关注
Haseeb Ahmad
Haseeb Ahmad
在 bupt.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Clustering by fast search and find of density peaks via heat diffusion
R Mehmood, G Zhang, R Bie, H Dawood, H Ahmad
Neurocomputing 208, 210-217, 2016
1782016
Sentiment analysis of extremism in social media from textual information
M Asif, A Ishtiaq, H Ahmad, H Aljuaid, J Shah
Telematics and Informatics 48, 101345, 2020
1302020
Fuzzy Clustering by Fast Search and Find of Density Peaks
R Mehmood, H Dawood, B Rongfang, H Ahmad
International Conference on Identification, Information, and Knowledge in …, 2015
129*2015
A robust mutual authentication scheme based on elliptic curve cryptography for telecare medical information systems
S Qiu, G Xu, H Ahmad, L Wang
IEEE access 6, 7452-7463, 2017
1062017
The trade-environment nexus in light of governance: a global potential
R Yasmeen, Y Li, M Hafeez, H Ahmad
Environmental Science and Pollution Research 25, 34360-34379, 2018
882018
Key-policy attribute-based encryption with equality test in cloud computing
H Zhu, L Wang, H Ahmad, X Niu
IEEE Access 5, 20428-20439, 2017
792017
Prediction of rising stars in the game of cricket
H Ahmad, A Daud, L Wang, H Hong, H Dawood, Y Yang
IEEE Access 5, 4104-4124, 2017
572017
Do environmental technology and banking sector development matter for green growth? Evidence from top-polluted economies
M Ahmed, M Hafeez, MA Kaium, S Ullah, H Ahmad
Environmental Science and Pollution Research 30 (6), 14760-14769, 2023
532023
A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography
G Xu, S Qiu, H Ahmad, G Xu, Y Guo, M Zhang, H Xu
Sensors 18 (7), 2394, 2018
452018
Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption
J Li, X Li, L Wang, D He, H Ahmad, X Niu
Soft Computing 22, 707-714, 2018
362018
Anonymous Communication via Anonymous Identity‐Based Encryption and Its Application in IoT
L Jiang, T Li, X Li, M Atiquzzaman, H Ahmad, X Wang
Wireless Communications and Mobile Computing 2018 (1), 6809796, 2018
362018
A New Anti-Quantum Proxy Blind Signature for Blockchain-Enabled Internet of Things.
C Li, G Xu, Y Chen, H Ahmad, J Li
Computers, Materials & Continua 61 (2), 2019
342019
An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography
S Qiu, G Xu, H Ahmad, G Xu, X Qiu, H Xu
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS 13 (02), 2019
282019
Ligature based Urdu Nastaleeq sentence recognition using gated bidirectional long short term memory
I Ahmad, X Wang, YH Mao, G Liu, H Ahmad, R Ullah
Cluster Computing 21, 703-714, 2018
262018
Image and command hybrid model for vehicle control using Internet of Vehicles
KR Malik, M Ahmad, S Khalid, H Ahmad, F Al‐Turjman, S Jabbar
Transactions on Emerging Telecommunications Technologies 31 (5), e3774, 2020
252020
An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy
S Qiu, G Xu, H Ahmad, Y Guo
PloS one 13 (3), e0194072, 2018
252018
Construction of DNA codes by using algebraic number theory
Haibo Hong, Licheng Wang, Haseeb Ahmad, Jing Li, Yixian Yang, Changzhong Wu
Finite Fields and Their Applications 37, 328-343, 2016
172016
Challenges of fully homomorphic encryptions for the internet of things
L Wang, J Li, H Ahmad
IEICE TRANSACTIONS on Information and Systems 99 (8), 1982-1990, 2016
142016
Cost effective scheme for OLT in next generation passive optical access network based on noise free optical multi carrier
R Ullah, B Liu, Q Zhang, Q Tian, A Ali, Y Khan, F Tian, MA Zia, H Ahmad, ...
China Communications 13 (6), 76-87, 2016
142016
LoRaWAN: state of the art, challenges, protocols and research issues
HU Rahman, M Ahmad, H Ahmad, MA Habib
2020 IEEE 23rd International Multitopic Conference (INMIC), 1-6, 2020
132020
系统目前无法执行此操作,请稍后再试。
文章 1–20