Anomaly detection in automated vehicles using multistage attention-based convolutional neural network AR Javed, M Usman, SU Rehman, MU Khan, MS Haghighi IEEE Transactions on Intelligent Transportation Systems 22 (7), 4291-4300, 2020 | 174 | 2020 |
Security and privacy in IoT using machine learning and blockchain: Threats and countermeasures N Waheed, X He, M Ikram, M Usman, SS Hashmi, M Usman ACM Computing Surveys (CSUR) 53 (6), 1-37, 2020 | 167 | 2020 |
A provably secure and efficient authenticated key agreement scheme for energy internet-based vehicle-to-grid technology framework A Irshad, M Usman, SA Chaudhry, H Naqvi, M Shafiq IEEE Transactions on Industry Applications 56 (4), 4425-4435, 2020 | 107 | 2020 |
Mobile agent-based cross-layer anomaly detection in smart home sensor networks using fuzzy logic M Usman, V Muthukkumarasamy, XW Wu IEEE Transactions on Consumer Electronics 61 (2), 197-205, 2015 | 56 | 2015 |
A blockchain-based secure data-sharing framework for Software Defined Wireless Body Area Networks K Hasan, MJM Chowdhury, K Biswas, K Ahmed, MS Islam, M Usman Computer Networks 211, 109004, 2022 | 39 | 2022 |
Wireless smart home sensor networks: mobile agent based anomaly detection M Usman, V Muthukkumarasamy, XW Wu, S Khanum 2012 9th International Conference on Ubiquitous Intelligence and Computing …, 2012 | 32 | 2012 |
Mobile agent based hierarchical intrusion detection system in wireless sensor networks S Khanum, M Usman, A Alwabel International Journal of Computer Science Issues (IJCSI) 9 (1), 101, 2012 | 32 | 2012 |
Fuzzy-in-the-loop-driven low-cost and secure biometric user access to server A Irshad, M Usman, SA Chaudhry, AK Bashir, A Jolfaei, G Srivastava IEEE Transactions on Reliability 70 (3), 1014-1025, 2020 | 28 | 2020 |
Multiple access control for cognitive radio-based IEEE 802.11 ah networks M Shafiq, M Ahmad, A Irshad, M Gohar, M Usman, M Khalil Afzal, JG Choi, ... Sensors 18 (7), 2043, 2018 | 24 | 2018 |
A provable and secure mobile user authentication scheme for mobile cloud computing services A Irshad, SA Chaudhry, M Shafiq, M Usman, M Asif, A Ghani International Journal of Communication Systems 32 (14), e3980, 2019 | 23 | 2019 |
Trust establishment and estimation in cloud services: a systematic literature review K Mahmud, M Usman Journal of Network and Systems Management 27, 489-540, 2019 | 22 | 2019 |
Securing mobile agent based wireless sensor network applications on middleware M Usman, V Muthukkumarasamy, XW Wu, S Khanum 2012 International symposium on communications and information technologies …, 2012 | 21 | 2012 |
An energy efficient clique based clustering and routing mechanism in wireless sensor networks K Biswas, V Muthukkumarasamy, E Sithirasenan, M Usman 2013 9th International Wireless Communications and Mobile Computing …, 2013 | 18 | 2013 |
Energy-efficient intrusion detection system for wireless sensor network based on MUSK architecture S Khanum, M Usman, K Hussain, R Zafar, M Sher High Performance Computing and Applications: Second International Conference …, 2010 | 18 | 2010 |
A human-in-the-loop probabilistic CNN-fuzzy logic framework for accident prediction in vehicular networks M Usman, A Carie, B Marapelli, HD Bedru, K Biswas IEEE Sensors Journal 21 (14), 15496-15503, 2020 | 17 | 2020 |
Security Enhancement in MANET Authentication by checking the CRL Status of Servers A Irshad, W Noshairwan, M Shafiq, S Khurram, E Irshad, M Usman Int J Adv Sci Technol 1, 91-98, 2008 | 17 | 2008 |
Application threats to exploit northbound Interface vulnerabilities in software defined networks B Rauf, H Abbas, M Usman, TA Zia, W Iqbal, Y Abbas, H Afzal ACM Computing Surveys (CSUR) 54 (6), 1-36, 2021 | 14 | 2021 |
A cross-layer trust-based consensus protocol for peer-to-peer energy trading using fuzzy logic MJM Chowdhury, M Usman, MS Ferdous, N Chowdhury, AI Harun, ... IEEE Internet of Things Journal 9 (16), 14779-14789, 2021 | 11 | 2021 |
Group Mobility in Mobile Ad hoc Networks E Irshad, W Noshairwain, M Usman, A Irshad, M Gilani WWW/Internet, IADIS Germany 102, 2008 | 10 | 2008 |
Elective learning objects group recommendation using non-cooperative game theory A Zia, M Usman 2018 International Conference on Frontiers of Information Technology (FIT …, 2018 | 9 | 2018 |