Mukhtar Azeem, Majid Iqbal, Najamus Saqib, Manzoor Illahi, Abid Khan, and Mansoor Ahmed et al. “Reactive GTS Allocation Protocol for Sporadic Events Using the IEEE 802.15.4,” Mathematical Problems in Engineering, Vol. 2014, pp. 1–13, 2014. http://dx.doi.org/10.1155/2014/836524 (IF: 1.179)
Yousaf S, Javaid N, Qasim U, Alrajeh N, Khan ZA, Ahmed M. “Towards Reliable and Energy-Efficient Incremental Cooperative Communication for Wireless Body Area Networks,” Sensors, 2016; 16(3):284. https://doi.org/10.3390/s16030284 (IF: 3.031)
Faheem Zafar, Abid Khan, Mansoor Ahmed et al. “A Survey of Data Integrity Schemes: Design Challenges, Taxonomy and Future Trends,” Computer & Security: Elsevier, Volume 65, March 2017, Pages 29–49. https://doi.org/10.1016/j.cose.2016.10.006 (IF: 3.062)
Abid Khan, Farhana Jabeen, Farah Naz, Sabah Suhail, Mansoor Ahmed, and Sarfaraz Nawaz, “Buyer-Seller Watermarking Protocols Issues and Challenges-A Survey,” Journal of Network and Computer Applications: Elsevier, Volume (75): pages- 317-334. https://doi.org/10.1016/j.jnca.2016.08.026 (IF: 5.273)
Faheem Zafar, Abid Khan, Mansoor Ahmed, Majid Iqbal Khan, Farhana Jabeen, Zara Hamid, Naveed Ahmed and Faisal Bashir, “A Scalable Data Integrity Mechanism Based on Provable Data Possession and JARs,” KSII Transactions on Internet and Information Systems (TIIS), vol. 10, no. 6, pp. 2851-2873, 2016. http://dx.doi.org/10.3837/tiis.2016.06.022 (IF: 0.711)
Adeel Anjum, Guillaume Raschia, Marc Gelgon, Abid Khan, Sai fur Rehman Malik, Naveed Ahmad, Mansoor Ahmed, Sabah Suhail, M. Masoom Alam, “τ-Safety: A Privacy Model for Sequential Publication with Arbitrary Updates,” Computer and Security: Elsevier, Volume 66, May 2017, Pages 20-39. https://doi.org/10.1016/j.cose.2016.12.014 (IF: 3.062)
Saba Arshad, Munam Ali Shah, Abid Khan and Mansoor Ahmed, “Android Malware Detection & Protection: A Survey,” International Journal of Advanced Computer Science and Applications (IJACSA), 7(2), 2016. https://doi.org/10.14569/ijacsa.2016.070262
Sidra Ijaz, Munam Ali Shah, Abid Khan and Mansoor Ahmed, “Smart Cities: A Survey on Security Concerns,” International Journal of Advanced Computer Science and Applications (IJACSA), 7(2), 2016. https://doi.org/10.14569/ijacsa.2016.070277
Sidra tul Muntaha, Abid Khan, Umar Manzoor, Kinza Sarwar, Mansoor Ahmed, Mouzna Tahir, Adeel Anjum, Saif ur Rehman, Masoom Alam, Nadeem Javaid, and Mohammed A. Balubaid, “Towards Preserving Privacy of Outsourced Genomic Data Over the Cloud,” J. Med. Imaging Health Inf, 7, 1475–1482 (2017). https://doi.org/10.1166/jmihi.2017.2186 (IF: 0.549)
Mobashirah Nasir, Adeel Anjum, Umar Manzoor, Mohammed A. Balubaid, Mansoor Ahmed, Abid Khan, Naveed Ahmad, Saif ur Rehman Malik, and Masoom Alam, “Privacy Preservation in Skewed Data Using Frequency Distribution and Weightage (FDW),” J. Med. Imaging Health Inf, 7, 1346–1357 (2017). https://doi.org/10.1166/jmihi.2017.2206 (IF: 0.549)
Saba Noor, Mansoor Ahmed, Malik Najmus Saqib, M. Abdullah-Al-Wadud, Md Saiful Islam, and Fazal-e-Amin, “Ontology for Attack Detection: Semantic-Based Approach for Genomic Data Security,” J. Med. Imaging Health Inf, 7, 1309–1323 (2017). https://doi.org/10.1166/jmihi.2017.2221 (IF: 0.549)
Saleha Asad, Tanzila Saba, Shariq Hussain, Mansoor Ahmed, Sheeraz Akram, Abid Khan, Adeel Anjum, Munim Ali Shah, and Nadeem Javaid, “An Ontology-Based Approach for Detecting Drug Abuse Epidemiology,” J. Med. Imaging Health Inf, 7, 1324–1337 (2017). https://doi.org/10.1166/jmihi.2017.2253 (IF: 0.549)
Sidra Aslam, Saif ul Islam, Abid Khan, Mansoor Ahmed, Adnan Akhundzada, Muhammad Khurram Khan, “Information Collection Centric Techniques for Cloud Resource Management: Taxonomy, Analysis and Challenges,” Journal of Network and Computer Applications, Volume 100, 2017, Pages 80-94, ISSN 1084-8045. https://doi.org/10.1016/j.jnca.2017.10.021 (IF: 5.273)
Khizar Hameed, Abid Khan, Mansoor Ahmed, Alavalapati Goutham Reddy, M. Mazhar Rathore, “Towards a Formally Verified Zero Watermarking Scheme for Data Integrity in the Internet of Things based-wireless Sensor Networks,” Future Generation Computer Systems, 2017, ISSN 0167-739X. https://doi.org/10.1016/j.future.2017.12.009 (IF: 5.768)
Hussain, M., Ahmed, M., Khattak, H.A., et al. “Towards ontology-based multilingual URL filtering: A Big Data Problem,” J Supercomput, (2018). https://doi.org/10.1007/s11227-018-2338-1 (IF: 2.157)
Idrees Ahmed, Abid Khan, Adeel Anjum, Mansoor Ahmed, Muhammad Asif Habib, “A Secure Provenance Scheme for Detecting Consecutive Colluding Users in Distributed Networks,” Int J Parallel Prog, (2018). https://doi.org/10.1007/s10766-018-0601-y (IF: 1.258)
Adeel Anjum, Tahir Ahmed, Abid Khan, Naveed Ahmad, Mansoor Ahmad, Muhammad Asif, Alavalapati Goutham Reddy, Tanzila Saba, Nayma Farooq, "Privacy-preserving data by conceptualizing smart cities using MIDR-Angelization,” Sustainable Cities and Society, Volume 40, 2018, Pages 326-334, ISSN 2210-6707. https://doi.org/10.1016/j.scs.2018.04.014 (IF: 4.624)
Fuzel Jamil, Abid Khan, Adeel Anjum, Mansoor Ahmed, Farhana Jabeen, Nadeem Javaid, “Secure provenance using an authenticated data structure approach,” Computers & Security, Volume 73, 2018, Pages 34-56, ISSN 0167-4048. https://doi.org/10.1016/j.cose.2017.10.005 (IF: 3.062)
Naz, F., Khan, A., Ahmed, M. et al. “Watermarking as a service (WaaS) with anonymity,” Multimed Tools Appl, (2019). https://doi.org/10.1007/s11042-018-7074-2 (IF:2.101)
Idrees Ahmed, Abid Khan, Mansoor Ahmed, Saif ur Rehman, “Order preserving secure provenance scheme for distributed networks,” Computers & Security, Volume 82, 2019, Pages 99-117, ISSN 0167-4048. https://doi.org/10.1016/j.cose.2018.12.008 (IF: 3.062)
Anjum, A., Farooq, N., Malik, S. U. R., Khan, A., Ahmed, M., & Gohar, M. (2019). “An effective privacy preserving mechanism for 1: M microdata with high utility,” Sustainable Cities and Society, 45, 213. https://doi.org/10.1016/j.scs.2018.11.037 (IF: 4.624)
Tehsin Kanwal, Sayed Ali Asjad Shaukat, Adeel Anjum, Saif ur Rehman Malik, Kim-Kwang Raymond Choo, Abid Khan, Naveed Ahmad, Mansoor Ahmad, Samee U. Khan, “Privacy-preserving model and generalization correlation attacks for 1:M data with multiple sensitive attributes,” Information Sciences, Elsevier, Volume 488, 2019, Pages 238-256, ISSN 0020-0255. https://doi.org/10.1016/j.ins.2019.03.004 (IF: 5.524)
Ali, Ahmad, Ahmad Kamran, Mansoor Ahmed, Basit Raza, and Muhammad Ilyas. “Privacy Concerns in Online Social Networks: A Users’ Perspective,” International Journal of Advanced Computer Science and Applications, vol. 10, no. 7 (2019). http://dx.doi.org/10.14569/ijacsa.2019.0100780
Beg, Saira, Naveed Ahmad, Adeel Anjum, Mansoor Ahmad, Abid Khan, Faisal Baig, and Ahmed Khan. “S-Box Design Based on Optimize LFT Parameter Selection: A Practical Approach in Recommendation System Domain,” Multimedia Tools and Applications, (January 7, 2020). http://dx.doi.org/10.1007/s11042-019-08464-6 (IF: 2.101)
Aslam, Sidra, Mansoor Ahmed, Imran Ahmed, Abid Khan, Awais Ahmad, Muhammad Imran, Adeel Anjum, and Shahid Hussain. “OBAC: Towards Agent-Based Identification and Classification of Roles, Objects, Permissions (ROP) in Distributed Environment,” Multimedia Tools and Applications, (March 16, 2020). https://doi.org/10.1007%2Fs11042-020-08764-2 (IF: 2.313)
Waheed, Moomina, Shahid Hussain, Arif Ali Khan, Mansoor Ahmed, and Bashir Ahmad. “A Methodology for Image Annotation of Human Actions in Videos,” Multimedia Tools and Applications, 79, no. 33–34 (June 20, 2020): 24347–24365. https://doi.org/10.1007%2Fs11042-020-09091-2 (IF: 2.313)
Awaisi, Kamran Sattar, Shahid Hussain, Mansoor Ahmed, Arif Ali Khan, and Ghufran Ahmed. “Leveraging IoT and Fog Computing in Healthcare Systems,” IEEE Internet of Things Magazine, 3, no. 2 (June 2020): 52–56. http://dx.doi.org/10.1109/iotm.0001.1900096
Beg, Saira, Adeel Anjum, Mansoor Ahmad, Shahid Hussain, Ghufran Ahmad, Suleman Khan, and Kim-Kwang Raymond Choo. “A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS),” Journal of Network and Computer Applications, p.102874, (Nov. 2020). http://dx.doi.org/10.1016/j.jnca.2020.102874 (IF: 5.57)
Minhas, Komal, Tariq M. Khan, Muhammad Arsalan, Syed Saud Naqvi, Mansoor Ahmed, Haroon Ahmed Khan, et al. “Accurate Pixel-Wise Skin Segmentation Using Shallow Fully Convolutional Neural Network,” IEEE Access, 8 (2020): 156314–156327. http://dx.doi.org/10.1109/access.2020.3019183 (IF: 3.745)
Tabassum, Munazza, Tariq M. Khan, Muhammad Arsalan, Syed Saud Naqvi, Mansoor Ahmed, Hussain Ahmed Madni, and Jawad Mirza. “CDED-Net: Joint Segmentation of Optic Disc and Optic Cup for Glaucoma Screening,” IEEE Access, 8 (2020): 102733–102747. http://dx.doi.org/10.1109/access.2020.2998635 (IF: 3.745)
Farooq, Usama, Mansoor Ahmed, Shahid Hussain, Faraz Hussain, Alia Naseem, Khurram Aslam. “Blockchain-Based Software Process Improvement (BBSPI): An Approach for SMEs to Perform Process Improvement,” IEEE Access, 9 (2021):10426–10442. http://dx.doi.org/10.1109/access.2021.3049904 (IF: 3.745)
Sarwar, Muhammad Azeem, Mansoor Ahmed, Asad Habib, Muhammad Khalid, M Akhtar Ali, Mohsin Raza, Shahid Hussain, and Ghufran Ahmed. “Exploiting Ontology Recommendation Using Text Categorization Approach,” IEEE Access, (2020): 1–1. http://dx.doi.org/10.1109/access.2020.3047364 (IF: 3.745)
Ahmed Ali, Abid Khan, Mansoor Ahmed, Gwanggil Jeon, “BCALS: Blockchain-Based Secure Log Management System for Cloud Computing,” Transactions on Emerging Telecommunications Technologies-ETT, 2021. https://doi.org/10.1002/ett.4272 (IF: 1.59)
Ali A, Ahmed M, Khan A, Anjum A, IIyas M, Helfert M. 2021. “VisTAS : Blockchain-based Visible and Trusted Remote Authentication System,” PeerJ Computer Science, (2021) https://doi.org/107717/peerj-cs.516 (IF: 1.39)
Mansoor Ahmed, Kainat Ansar, Cal B Muckley, Abid Khan, Adeel Anjum, Muhammad Talha, “A Semantic Rule-based Digital Fraud Detection,” PeerJ Computer Science, (2021) https://peerj.com/articles/cs-649/ (IF: 1.39)
Ali, A., Ahmed, M. & Khan, A. “Audit Logs Management and Security - A Survey,” Kuwait J.Sci, Vol.48 (3), July.2021, pp(1-18), https://doi.org/10.48129%2Fkjs.v48i3.10624 (IF: 0.519)
S. J. Shoukat, H. Afzal, M. R. Mufti, M. K. Sohail, D. M. Khan, et al., “Analyzing covid-19 impact on the researcher's productivity through their perceptions,” Computers, Materials & Continua, vol. 67, no.2, pp. 1835–1847, 2021 https://doi.org/10.32604/cmc.2021.014397 (IF: 4.89)
H., M. K. Sohail, N. Akhtar, D. Muhammad, H. Afzal, et al., “Analyzing covid-2019 impact on mental health through social media forum,” Computers, Materials & Continua, vol. 67, no.3, pp. 3737–3748, 2021. https://doi.org/10.32604/cmc.2021.014398 (IF: 4.89)
Zafar, F.; Khan, A.; Malik, S.U.R.; Ahmed, M.; Maple, C.; Anjum, A. “MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus,” Sensors, 2021, 21, 5096. https://doi.org/10.3390/s21155096 (IF: 3.576)
Mohsin Ahmed, Abid Khan, Mansoor Ahmed, Mouzna Tahir, Gwanggil Jeon, Giancarlo Fortino, and Francesco Piccialli, “Energy Theft Detection in Smart Grids: Taxonomy, Comparative Analysis, Challenges, and Future Research Directions,” IEEE/CAA J. Autom. Sinica, (2021) http://www.ieee-jas.net//article/id/23bc088e-4241-48ac-babe-d9da7eb9e788 (IF: 6.7)
Saira Beg, Adeel Anjum, Mansoor Ahmed, et al., “Dynamic parameters based reversible data transform (RDT) algorithm in recommendation system,” IEEE Access, (2021), doi: 10.1109/ACCESS.2021.3101150. (IF: 3.367)
Nasir Ali Khan, Abid Khan, Mansoor Ahmad, Munam Ali Shah and Gwanggil Jeon “URL filtering using big data analytics in 5G networks,” Computers & Electrical Engineering (2021), https://doi.org/10.1016/j.compeleceng.2021.107379 (IF: 3.818)
Syed Atif Moqurrab, Adeel Anjum, Abid Khan, Mansoor Ahmed, Awais Ahmad, Gwanggil Jeon “Deep-Confidentiality: An IoT-Enabled Privacy-Preserving Framework for Unstructured Big Biomedical Data”, ACM Transactions on Internet TechnologyVolume 22Issue 2 May 2022 Article No.: 42pp 1–21https://doi.org/10.1145/3421509
K. Ali, J. A. Khan, F. Aizaz and M. Ahmed, "Software Requirements Prioritization in the Context of Global Software Development," 2021 International Conference on Frontiers of Information Technology (FIT), Islamabad, Pakistan, 2021, pp. 13-18, doi: 10.1109/FIT53504.2021.00013
Khattak, K.-N.; Ahmed, M.; Iqbal, N.; Khan, M.-A.; Imran; Kim, J. A Conceptual Model of Factors Influencing Customer Relationship Management in Global Software Development: A Client Perspective. Appl. Sci. 2022, 12, 7851. https://doi.org/10.3390/app12157851
M. Ahmed et al., "Blockchain-Based Software Effort Estimation: An Empirical Study," in IEEE Access, vol. 10, pp. 120412-120425, 2022, doi: 10.1109/ACCESS.2022.3216840.
Khan, A., Ahmad, A., Ahmed, M. et al. Authorization schemes for the Internet of Things: requirements, weaknesses, future challenges, and trends. Complex Intell. Syst. 8, 3919–3941 (2022). https://doi.org/10.1007/s40747-022-00765-y
C. H. A. Gondal, M. Irfan, S. Shafique, M. S. Bashir, M. Ahmed, et al., "Automated leukemia screening and sub-types classification using deep learning," Computer Systems Science and Engineering, vol. 46, no.3, pp. 3541–3558, 2023.
Ahmed, M.; Dar, A.R.; Helfert, M.; Khan, A.; Kim, J. Data Provenance in Healthcare: Approaches, Challenges, and Future Directions. Sensors 2023, 23, 6495. https://doi.org/10.3390/s23146495
Khalid, Muhammad Irfan, Mansoor Ahmed, and Jungsuk Kim. 2023. "Enhancing Data Protection in Dynamic Consent Management Systems: Formalizing Privacy and Security Definitions with Differential Privacy, Decentralization, and Zero-Knowledge Proofs" Sensors 23, no. 17: 7604. https://doi.org/10.3390/s23177604
Saira Baig, Mansoor Ahmed, Adeel Anjum, "User-selectable interaction and privacy features in mobile app recommendation (MAR)," Multimedia Tools and Application, Springer (2023). DOI: 10.1007/s11042-023-16939-w.
Khalid, M.I.; Ahmed, M.; Helfert, M.; Kim, J.” Privacy-First Paradigm for Dynamic Consent Management Systems: Empowering Data Subjects through Decentralized Data Controllers and Privacy-Preserving Techniques.” Electronics 2023, 12, 4973. https://doi.org/10.3390/electronics12244973.
Ansar, K.; Ahmed, M.; Helfert, M.; Kim, J. Blockchain-Based Data Breach Detection: Approaches, Challenges, and Future Directions. Mathematics 2024, 12, 107. https://doi.org/10.3390/math12010107.
Ansar K, Ahmed M, Malik SUR, Helfert M, Kim J. 2024. Blockchain-based General Data Protection Regulation Compliant Data Breach Detection System. PeerJ Computer Science 10:e1882, https://doi.org/10.7717/peerj-cs.1882