[1] Muhammad Umar Farooq Qaisar, Weijie Yuan, Paolo Bellavista, and Hina Tabassum. Empowering IoT: Reliability, Network Management, Sensing, and Probabilistic Charging in Wireless Sensor Networks: A Comprehensive Guide to IoT-Based WSN Network Optimization. Springer Nature, 2025, doi: 10.1007/978-981-96-6079-7.
[1] Muhammad Umar Farooq, Weijie Yuan, Paolo Bellavista, Shehzad Ashraf Chaudhry, Guangjie Han, Adeel Ahmed, Muhammad Imran. "R^2 Com: Reliable and Resilient Communication in Duty Cycled SDN-based for Intelligent Transportation.” IEEE Transactions on Intelligent Transportation Systems (2025), doi: 10.1109/TITS.2025.3611518. (Early Access) (Q1-Zone) (CCF-B) (SCI 二区) (IF: 8.4)
[2] Muhammad Umar Farooq, Weijie Yuan, Paolo Bellavista, Fan Liu, Guangjie Han, Rabiu Sale Zakariyya, and Adeel Ahmed. "Probabilistic On-Demand Charging Scheduling for ISAC-Assisted WRSNs with Multiple Mobile Charging Vehicles.” IEEE Transactions on Mobile Computing (2024), doi: 10.1109/TMC.2024.3382668. (Q1-Zone) (CCF-A) (SCI 一区) (IF: 9.2)
[3] Muhammad Umar Farooq, Xingfu Wang, Ammar Hawbani, Liang Zhao, Ahmed Al-Dubai, Omar Busaileh, "SDORP: SDN based Opportunistic Routing for Asynchronous Wireless Sensor Networks," IEEE Transactions on Mobile Computing (2022), doi: 10.1109/TMC.2022.3158695. (Q1-Zone) (CCF-A) (SCI 一区) (IF: 9.2)
[4] Muhammad Umar Farooq, Xingfu Wang, Ammar Hawbani, Asad Khan, Adeel Ahmed, Fisseha Teju Wedaj, Shamsher Ullah. TORAS: Trustworthy Load-Balanced Opportunistic Routing for Asynchronous Duty-Cycled WSNs. IEEE Systems Journal (2022), doi: 10.1109/JSYST.2022.3221096. (Q1-Zone) (SCI 三区) (IF: 4.4)
[5] Muhammad Umar Farooq, Weijie Yuan, Paolo Bellavista, Guangjie Han, and Adeel Ahmed. "ISAC-Assisted Wireless Rechargeable Sensor Networks with Multiple Mobile Charging Vehicles.” IEEE Internet of Things Magazine (2024), pp. 80-86, doi: 10.1109/IOTM.001.2300153.
[6] Muhammad Umar Farooq, Xingfu Wang, Ammar Hawbani, Asad Khan, Adeel Ahmed, Saeed Alsamhi, Bushra Qureshi. POWER: probabilistic weight-based energy-efficient cluster routing for large-scale wireless sensor networks. Journal of Supercomputing (2022), doi: 10.1007/s11227-022-04372-z. (Q2-Zone) (CCF-C) (SCI 四区) (IF: 2.7)
[7] Muhammad Umar Farooq, Xingfu Wang, Moizza Sajjad and Sara Qaisar, "Development of Protective Scheme against Collaborative Black Hole Attacks in Mobile Ad hoc Networks," KSII Transactions on Internet and Information Systems, 12, 3, (2018), 1330-1347. doi: 10.3837/tiis.2018.03.020. (Q4-Zone) (SCI 四区) (IF: 0.9)
[8] Fisseha Teju Wedaj, Ammar Hawbani, Xingfu Wang, Saeed H. Alsamhi, Liang Zhao, and Muhammad Umar Farooq. "TBDD: Territory-bound Data Delivery for Large Scale Mobile Sink Wireless Sensor Networks." IEEE Internet of Things Journal (2023). doi: 10.1109/JIOT.2023.3282215. (Q1-Zone) (CCF-C) (SCI 二区) (IF: 8.9)
[9] Fisseha Teju Wedaj, Ammar Hawbani, Xingfu Wang, Muhammad Umar Farooq, Wajdy Othman, Saeed Hamood Alsamhi, and Liang Zhao. "RECO: On-Demand Recharging and Data Collection for Wireless Rechargeable Sensor Networks." IEEE Transactions on Green Communications and Networking (2023). doi: 10.1109/TGCN.2023.3305026. (Q1-Zone) (SCI 二区) (IF: 6.7)
[10] Arbelo Lolai, Xingfu Wang, Ammar Hawbani, Fayaz Ali Dharejo, Taiyaba Quershi, Muhammad Umar Farooq, Muhammad Mujahid, and Abdul Hafeez Babar. Reinforcement learning based on routing with infrastructure nodes for data dissemination in vehicular networks (RRIN). Wireless Networks (2022). doi: 10.1007/s11276-022-02926-w. (Q3-Zone) (CCF-C) (SCI 四区) (IF: 2.1)
[11] Ammar Hawbani, Xingfu Wang, Hassan Kuhlani, Aiman Ghannami, Muhammad Umar Farooq, and Yaser Al-sharabi. "Extracting the Overlapped Sub-Regions in Wireless Sensor Networks," Wireless Networks 25, 4705–4726 (2019), doi: 10.1007/s11276-018-1755-7. (Q3-Zone) (CCF-C) (SCI 四区) (IF: 2.1)
[12] Asad Khan, Muhammad Mehran Arshad Khan, Muhammad Awais Javeed, Muhammad Umar Farooq, Adeel Akram, and Chengliang Wang. "Multilevel Privacy Controlling Scheme to Protect Behavior Pattern in Smart IoT Environment." Wireless Communications & Mobile Computing 2021 (2021), doi: 10.1155/2021/9915408. (Q3-Zone) (CCF-C) (IF: 2.146)
[13] Asad Khan, Sakander Hayat, Muhammad Ahmad, Jinyu Wen, Muhammad Umar Farooq, Meie Fang, and Wenchao Jiang., Cross-modal retrieval based on deep regularized hashing constraints. International Journal of Intelligent Systems. 2022; 1- 23. doi:10.1002/int.22853. (Q2-Zone) (CCF-C) (SCI 三区) (IF: 3.7)
[14] Shamsher Ullah, Zheng Jiangbin, Muhammad Tanveer Hussain, Muhammad Wasif Sardar, Muhammad Umar Farooq, and Salabat Khan. "An investigating study of blind and ID-based signcryption schemes for misuse risk protection and high performance computing." Cluster Computing (2023): 1-15, doi: 10.1007/s10586-023-03969-0. (Q2-Zone) (SCI 三区) (IF: 4.1)
[15] Shamsher Ullah, Zheng Jiangbin, Muhammad Tanveer Hussain, Nizamud Din, Farhan Ullah, and Muhammad Umar Farooq. "A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments." Journal of Information Security and Applications 70 (2022): 103346, doi: 10.1016/j.jisa.2022.103346. (Q2-Zone) (CCF-C) (SCI 三区) (IF: 3.7)
[1] Muhammad Umar Farooq, Weijie Yuan, Guangjie Han, Adeel Ahmed, Chang Liu, Md. Jalil Piran." Integration of SDN and Digital Twin for the Intelligent Detection of DoC Attacks in WRSNs.” 2025 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2025, doi: 10.1109/INFOCOMWKSHPS65812.2025.11152843. (CCF-A Conference Workshop)
[2] Muhammad Umar Farooq, Zhuo Sun, Fan Liu, Chang Liu, Guangjie Han, Fisseha Teju Wedaj. "ISAC-Facilitated Optimal On-demand Mobile Charging Scheme for IoT-based WRSNs.” 2024 ACM International Conference on Mobile Computing and Networking (ACM MobiCom), 2024, doi: 10.1145/3636534.3698228. (CCF-A)
[3] Muhammad Umar Farooq, Weijie Yuan, Paolo Bellavista, Guangjie Han, Rabiu Sale Zakariyya, Adeel Ahmed. "Probabilistic On-Demand Charging Scheduling for ISAC-Assisted WRSNs with Multiple Mobile Charging Vehicles.” 2023 IEEE Global Communications Conference (GLOBECOM), 2023, pp. 5895-5900, doi: 10.1109/GLOBECOM54140.2023.10437255. (CCF-C)
[4] Muhammad Umar Farooq, Weijie Yuan, Paolo Bellavista, Shehzad Ashraf Chaudhry, Adeel Ahmed, Muhammad Imran. Reliable and Resilient Communication in Duty Cycled Software Defined Wireless Sensor Networks. In 2023 IEEE International Conference on Communications (ICC), 2023, pp. 397-402, doi: 10.1109/ICCWorkshops57953.2023.10283622. (CCF-C)
[5] Muhammad Umar Farooq, Xingfu Wang, Ammar Hawbani, Asad Khan, Adeel Ahmed, and Fisseha Teju Wedaj. "TORP: Load Balanced Reliable Opportunistic Routing for Asynchronous Wireless Sensor Networks," 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2020, pp. 1384-1389, doi: 10.1109/TrustCom50675.2020.00186. (CCF-C)
[6] Muhammad Umar Farooq, Xingfu Wang, Robail Yasrab, Sara Qaisar, "Energy Preserving Detection Model for Collaborative Black Hole Attacks in Wireless Sensor Networks," 2016 IEEE 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN), 2016, pp. 395-399, doi: 10.1109/MSN.2016.072. (CCF-C)
[7] Junji Pan, Chang Liu, Zheng Xue, Yurong Zhang, Zhong Zheng, Yiran Cheng, Muhammad Umar Farooq, Guojun Han. “Generalized Rate Splitting for Enhanced Max-Min Fairness in Weak-User RSMA Systems.” In 2025 IEEE 101st Vehicular Technology Conference (VTC2025-Spring), pp. 1-6. IEEE, 2025, doi: 10.1109/VTC2025-Spring65109.2025.11174278.
[8] Fisseha Teju Wedaj, Ammar Hawbani, Xingfu Wangf, Haithm M. Al-Gunid, Getinet Yilma, and Muhammad Umar Farooq, “Coverage Hole Aware Data Routing for Mobile Sink Wireless Sensor Networks,” 2024 IEEE 14th International Conference on Electronics Information and Emergency Communication (ICEIEC), 2024, pp. 84-88, doi: 10.1109/ICEIEC61773.2024.10561653.
[9] Rabiu Sale Zakariyya, Jae-Neung Lee, Muhammad Umar Farooq , Umar Jibril Mohammed, Qingfeng Zhang, “High Resolution DoA Estimation Using LWA for MIMO OFDM Millimeter-Wave Systems,” 2023 IEEE 5th Global Power, Energy and Communication Conference (GPECOM), 2023, pp. 542-547, doi: 10.1109/GPECOM58364.2023.10175692.
[10] Bushra Qureshi, Xingfu Wang, Abdulbary Naji, Ammar Hawbani, Muhammad Umar Farooq, Kondwani Makanda, Taiyaba Qureshi, and Gulzar Ahmad. "Charging Scheduling Scheme for Maximizing Charging Efficiency to Extend Network Lifetime in WRSNs." In 2022 IEEE 12th International Conference on Electronics Information and Emergency Communication (ICEIEC), pp. 48-52. IEEE, 2022, doi: 10.1109/ICEIEC54567.2022.9835074.
[11] Taiyaba Qureshi, Xingfu Wang, Ammar Hawbani, Weiqi Wu, Muhammad Umar Farooq, and Adeel Ahmed. "Data Routing Protocol for Multi-Mobile Sinks WSN." In 2020 The 8th ACM International Conference on Information Technology: IoT and Smart City, pp. 195-199. 2020, doi: 10.1145/3446999.3447631.
[12] Adeel Ahmed, Xingfu Wang, Ammar Hawbani, Muhammad Umar Farooq, Taiyaba Qureshi, and Shamsher Ullah. "EE-TAR: Energy Efficient and Thermal Aware Routing Protocol for Software Defined Wireless Body Area Networks." 2020 IEEE 8th International Conference on Information, Communication and Networks (ICICN), 2020, pp. 51-55, doi: 10.1109/ICICN51133.2020.9205064.
[13] Longdy Torn, Ammar Hawbani, Xingfu Wang, Omar Busaileh, and Muhammad Umar Farooq. "Heuristic Routing with Infrastructure Nodes for Data Dissemination in Vehicular Networks." In 2019 The 7th ACM International Conference on Information Technology: IoT and Smart City, pp. 300-304. 2019, doi: 10.1145/3377170.3377210.
[1] Muhammad Umar Farooq, Weijie Yuan, Onur Günlü, Taneli Riihonen, Yuanhao Cui, Lin Zhang, Nuria Gonzalez-Prelcic, Marco Di Renzo, and Zhu Han. "The Role of ISAC in 6G Networks: Enabling Next-Generation Wireless Systems.” IEEE Transactions on Network Science and Engineering.
[2] Muhammad Umar Farooq, Weijie, Lin Zhang, Shehzad Ashraf Chaudhry, Guangjie Han, Yunyang Zhang. " A Robust Trust Management System for V2X Networks Integrating ISAC with Blockchain Smart Contracts.” IEEE Transactions on Network and Service Management.
[3] Rabiu Sale Zakariyya, Mohammed Jajere Adamu, Muhammad Umar Farooq, and Qingfeng Zhang, "Efficient AoA and TD Estimation Using Reconfigurable Antenna for vehicle-to-vehicle (V2V) Systems." IEEE Transactions on Vehicular Technology.
[4] Shamsher Ullah, Farhan Ullah, Muhammad Umar Farooq, Gautam Srivastava and Victor C. M. Leung, and Victor C. M. Leung, “H_SIG: Privacy-Preserving Auction for Big Data based on Homomorphic Signcryption.” The International Conference on Availability, Reliability, and Security (ARES).
[5] Xuhui Huang, Chang Liu, Zheng Xue, Muhammad Umar Farooq, and Guojun Han. "FLAG-IDS: A Federated Lightweight Attentive Granularity Intrusion Detection System for Low-Probability Attacks in IoV." ICC 2026 - IEEE International Conference on Communications.