Publications
For a complete updated list please visit my Google Scholar profile | DBLP
For a complete updated list please visit my Google Scholar profile | DBLP
Hayat M. Khan, Abid Khan, Farhana Jabeen, Gwanggil Jeon, "Fog-enabled Secure Multiparty Computation Based Aggregation Scheme in Smart Grids'', Elsevier: Computer & Electrical Engineering, 2021.
T Kanwal, A Anjum, Abid Khan, "Privacy Preservation of Electronic Health Records with Adversarial Attacks Identification in Hybrid Cloud", Elsevier: Computer Standards & Interfaces, 2021.
T Kanwal, A Anjum, Abid Khan, A Alia, "A Robust Privacy Preserving Approach for Electronic Health Records using Multiple Dataset with Multiple Sensitive Attributes", Elsevier: Computer & Security, 2021
F Zafar, Abid Khan, M Saif Ur Rehman, A Adeel, A Mansoor, "MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus'', Elsevier: Computer & Security (Accepted), 2021
Ikram Ullah, Munam A Shah, Abid Khan, Gwanggil Jeon, "Privacy‐preserving multilevel obfuscation scheme for vehicular network'', Wiley Transactions on Emerging Telecommunications Technologies.Vol.32(2) https://doi.org/10.1002/ett.4204, 2021
Abid Khan, F Shahid, A Ahmad, C Maple, G Jeon, "Towards Smart Manufacturing Using Spiral DT Framework and Twinchain'', IEEE Transaction on Industrial Informatics, : https://doi.org/10.1109/TII.2020.3047840, 2021
M Bello, I Majid, J Nadeem, Abid Khan, "Blockchain-based Secure Multi-Resource Trading Model for Smart Marketplace Computing'', Springer Computing, 2021
Abid Khan, D Sadia, J Gwanggil, P Francesco, ``Lucy with Agents in the Sky: Trustworthiness of Cloud Storage for Industrial Internet of Things'' IEEE Transaction on Industrial Informatics 17 (2), 953-960, https://doi.org/10.1109/TII.2020.2974493
2020
F Zafar, A Khan, A Anjum, C Maple, S Munam Ali, "Location Proof Systems for Smart Internet of Things: Requirement, Taxonomy, Comparative Analysis, and Future Challenges ", Electronics 2020, 9(11), 1776; https://doi.org/10.3390/electronics9111776 , October 2020
T Kanwal, A Anjum, A Khan, A Alia, G Jeon, "A Formal Adversarial Perspective: Secure and Efficient Electronic Health Records Collection Scheme for Multi-Records Datasets", Wiley, Transactions on Emerging Telecommunications Technologies, October,2020 (Accepted).
S Suhail, CS Hong, A Khan, "Orchestrating Product Provenance Story: When IOTA Ecosystem Meets The Electronics Supply Chain Space" Elsevier Computers in Industry, October 2020 (Accepted).
H Khan, A Khan, J Farhana, A Ur Rehman, "Privacy Preserving Data Aggregation with Fault Tolerance in Fog-enabled Smart Grid", Elsevier Sustainable Cities and Society, https://doi.org/10.1016/j.scs.2020.102522, October, 2020
AS Moqurrab, A Anjum, A Khan, A Mansoor, A Awais, J Gwanggil, "Deep-Confidentiality: An IoT-enabled Privacy Preserving Framework for Unstructured Big Biomedical Data", ACM Transaction on Internet Technology, September 2020 (Accepted).
K Raza ullah, A Adeel, A Khan, M Saifur Rehman, "(τ,m)-slicedBucket privacy model for sequential anonymization for improving privacy and utility", Wiley, Transactions on Emerging Telecommunications Technologies, https://doi.org/10.1002/ett.4130 ,August, 2020.
S Suhail, R Hussain, A Khan, CS Hong, "On the Role of Hash-based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions", IEEE Internet of Things Journal, https://doi.org/10.1109/JIOT.2020.3013019, 2020
A Waheed, MA Shah, A Khan, S Islam, C Maple, K Khan, "Volunteer Computing in Connected Vehicles: Opportunities and Challenges",https://doi.org/ 10.1109/MNET.011.1900603, IEEE Networks, 2020
F Shahid, A Khan, C Kim-Kwang Raymond, M Saif Ur Rehman, "WOTS-S: A Quantum Secure Compact Signature Scheme for Distributed Ledger", Elsevier: Information Sciences, 2020.
F Shahid, Abid Khan, "Smart Digital Signatures (SDS): A Post-quantum Digital Signature Scheme for Distributed Ledgers", Elsevier: Future Generation Computer Systems
K Razaullah, T Xiaofeng, A Adeel, K Tehseen, M Saif ur Rehman, Abid Khan, "θ-Sensitive k-Anonymity: An anonymization model for IoT based Electronic Health Records", MDPI Electronics
T Kanwal, A Anjum, Abid Khan, Privacy Preservation in E-Health Cloud: Taxonomy, Privacy Requirements, Feasibility Analysis, and Opportunities, Springer Cluster Computing
Ahsen Saleem, Abid Khan, Saifur Rehman, Masoom Alam, et al. “FESDA: Fog-Enabled Secure Data Aggregation in Smart Grid”, IEEE Internet of Things Journal, 2020 https://DOI:10.1109/JIOT.2019.2957314.
Sabah Suhail, M Abdellatif, SR Pandey, Abid Khan “Provenance-enabled Packet Path Tracing in the RPL-based Internet of Things”, Elsevier: Computer Networks, Volume 173, 2020, 107189, ISSN, 1389-1286, https://doi.org/10.1016/j.comnet.2020.107189.
Furqan Shahid, Abid Khan, Gwanggil Jeon, “Post-quantum distributed ledger for internet of things”, Elsevier: Computers & Electrical Engineering, Volume 83, 2020,106581, ISSN 0045-7906, https://doi.org/10.1016/j.compeleceng.2020.106581.
Furqan Shahid, Abid Khan, Smart Digital Signatures (SDS): A post-quantum digital signature scheme for distributed ledgers, Future Generation Computer Systems, 2020, ISSN 0167-739X, https://doi.org/10.1016/j.future.2020.04.042.
Abid Khan, Din Sadia, Gwaggnil Jeon, et al. “Lucy with Agents in the Sky: Trustworthiness of Cloud Storage for Industrial Internet of Things”, IEEE Transaction on Industrial Informatics, 2020, https://doi.org/10.1109/TII.2020.2974493
Razaullah Khan,Xiaofeng Tao, Adeel Anjum, Haider Sajjad,Saif ur Rehman Malik, Abid Khan et al., “Privacy Preserving for Multiple Sensitive Attributes against Fingerprint Correlation Attack Satisfying c-Diversity”, Wireless Communications and Mobile Computing, Vol 2020, https://doi.org/10.1155/2020/8416823
Tehseen Kanwal, Adeel Anjum, Abid Khan,“Privacy Preservation in e-health Cloud: Taxonomy, Privacy Requirements, Feasibility Analysis, and Opportunities”, Springer: Cluster Computing (2020). https://doi.org/10.1007/s10586-020-03106-1
Khan R, Tao X, Anjum A, Kanwal T, Malik SR, Abid Khan et al. “-Sensitive k-Anonymity: An Anonymization Model for IoT based Electronic Health Records.” MDPI Electronics. 2020; 9(5):716.
Aslam, S., Ahmed, M., Ahmed, I. Abid Khan et al. “OBAC: towards agent-based identification and classification of roles, objects, permissions (ROP) in distributed environment”, Multimedia Tools & Appl (2020). https://doi.org/10.1007/s11042-020-08764-2
Ayesha Amjid, Abid Khan, Munam Ali Shah,“VANET-based Volunteer Computing (VBVC): A Computational Paradigm for Future Autonomous Vehicles”, IEEE ACCESS, 2020, https://doi.org/10.1109/ACCESS.2020.2974500
Razaullah Khan, Adeel Anjum, Abid Khan, Sajjad Haider, “Privacy Preserving for Multiple Sensitive Attributes against Fingerprint Correlation Attack Satisfying C-Diversity”, Wireless Communication and Mobile Computing,2020, https://doi.org/10.1155/2020/8416823
Saira Beg, Naveed Ahmed, Adeel Anjum, Mansoor Ahmed, Abid Khan, Faisal Beg, Ahmed Khan, “S-box design based on optimize LFT parameter selection: a practical approach in recommendation system domain”, Springer: Multimedia Tools and Applications, https://doi.org/10.1007/s11042-019-08464-6
Sehrish Shafeeq, Masoom Alam and Abid Khan,“ Curbing Address Reuse in the IOTA Distributed Ledger: A Cuckoo Filter Based Approach”, IEEE Transaction on Engineering Management, June 2019,https://doi.org/10.1109/TEM.2019.2922710
Sehrish Shafeeq, Masoom Alam and Abid Khan, “Privacy Aware Decentralized Access Control System”, Elsevier: Future Generations Computer System, Volume 101, December 2019, Pages 420-433. https://doi.org/10.1016/j.future.2019.06.025
Idrees Ahmed, Abid Khan, Mansoor Ahmed, Saifur Rehman, “Order Preserving Secure Provenance Scheme for Distributed Networks”, Elsevier: Computer & Security, 2019, https://doi.org/10.1016/j.cose.2018.12.008
Umair Ahmed, Masoom Alam, Abid Khan, “Privacy Aware IOTA Ledger: Decentralized Mixing and Unlinkable IOTA Transactions”, Elsevier: Computer Networks, October 2018 https://doi.org/10.1016/j.comnet.2018.11.019
Haider Sajjad, Tehsin Kanwal, Adeel Anjum, Saif ur Rehman Malik, Ahmed Khan, Abid Khan,Umar Manzoor,“An Efficient Privacy Preserving Protocol for Dynamic Continuous Data Collection”, Elsevier: Computer & Security, Vol. 86, Sept 2019, P.358-371 https://doi.org/10.1016/j.cose.2019.06.017
Farah Naaz, Abid Khan, Mansoor Ahmed et al.“Watermarking as a Service (WaaS) with Anonymity”, Springer: Multimedia Tools and Applications, 2019,Impact Factor= 1.54, https://doi.org/10.1007/s11042-018-7074-2
Tehsin Kanwal, Sayed Ali Asjad Shaukat, Adeel Anjum, Saif ur Rehman Malik, Kim-Kwang Raymond Choo, Abid Khan, Naveed Ahmad, Mansoor Ahmad, Samee U. Khan, “Privacy preserving model and generalization correlation attacks for 1:M data with multiple sensitive attributes”, Elsevier: Information Sciences, 2019, ISSN 0020-0255, https://doi.org/10.1016/j.ins.2019.03.004.
Tehsin Kanwal, Adeel Anjum, Abid Khan et al.“Privacy aware Relationship Semantics based XACML Access Control Model (PRSX-AC) for EHRs in Hybrid Cloud”, International Journal of Distributed Sensor Networks Vol. 15(6),IF=1.787, https://doi.org/10.1177/1550147719846050
Adeel Anjum, Nayma Farooq, Saif Ur Rehman Malik, Abid Khan , Mansoor Ahmed, Moneeb Gohar, “An Effective Privacy Preserving Mechanism for 1: M Microdata with High Utility”, Elsevier: Sustainable Cities and Society, https://doi.org/10.1016/j.scs.2018.11.037
Idrees Ahmed, Abid Khan, Adeel Anjum, Mansoor Ahmed , A Secure Provenance Scheme for Detecting Consecutive Colluding Users in Distributed Networks, Springer, International Journal of Parallel Programming, Special Issue on Emerging Technology for Software Defined Network Enabled Internet of Things. https://doi.org/10.1007/s10766-018-0601-y
Usman Shafique, Abid Khan, Abdur Rehman, Faisal Bashir, Masoom Alam, “Towards detection of rank attack in routing protocol for low power lossy network”, Springer: Annals of Telecommunications, Special Issue on “Cloud Edge Computing in the IoT: Pave the way for an efficient data processing”, May 2018, https://doi.org/10.1007/s12243-018-0645-4
A Anjum, Naveed, M Asif, Abid Khan, AG Reddy, and T. Saba.“Privacy Preserving Data by Conceptualizing Smart Cities using MIDR Angelization”, Sustainable Cities and Society Elsevier, April 2018, https://doi.org/10.1016/j.scs.2018.04.014.
Adeel Anjum, Saif ur Rehman, Abid Khan et al. “Improved Generalization for Secure Data Publishing”, IEEE Access, https://doi.org/10.1109/ACCESS.2018.2828398
Farhana Jabeen, Zara Hamid, Abid Khan et al. ” Anonymity Preserving Reputation Management System for Health Sector “, PLOS ONE, 2018,https://doi.org/10.1371/journal.pone.0195021
27. Mansoor Ahmed, Kashif Riaz, Abid Khan et al. “Towards Ontology-based Multilingual URL Filtering: A Big Data Problem”, Springer: The Journal of Supercomputing, 2018, https://doi.org/10.1007/s11227-018-2338-1
Khizar Hameed, Abid Khan, Mansoor Ahmed et al., “Towards a Formally Verified Zero Watermarking Scheme for Data Integrity in the Internet of Things based-Wireless Sensor Networks”, Elsevier: Future Generation Computer System(FGCS), (IF =3.999), https://doi.org/10.1016/j.future.2017.12.009
Fuzel Jamil, Abid Khan, Mansoor Ahmed, Farhana Ahmed, and Nadeem Javaid, “Secure Provenance Using An Authenticated Data Structure Approach ”, Elsevier: Computer & Security, Volume 73, March 2018, Pages 34-56. https://doi.org/10.1016/j.cose.2017.10.005
Adeel Anjum,Saif ur Rehman,Kim-Kwang Raymond Choo, Abid Khan et al. “An Efficient Privacy Mechanism for Electronic Health Records”, Elsevier: Computer and Security, Volume 72, Pages 196-211, January 2018, https://doi.org/10.1016/j.cose.2017.09.014
Masoom Alam, Tanveer Khan, Naina, Abid Khan,Kim-Kwang Raymond Choo “Secure
policy execution using reusable garbled circuit in the cloud”, Elsevier: Future Generation Computer Systems, 2018, https://doi.org/10.1016/j.future.2017.12.067
Naina Emannual, Abid Khan,Masoom Alam, et al., “Structures and Data Preserving Homomorphic Signatures”,Elsevier: Journal of Networks and Computer Applications(JNCA) (IF=3.50), Available Online 20 November,2017. https://doi.org/10.1016/j.jnca.2017.11.005
Ahsen Saleem, Abid Khan, Furqan Shahid et al.,“ Recent Advancements in Garbled Computing: How far have we come towards achieving secure, efficient and reusable garbled circuits ”, Accepted in Elsevier: Journal of Networks and Computer Applications(JNCA), 2018. https://doi.org/10.1016/j.jnca.2018.02.006
Altaf Hussain, Muhammad Aleem, Abid Khan et al.“RALBA: A Computation-aware Load Balancing Scheduler for Cloud Computing”, Springer: Cluster Computing (IF=2.048),2018. https://doi.org/10.1007/s10586-018-2414-6
Umber Sheikh, Abid Khan et al.,“Provenance Inference Techniques: Applications, Taxonomy, Challenges and future trends”, Elsevier: Journal of Networks and Computer Applications(JNCA), 2018, https://doi.org/10.1016/j.jnca.2018.03.004
Sidra Aslam,Saif ul Islam, Abid Khan, et al. “Information collection centric techniques for cloud resource management: Taxonomy, analysis and challenges”, Elsevier: Journal of Network and Computer Applications (JNCA), https://doi.org/10.1016/j.jnca.2017.10.021
Adeel Aslam, Naveed Ahmad, Tanzila Saba, Abdul aziz S. Almazyad, Amjad Rehman, Adeel Anjum, and Abid Khan, Decision Support System for Risk Assessment and Management Strategies in Distributed Software Development, IEEE Access ( Volume: 5 ) Page(s): 20349 - 20373, Issue.99,2017 https://doi.org/10.1109/ACCESS.2017.2757605
Mouzna Tahir, Abid Khan, Abdul Hameed, Masoom Alam M.Khurram Khan, Farhana Jabeen,“ Towards a Set Aggregation-Based Data Integrity Scheme for Smart Grids”, Springer: Annals of Telecommunications, Special issue Security, privacy and forensics in the critical infrastructure – Advances and future directions, https://doi.org/10.1007/s12243-017-0602-7
Faheem Zafar, Abid Khan,Saba Suhail, Khizar Hameed, Hayat Mohammad Khan, Adeel Anjum, Farhana Jabeen“Trustworthy Data: A Survey, Taxonomy and future trends of Secure Provenance Schemes”, Elsevier: Journal of Networks and computer applications (JNCA), 94 (2017) 50–68, https://doi.org/10.1016/j.jnca.2017.06.003
40. F. Jabeen; Z. Hamid; A. Wadood; S. Ghouzali; S. u. r. Malik; Abid Khan; S. Nawaz; H. Ghafoor, “Enhanced Architecture for Privacy Preserving Data Integration in a Medical Research Environment”, in IEEE Access , vol.PP, no.99, pp.1-1, Date of Publication: 31 May 2017, http://doi.org/10.1109/ACCESS.2017.2707584
Shamaila Bisma Khan,Saif-ur-Rehman Malik, Masoom Alam, Abid Khan, Adnan Akhunzada, Muhammad Khurram Khan , “Formal Modeling and Verification of Security Information and Event Management System” Springer: Multimedia Tools and Applications: Special Issue on Big Data Security, 2017, https://doi.org/10.1007/s11042-017-4853-0
Adeel Anjum, Khurram Manzoor, Abid Khan et al. “Improved Generalization for Reducing Anonymization Cost”,Biomedical Research An International Journal of Medical Sciences, 2017
Adeel Anjum,Guillaume Raschia, , Marc Gelgon, Abid Khan, Mansoor Ahmed, Masoom Alam et al. “ -Safety: A Privacy Model for Sequential Publication with Arbitrary Updates”, Computer & Security:Elsevier Volume 66, May 2017, Pages 20–39
Anam nazir, Saifur rehman malik, Nadeem Cheema, Muhammad Khurram Khan, Ziang Yang, Tanveer Khan, and Abid Khan “A High-Level Domain-specific Language for SIEM: Design, Development and Formal Verification”, Cluster Computing: Springer, 2017 https://doi.org/10.1007/s10586-017-0819-2
Faheem Zafar, Abid Khan, Mansoor Ahmed et al. “A Survey of Data integrity schemes: Taxonomy, design challenges and future trends”, Computer & Security:Elsevier Volume, March 2017, Pages 29–49, https://doi.org/10.1016/j.cose.2016.10.006
Nadeem Javaid, Sheraz Hussain, Ashfaq Ahmad, Muhammad Imran, Abid Khan, Mohsen Guizan, ”Region based cooperative routing in underwater wireless sensor networks”, Journal of Network and Computer Applications, 2017. https://doi.org/10.1016/j.jnca.2017.01.013
Abid Khan, Sidra Tul Muntaha, Mansoor Ahmed, Adeel Anjum, Saif Ur Rehman, and Nadeem Javaid, “Preserving Privacy and leakage protection of Outsourced Genomic Data” Journal of Medical Imaging and Health Informatics, 2017, https://doi.org/10.1166/jmihi.2017.2186
Saleha Shafqat, Mansoor Ahmed, Abid Khan et al., “An Ontology-Based Approach for Detecting Drug Abuse Epidemiology”, Journal of Medical Imaging and Health Informatics, 2017, https://doi.org/10.1166/jmihi.2017.2253
Mariam Akbar, Nadeem Javaid, Wadood Abdul, Sanaa Ghouzali, Abid Khan, Iftikhar Azim Niaz, Manzoor Ilahi, “Balanced transmissions based trajectories of mobile sink in homogeneous wireless sensor networks”, Journal of Sensors, 2017, https://doi.org/10.1155/2017/4281597
Adeel Anjum, Saba Suhail, Faheem Zafar, Abid Khan, “Privacy Preservation in Skewed Data using Frequency Distribution and Weightage (FDW)”, Journal of Medical Imaging and Health Informatics, 2017 (IF 0.8)
Abid Khan, Farhana Jabeen,Farah Naz, Sabah Suhail, Mansoor Ahmed and Sarfaraz Nawaz, “Buyer Seller Watermarking Protocols Issues and Challenges - A Survey”, Journal of Network and Computer Applications: Elsevier Volume(75):pp:317-334, Nov 2016, https://doi.org/10.1016/j.jnca.2016.08.026
M. Alam, A.Ihsan, Abid Khan, Muazzam Ali et al.,“Optimizing SIEM Throughput on the Cloud Using Parallelization”, PLOS ONE Nov, 2016 http://dx.doi.org/10.1371/journal.pone.0162746 2016 (IF=3.54)
Faheem Zafar, Abid Khan, Mansoor Ahmed, Majid Iqbal Khan, Farhana Jabeen, Zara Hamid, Naveed Ahmed and Faisal Bashir, ”A Scalable Data Integrity Mechanism Based on Provable Data Possession and JARs”, KSII Transactions on Internet and Information Systems, vol. 10, no. 6, pp. 2851-2873, 2016. https://doi.org/10.3837/tiis.2016.06.022
Faisal Bashir, Meer Khan,Ali Lodhi, Abid Khan,“Sink-to-sink coordination framework using RPL: Routing protocol for low power and lossy networks”, Journal of Sensors Vol.2016(2016) http://dx.doi.org/10.1155/2016/2635429
Ashfaq Ahmad, Nadeem Javaid, Nabil Alrajeh, Zahoor Ali Khan, Umar Qasim, and Abid Khan ,“A Modified Feature Selection and Artificial Neural Network-Based Day-Ahead Load Forecasting Model for a Smart Grid”, Applied Sciences(Special Issue ”Applied Artificial Neural Network”), 2015, 5(4), 1756-1772; https://doi.org/10.3390/app5041756
Mukhtar Azeem, Majid Iqbal, Najamus Saqib,Manzoor Illahi, Abid Khan, and Mansoor Ahmed et al “Reactive GTS Allocation Protocol for Sporadic Events Using the IEEE 802.15.4”, Mathematical Problems in Engineering Volume 2014, https://doi.org/10.1155/2014/836524
Sidra Faheel, Munam Ali Shah, Abid Khan,Mansoor Ahmed, “Smart Cities: A Survey on Security Concerns”, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 7, No. 2, 2016
Saba Arshad, Munam Ali Shah, Abid Khan,Mansoor Ahmed,“ Android Malware Detection and Protection: A Survey” (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 7, No. 2, 2016 D. Mahmood, N. Javaid, Z. A. Khan, U. Qasim, A. Khan, S. Qurashi, A. Memon,“Modeling and Evaluating Performance of Routing Operations in Reactive Routing Protocols”,Journal of Basic and Applied Scientific Research, 2013(ISI-Index)
X. Niu, A. Khan et al. “Benchmarking Survey of Mobile Agent Systems”, Source: Tien Tzu Hsueh Pao/Acta Electronica Sinica, v 33, n SUPPL, December, 2005, Pages:2289-2293 ISSN: 0372-2112 Publisher: Chinese Institute of Electronics, Beijing, 100036,China (EI: Accession Number: 06289984570)