A comparative analysis of blockchain architecture and its applications: Problems and recommendations TA Syed, A Alzahrani, S Jan, MS Siddiqui, A Nadeem, T Alghamdi IEEE access 7, 176838-176869, 2019 | 302 | 2019 |
A blockchain-based value added tax (VAT) system: Saudi Arabia as a use-case A Alkhodre, S Jan, S Khusro, T Ali, Y Alsaawy, M Yasar International Journal of Advanced Computer Science and Applications 10 (5 …, 2019 | 60 | 2019 |
Deep neural architectures for large scale android malware analysis M Nauman, TA Tanveer, S Khan, TA Syed Cluster Computing 21, 569-588, 2018 | 54 | 2018 |
Blockchain-based smart-IoT trust zone measurement architecture J Ali, T Ali, Y Alsaawy, AS Khalid, S Musa Proceedings of the International Conference on Omni-Layer Intelligent …, 2019 | 47 | 2019 |
In-depth review of augmented reality: Tracking technologies, development tools, AR displays, collaborative AR, and security concerns TA Syed, MS Siddiqui, HB Abdullah, S Jan, A Namoun, A Alzahrani, ... Sensors 23 (1), 146, 2022 | 46 | 2022 |
Towards Secure IoT Communication with Smart Contracts in a Blockchain Infrastructure J Ali, T Ali, S Musa, A Zahrani International Journal of Advanced Computer Science and Applications(ijacsa …, 2019 | 46 | 2019 |
A novel blockchain-based framework for vehicle life cycle tracking: An end-to-end solution TA Syed, MS Siddique, A Nadeem, A Alzahrani, S Jan, MAK Khattak IEEE Access 8, 111042-111063, 2020 | 37 | 2020 |
A transparent and trusted property registration system on permissioned blockchain T Ali, A Nadeem, A Alzahrani, S Jan 2019 International Conference on Advances in the Emerging Computing …, 2020 | 36 | 2020 |
Secure healthcare record sharing mechanism with blockchain GQ Butt, TA Sayed, R Riaz, SS Rizvi, A Paul Applied Sciences 12 (5), 2307, 2022 | 32 | 2022 |
An extended access control model for permissioned blockchain frameworks MY Khan, MF Zuhairi, T Ali, T Alghamdi, JA Marmolejo-Saucedo Wireless Networks 26 (7), 4943-4954, 2020 | 31 | 2020 |
DeepMoney: counterfeit money detection using generative adversarial networks T Ali, S Jan, A Alkhodre, M Nauman, M Amin, MS Siddiqui PeerJ Computer Science 5, e216, 2019 | 28 | 2019 |
Trust in IoT: dynamic remote attestation through efficient behavior capture SJ Toqeer Ali, Mohammad Nauman Cluster Computing, 1-13, 2017 | 27* | 2017 |
An ensemble learning based classification approach for the prediction of household solid waste generation A Namoun, BR Hussein, A Tufail, A Alrehaili, TA Syed, O BenRhouma Sensors 22 (9), 3506, 2022 | 23 | 2022 |
BlockTrack-L: A lightweight blockchain-based provenance message tracking in IoT MS Siddiqui, TA Syed, A Nadeem, W Nawaz, SS Albouq International Journal of Advanced Computer Science and Applications 11 (4), 2020 | 22 | 2020 |
Employing Takaful islamic banking through state of the art blockchain: a case study M Abdeen, J Salman, S Khan, T Ali International Journal of Advanced Computer Science and Applications 10 (12), 2019 | 22 | 2019 |
Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models S Jan, S Musa, T Ali, M Nauman, S Anwar, T Ali Tanveer, B Shah Expert Systems 38 (4), e12611, 2021 | 21 | 2021 |
Solid waste generation and disposal using machine learning approaches: a survey of solutions and challenges A Namoun, A Tufail, MY Khan, A Alrehaili, TA Syed, O BenRhouma Sustainability 14 (20), 13578, 2022 | 20 | 2022 |
Design and implementation of an efficient framework for behaviour attestation using n-call slides R Ismail, TA Syed, S Musa Proceedings of the 8th International Conference on Ubiquitous Information …, 2014 | 19 | 2014 |
Virtual tourism and digital heritage: an analysis of VR/AR technologies and applications MS Siddiqui, TA Syed, A Nadeem, W Nawaz, A Alkhodre International Journal of Advanced Computer Science and Applications 13 (7), 2022 | 17 | 2022 |
On leveraging stochastic models for remote attestation T Ali, M Nauman, X Zhang International conference on trusted systems, 290-301, 2010 | 15 | 2010 |