Follow
Dr Muhammad Usman
Title
Cited by
Cited by
Year
Anomaly detection in automated vehicles using multistage attention-based convolutional neural network
AR Javed, M Usman, SU Rehman, MU Khan, MS Haghighi
IEEE Transactions on Intelligent Transportation Systems 22 (7), 4291-4300, 2020
1662020
Security and privacy in IoT using machine learning and blockchain: Threats and countermeasures
N Waheed, X He, M Ikram, M Usman, SS Hashmi, M Usman
ACM Computing Surveys (CSUR) 53 (6), 1-37, 2020
1492020
A provably secure and efficient authenticated key agreement scheme for energy internet-based vehicle-to-grid technology framework
A Irshad, M Usman, SA Chaudhry, H Naqvi, M Shafiq
IEEE Transactions on Industry Applications 56 (4), 4425-4435, 2020
1062020
Mobile agent-based cross-layer anomaly detection in smart home sensor networks using fuzzy logic
M Usman, V Muthukkumarasamy, XW Wu
IEEE Transactions on Consumer Electronics 61 (2), 197-205, 2015
572015
Wireless smart home sensor networks: mobile agent based anomaly detection
M Usman, V Muthukkumarasamy, XW Wu, S Khanum
2012 9th International Conference on Ubiquitous Intelligence and Computing …, 2012
352012
Mobile agent based hierarchical intrusion detection system in wireless sensor networks
S Khanum, M Usman, A Alwabel
International Journal of Computer Science Issues (IJCSI) 9 (1), 101, 2012
342012
A blockchain-based secure data-sharing framework for Software Defined Wireless Body Area Networks
K Hasan, MJM Chowdhury, K Biswas, K Ahmed, MS Islam, M Usman
Computer Networks 211, 109004, 2022
322022
Fuzzy-in-the-loop-driven low-cost and secure biometric user access to server
A Irshad, M Usman, SA Chaudhry, AK Bashir, A Jolfaei, G Srivastava
IEEE Transactions on Reliability 70 (3), 1014-1025, 2020
262020
A provable and secure mobile user authentication scheme for mobile cloud computing services
A Irshad, SA Chaudhry, M Shafiq, M Usman, M Asif, A Ghani
International Journal of Communication Systems 32 (14), e3980, 2019
232019
Trust establishment and estimation in cloud services: a systematic literature review
K Mahmud, M Usman
Journal of Network and Systems Management 27, 489-540, 2019
222019
Multiple access control for cognitive radio-based IEEE 802.11 ah networks
M Shafiq, M Ahmad, A Irshad, M Gohar, M Usman, M Khalil Afzal, JG Choi, ...
Sensors 18 (7), 2043, 2018
222018
Securing mobile agent based wireless sensor network applications on middleware
M Usman, V Muthukkumarasamy, XW Wu, S Khanum
2012 International symposium on communications and information technologies …, 2012
202012
An energy efficient clique based clustering and routing mechanism in wireless sensor networks
K Biswas, V Muthukkumarasamy, E Sithirasenan, M Usman
2013 9th International Wireless Communications and Mobile Computing …, 2013
182013
Energy-efficient intrusion detection system for wireless sensor network based on MUSK architecture
S Khanum, M Usman, K Hussain, R Zafar, M Sher
High Performance Computing and Applications: Second International Conference …, 2010
182010
Security Enhancement in MANET Authentication by checking the CRL Status of Servers
A Irshad, W Noshairwan, M Shafiq, S Khurram, E Irshad, M Usman
Int J Adv Sci Technol 1, 91-98, 2008
172008
A human-in-the-loop probabilistic CNN-fuzzy logic framework for accident prediction in vehicular networks
M Usman, A Carie, B Marapelli, HD Bedru, K Biswas
IEEE Sensors Journal 21 (14), 15496-15503, 2020
152020
Application threats to exploit northbound Interface vulnerabilities in software defined networks
B Rauf, H Abbas, M Usman, TA Zia, W Iqbal, Y Abbas, H Afzal
ACM Computing Surveys (CSUR) 54 (6), 1-36, 2021
112021
A cross-layer trust-based consensus protocol for peer-to-peer energy trading using fuzzy logic
MJM Chowdhury, M Usman, MS Ferdous, N Chowdhury, AI Harun, ...
IEEE Internet of Things Journal 9 (16), 14779-14789, 2021
102021
Group Mobility in Mobile Ad hoc Networks
E Irshad, W Noshairwain, M Usman, A Irshad, M Gilani
WWW/Internet, IADIS Germany 102, 2008
102008
Elective learning objects group recommendation using non-cooperative game theory
A Zia, M Usman
2018 International Conference on Frontiers of Information Technology (FIT …, 2018
82018
The system can't perform the operation now. Try again later.
Articles 1–20