ACCESS.2018.2876595 IF:3.557
M.U.S. Khan, M. Ali, A. Abbas, S. U. Khan, and A. Y. Zomaya, “Segregating spammers and unsolicited bloggers from genuine experts on twitter,” IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 4, pp. 551–560, 2018 doi:10.1109/TDSC.2016.2616879 IF:2.926
M.U.S. Khan, A. Abbas, M. Ali, M. Jawad, S. U. Khan, K. Li, and A. Y. Zomaya, “On the correlation of sensor location and human activity recognition in body area networks (bans),” IEEE Systems Journal, vol. 12, no. 1, pp. 82–91, 2018 doi:10.1109/JSYST.2016.2610188 IF:3.882
M. A. Al-ghardi, K. D. Varathan, S. D. Ravana, E. Ahmed, G. Mujtaba, M.U.S. Khan, and S. U. Khan, “Analysis of Online Social Network Connections for Identification of Influential Users: Survey and Open Research Issues,” ACM Computing Surveys, Volume 51, no. 1, pp. 16-37, 2018 doi:10.1145/3155897 IF:6.748
M.U.S. Khan, O. Khalid, Y. Huang, F. Zhang, R. Ranjan, S. U. Khan, J.Cao, K. Li, B. Veeravalli, and A. Zomaya, “MacroServ: A Route Recommendation Service for Large-Scale Evacuations,” IEEE Transaction of Service Computing vol. 10, no. 4, pp. 589 - 602, July-Aug. 1 2017 doi:10.1109/TSC.2015.2497241 IF:3.52
R. Irfan, O. Khalid, M.U.S. Khan, C. Chira, R. Ranjan, F. Zhang, S. U. Khan, B. Veeravalli, K. Li, and A. Zomaya, “MobiContext: A Context-aware Cloud-based Recommendation Framework,” IEEE Transactions on Cloud Computing, vol. 5, no. 4, pp. 712-724, October-December, 2017 doi:10.1109/TCC.2015.2440243 IF:7.928
A. Abbas, M. Ali, M.U.S. Khan, and S. U. Khan, “Personalized Healthcare Cloud Services for Disease Risk Assessment and Wellness Management using Social Media,” Pervasive and Mobile Computing , vol. 28, pp. 81-99, 2016 doi:10.5555/2938785.2938895 IF:2.349
O. Khalid, M.U.S. Khan, Y. Huang, S. U. Khan, and A. Zomaya, “EvacSys: A Cloud-based Route Recommendation Framework for Large-Scale Emergency Evacuations,” IEEE Cloud Computing vol. 3, no. 1, pp. 60-68, 2016 doi:10.1109/MCC.2016.10 IF:0.929
A. Abbas , M. Ali , A. Fayyaz , A. Ghosh , A. Kalra , S. U. Khan , M.U.S. Khan , T. D. Menezes , S. Pattanayak , A. Sanyal , S. Usman, “A survey on energy-efficient methodologies and architectures of network-on-chip,” Computers and Electrical Engineering, vol. 40, no. 8, pp. 333-347, 2014 doi:10.1016/j.compeleceng.2014.07.012 IF:2.189
O. Khalid, M.U.S. Khan, S. U. Khan, and A. Y. Zomaya, “OmniSuggest: A Ubiquitous Cloud based Context Aware Recommendation System for Mobile Social Networks,” IEEE Transactions on Services Computing, vol. 7, no. 3, pp. 401-414, 2014 https://doi.org/10.1109/TSC.2013.53 IF:3.131
K. Bilal, S. U. R. Malik, O. Khalid, A. Hameed, E. Alvarez, V. Wijaysekara, R. Irfan, S. Shrestha, D. Dwivedy, M. Ali, U.S. Khan, A. Abbas, N. Jalil, and S. U. Khan, "A Taxonomy and Survey on Green Data Center Networks," Future Generation Computer Systems, vol. 36, pp. 189-208, 2014 doi:10.1016/j.future.2013.07.006 IF:5.768
Conference Papers
F. Nazir, N. Khan, M. U. S. Khan, A. Fayyaz, "Enhancing Android Platform Security: Investigating Malware Patterns with Sufficient Input Subset,"2023 International Conference on Frontiers of Information Technology (FIT) , Islamabad, Pakistan, December, 2023 doi:10.1109/FIT60620.2023.00059
R. N. B. Rais, O. Khalid, J. Nazar, M. U. S. Khan, "Analysis of Intrusion Detection Using Ensemble Stacking-Based Machine Learning Techniques in IoT Networks,"2023 International Conference on Advances in Computing Research (ACR’23), Orlando, FL, United States, May 8-10, 2023 doi:10.1007/978-3-031-33743-7_27
S. M. A. H. Bukhari, W. Afandi, T. Maqsood, M. U. S. Khan, "Encrypted video identification – Normalization and activation function perspective.," 3rd International Conference on Communication, computing, and digital systems (CCODE), Islamabad, 17-18 May 2023 doi:10.1109/C-CODE58145.2023.10139861
F. Nazir, M. U. S. Khan, N. Khan, A. Fayyaz, "Examining Malware Patterns in Android Platform using Sufficient Input Subset (SIS)," 2023 International Multi-disciplinary Conference in Emerging Research Trends (IMCERT), Karachi, 4-5 January 2023 doi:10.1109/IMCERT57083.2023.10075203
W. Afandi, S. M. A. H. Bukhari, M. U. S. Khan, T. Maqsood, and S. U. Khan, "A Bucket-Based Data Pre-Processing Method for Encrypted Video Detection," 35th International Conference on Computer Applications in Industry and Engineering (CAINE), Minneapolis, MN, USA, October 2022 doi:https://easychair.org/publications/download/P2Tp
S. S. Hassan, S. M. A. H. Bukhari, M. U. S. Khan, and T. Maqsood, "YouTube Video Identification in Encrypted Network Traffic -A Case of Attacking Assumptions," 19th International Bhurban Conference on Applied Sciences and Technology (IBCAST), Burban, Pakistan, August 2022 doi:10.1109/IBCAST54850.2022.9990455
A.S. Kamal, S. M. A. H. Bukhari, M. U. S. Khan, T. Maqsood, and M. A. B. Fayyaz, "Traffic Pattern Plot: Video Identification in Encrypted Network Traffic," 6th World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), London, UK, August 2022 doi:10.1007/978-981-19-7663-6
M. U. S. Khan, S. M. A. H. Bukhari, S. A. Khan and T. Maqsood, "ISP can identify YouTube videos that you just watched," 2021 International Conference on Frontiers of Information Technology (FIT), Islamabad, Pakistan, pp.1-6, 2021 doi:10.1109/FIT53504.2021.00011
S. M. A. H. Bukhari, M. U. S. Khan, T. Khan and M. Ali, "Social media, AI, and political affiliation," 2021 International Conference on Innovative Computing (ICIC), 2021, pp. 1-6, Pakistan, 2021 doi:10.1109/ICIC53490.2021.9709624
N. Khan, D. Baig, M. U. S. Khan, A. Abbas and M. Ali, "Malware Detection in Android via Neural Network using Entropy Features," 2021 International Conference on Frontiers of Information Technology (FIT), Islamabad, Pakistan, pp.240-245, 2021 doi:10.1109/FIT53504.2021.00052
D. Baig, M. U. S. Khan, D. Dancey, A. Abbas, M. Ali and R. Nawaz, "Malware Detection and Classification along with Trade-off Analysis for Number of Features, Feature Types, and Speed," 2021 International Conference on Frontiers of Information Technology (FIT), Islamabad, Pakistan, pp.246-251, 2021 doi:10.1109/FIT53504.2021.00053
S.A.H. Bukhari, T. Khan, M.U. S. Khan, and M. Ali, "Social media, AI, and political affiliation," 4th International Conference on Innovative Computing (ICIC 2021), Lahore, 9-10 November, 2021
M. Khan, D. Baig, U. S. Khan, and A. Karim, "Malware Classification Framework using Convolutional Neural Network," 2020 International Conference on Cyber Warfare and Security (ICCWS), Islamabad, Pakistan, pp. 1-7, 2020 doi:10.1109/ICCWS48432.2020.9292384
W. Khan, S. Ali, M. U. S. Khan, M. Jawad, M. Ali and R. Nawaz, "AdaDiffGrad: An Adaptive Batch Size Implementation Technique for DiffGrad Optimization Method," 2020 14th International Conference on Innovations in Information Technology (IIT), Al Ain, pp. 209-214, 2020 doi:10.1109/IIT50501.2020.9299013
A. Khan, S. Rehman, M. U. S. Khan, and M. Ali, "Synonym-based Attack to Confuse Machine Learning Classifiers Using Black-box Setting," 2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST), Karachi, Pakistan, 2019 doi:10.1109/ICEEST48626.2019.8981685 W
S. Sajid, M. Jawad, M. B. Qureshi, M. U. S. Khan, S. M. Ali and S. U. Khan, "A Conditional-Constraint Optimization for Joint Energy Management of Data Center and Electric Vehicle Parking-Lot," 2019 Tenth International Green and Sustainable Computing Conference (IGSC), Alexandria, VA, USA, 2019 doi:10.1109/IGSC48788.2019.8957214
S. u. Rehman, M. U. S. Khan, and M. Ali, "Blockchain-Based Approach for Proving the Source of Digital Media," 2020 3rd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), Sukkur, Pakistan, 2020 doi:10.1109/iCoMET48670.2020.9073820
M. Qazi, M. U. S. Khan, and M. Ali, "Detection of Fake News Using Transformer Model," 2020 3rd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), Sukkur, Pakistan, 2020 doi:10.1109/iCoMET48670.2020.9074071
S. I. Rai, M. U. S. Khan, and M. Waqas Anwar, "English to Urdu: Optimizing Sequence Learning in Neural Machine Translation," 2020 3rd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), Sukkur, Pakistan, 2020 doi:10.1109/iCoMET48670.2020.9074098
H. Khalil, M. U. S. Khan, and M. Ali, "Feature Selection for Unsupervised Bot Detection," 2020 3rd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), Sukkur, Pakistan, 2020 doi:10.1109/iCoMET48670.2020.9074131
S. Mohammad, M. U. S. Khan, M. Ali, L. Liu, M. Shardlow, and R. Nawaz, "Bot detection using a single post on social media," in Proc. WorldS4, 2019 doi:10.1109/WorldS4.2019.8903989
M. U. S. Khan, A. Abbas, M. Jawad, M. Ali, and S. U. Khan, "Convolutional Neural Networks as Means to Identify Apposite Sensor Combination for Human Activity Recognition," in 3rd IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), Washington D.C., USA, September 2018 doi:10.1145/3278576.3278594
R. Nawaz, W. Zhou, M. U. S. Khan, and O. Khalid, "A Qualitative Comparison of Popular Middleware Architectures used in Grid Computing Environment," International Conference on Computer and Communication Systems (ICCCS 2017), Poland, July 2017 doi:10.1109/CCOMS.2017.8075262
H. Qadir, O. Khalid, S. S. Hussain, and M. U. S. Khan, "Carpooling services: A comparative study," in Ist International Conference on Emerging Trends in Science and Technology (ICETST), Pakistan, Sept. 2016
A. Abbas, M. U. S. Khan, M. Ali, S. U. Khan, and L. T. Yang, "A Cloud Based Framework for Identification of Influential Health Experts from Twitter," in 15th International Conference on Scalable Computing and Communications (ScalCom), Beijing, China, Aug. 2015 doi:10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.163
Z. Mahmood, M. U. S. Khan, M. Jawad, S. U. Khan, and L. T. Yang, "A Parallel Framework for Object Detection and Recognition for Secure Vehicle Parking," in 17th IEEE International Conference on High Performance Computing and Communications (HPCC), New York, NY, USA, Aug. 2015 doi:10.1109/HPCC-CSS-ICESS.2015.18
A. Fayyaz, M. U. S. Khan, and S. U. Khan, "Energy Efficient Resource Scheduling through VM Consolidation in Cloud Computing," in 13th International Conference on Frontiers of Information Technology (FIT), Islamabad, Pakistan, Dec. 2015 doi:10.1109/FIT.2015.8
H. Afzal, U. S. Khan, I. Awan, and M. R. Mufti, "A Simple Greedy Algorithm for Cognitive Radio Networks" in 29th Annual UK Performance Engineering Workshop ( UKPEW), 2013
U. S. Khan, and T. Maqsood. "CRN Survey and A Simple Sequential MAC Protocol for CRN Learning," In COCORA 2012, The Second International Conference on Advances in Cognitive Radio, pp. 22-27. 2012.
T. Maqsood, U. S. Khan, S. Khan, and S. Madani, “Application of industrial informatics to electrical energy networks,” IEEE International Conference on Energy Systems Engineering (ICESE - 2010), Islamabad, Pakistan, October 2010
U. S. Khan, S. A. Khan, “Converting an existing communication system into SCA compliant SDR”, In 7th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications, p.187-191, Cambridge, UK, February 2008
Conference Posters
Y. Sadikaj, A. Abbas, U. S. Khan, A. Yusoff, J. Ashley, and S. U. Khan, "Personalized Health Insurance Services using Big Data," in ND EPSCoR State Conference, Grand Forks, ND, USA, April 2016.
Book Chapters
MUS Khan, SU Khan, AY Zomaya, "Introduction to big data-enabled Internet of Things", Big Data-Enabled Internet of Things
S. Mughal, K. S. Awaisi, A. Abbas I. Rehman, M. U. S. Khan, M. Ali , "A Reliable and Efficient Fog‐Based Architecture for Autonomous Vehicular Networks", og Computing: Theory and Practice, 2020
U. S. Khan and S. U. Khan, "Smart Data Centers," in Handbook on Data Centers, S. U. Khan and A. Y. Zomaya, Eds., Springer-Verlag, New York, USA, 2015, ISBN 978-1-4939-2091-4, Chapter 7.
M. Ali, M. U. S. Khan, A. Abbas, and S. U. Khan, "Software Piracy Control Framework in Mobile Cloud Computing Systems," in Advances in Mobile Cloud Computing Systems, R. Yu and V. C. M. Leung, Eds., CRC Press, New York, USA. (Accepted and to appear.)
K. Bilal, O. Khalid, S. U. R. Malik, M. U. S. Khan, S. U. Khan, and A. Y. Zomaya, "Fault Tolerance in the Cloud," in Encyclopedia on Cloud Computing, S. Murugesan and I. Bojanova, Eds., John Wiley & Sons, Hoboken, NJ, USA, 2015, ISBN: 978-1-1188-2197-8, Chapter 24.
Books
M. U. S. Khan, S. U. Khan, and A. Y. Zomaya, Big Data-Enabled Internet of Things, IET Press, London, UK. 2019.
Tutorial Presented
M. U. S. Khan and S. U. Khan, “Recommendation Systems for Big Data,” The 2014 World Congress in Computer Science, Computer Engineering, and Applied Computing (WORLDCOMP), cosponsors: World Academy of Science and Computer Science Research, Education, and Applications (CSREA), Las Vegas, NV, July 2014 (a half-day tutorial)
PhD Dissertation
https://library.ndsu.edu/ir/handle/10365/24999
MS-Thesis Supervised
Filza Amjad, "REAL-TIME SKETCH TO IMAGE", Dec 2023
Tariq Khan, "Detecting political affiliation using cnn", July 2021
Naseem Khan, “Malware Classification using reinforcement learning”, Dec 2020
Ayesha Aslam, "Deepfake Detection: Extracting Facial Features to Detect Deepfake Videos", Dec 2020
Wajid Khan, "An Adaptive Batch Size Implementation Technique for Diffgrad optimization methods", Dec 2020
Hania Khalil, “Feature Selection for Unsupervised Bot Detection”, Dec 2019
Shahid Rai, “English to Urdu: Optimizing Sequence Learning in Neural Machine Translation”, Dec 2019
Momina Qazi, “Detection of Fake News Using Transformer Model”, Dec 2019
Safi ur Rehman, “Blockchain-Based Approach for Proving the Source of Digital Media”, Dec 2019
Ashir Khan, “Synonym-based Attack to Confuse Machine Learning Classifiers Using Black-box Setting”, Dec 2019
Shad Mohammad , “Bot Detection Using a Single Post on Social Media”, Jan 2019
Muhammad Naeem, “Predicting Sentiment Bias using Personality Traits of Users on YouTube”, COMSATS UI, July 2018
Duua Baig, "Detection and Classification of Windows-Based Malware Samples," COMSATS UI, July 2018
Qurat-ul-ain, “A Network-aware Hierarchy-based Fog Computing Architecture,” COMSATS IIT, February 2017