Static malware detection and attribution in android byte-code through an end-to-end deep system M Amin, TA Tanveer, M Tehseen, M Khan, FA Khan, S Anwar Future generation computer systems 102, 112-126, 2020 | 106 | 2020 |
Energy-efficient harvested-aware clustering and cooperative routing protocol for WBAN (E-HARP) Z Ullah, I Ahmed, FA Khan, M Asif, M Nawaz, T Ali, M Khalid, F Niaz IEEE Access 7, 100036-100050, 2019 | 91 | 2019 |
Model-based behavioral attestation M Alam, X Zhang, M Nauman, T Ali, JP Seifert Proceedings of the 13th ACM symposium on Access control models and …, 2008 | 88 | 2008 |
The esc-eorp euro-endo (european infective endocarditis) registry G Habib, P Lancellotti, PA Erba, A Sadeghpour, M Meshaal, A Sambola, ... European Heart Journal-Quality of Care and Clinical Outcomes 5 (3), 202-207, 2019 | 78 | 2019 |
Robust and efficient energy harvested-aware routing protocol with clustering approach in body area networks Z Ullah, I Ahmed, T Ali, N Ahmad, F Niaz, Y Cao IEEE Access 7, 33906-33921, 2019 | 70 | 2019 |
Android malware detection through generative adversarial networks M Amin, B Shah, A Sharif, T Ali, KI Kim, S Anwar Transactions on Emerging Telecommunications Technologies 33 (2), e3675, 2022 | 57 | 2022 |
Deep neural architectures for large scale android malware analysis M Nauman, TA Tanveer, S Khan, TA Syed Cluster Computing 21, 569-588, 2018 | 54 | 2018 |
An Android runtime security policy enforcement framework H Banuri, M Alam, S Khan, J Manzoor, B Ali, Y Khan, M Yaseen, MN Tahir, ... Personal and Ubiquitous Computing 16, 631-641, 2012 | 44 | 2012 |
Using trusted computing for privacy preserving keystroke-based authentication in smartphones M Nauman, T Ali, A Rauf Telecommunication Systems 52, 2149-2161, 2013 | 37 | 2013 |
A deep learning system for health care IoT and smartphone malware detection M Amin, D Shehwar, A Ullah, T Guarda, TA Tanveer, S Anwar Neural Computing and Applications, 1-12, 2022 | 36 | 2022 |
Remote attestation of attribute updates and information flows in a ucon system M Nauman, M Alam, X Zhang, T Ali Trusted Computing: Second International Conference, Trust 2009, Oxford, UK …, 2009 | 35 | 2009 |
Token: Trustable keystroke-based authentication for web-based applications on smartphones M Nauman, T Ali Information Security and Assurance: 4th International Conference, ISA 2010 …, 2010 | 29 | 2010 |
Bio-synthesized silver nanoparticles using different plant extracts as anti-cancer agent Y Khan, M Numan, M Ali, AT Khali, T Ali, N Abbas, ZK Shinwari J. Nanomed. Biother. Discov 7 (154), 2, 2017 | 23 | 2017 |
Behavioral attestation for web services (BA4WS) M Alam, X Zhang, M Nauman, T Ali Proceedings of the 2008 ACM workshop on Secure web services, 21-28, 2008 | 23 | 2008 |
An accessible formal specification of the UML and OCL meta-model in Isabelle/HOL T Ali, M Nauman, M Alam 2007 IEEE International Multitopic Conference, 1-6, 2007 | 19 | 2007 |
Behavioral attestation for business processes M Alam, M Nauman, X Zhang, T Ali, PCK Hung 2009 IEEE International Conference on Web Services, 343-350, 2009 | 17 | 2009 |
Multicentre observational study of adherence to Sepsis Six guidelines in emergency general surgery Journal of British Surgery 104 (2), e165-e171, 2017 | 15 | 2017 |
Formal verification of the xDAuth protocol Q Alam, S Tabbasum, SUR Malik, M Alam, T Ali, A Akhunzada, SU Khan, ... IEEE Transactions on Information Forensics and Security 11 (9), 1956-1969, 2016 | 15 | 2016 |
On leveraging stochastic models for remote attestation T Ali, M Nauman, X Zhang International conference on trusted systems, 290-301, 2010 | 15 | 2010 |
Scalable, privacy-preserving remote attestation in and through federated identity management frameworks T Ali, M Nauman, M Amin, M Alam 2010 International Conference on Information Science and Applications, 1-8, 2010 | 15 | 2010 |