Abid Khan


NameAbid Khan
Job titleSenior Lecturer in Computer Science
Research instituteCollege of Science and Engineering
ORCIDhttps://orcid.org/0000-0003-2712-1956

Research outputs

A Secure and Privacy Preserved Infrastructure for VANETs based on Federated Learning with Local Differential Privacy

Batool, H., Anjum, A., Khan, A., Izzo, S., Mazzocca, C. and Jeon, G. 2023. A Secure and Privacy Preserved Infrastructure for VANETs based on Federated Learning with Local Differential Privacy. Elsevier Information Sciences. 652. https://doi.org/10.1016/j.ins.2023.119717

Decentralized Receiver-based Link Stability-aware Forwarding Scheme for NDN-based VANETs

Zafar, W. U. I., Rehman, M. A. U., Jabeen, F., Ullah, R., Abbas, G. and Khan, A. 2023. Decentralized Receiver-based Link Stability-aware Forwarding Scheme for NDN-based VANETs. Computer Networks. 236, pp. 1-23. https://doi.org/10.1016/j.comnet.2023.109996

Cohort-based kernel principal component analysis with Multi-path Service Routing in Federated Learning

Sikandar, H. S., Malik, S. R., Anjum, A., Khan, A. and Jeon, G. 2023. Cohort-based kernel principal component analysis with Multi-path Service Routing in Federated Learning. Future Generation Computer Systems. 149, pp. 518-530. https://doi.org/10.1016/j.future.2023.07.037

An Efficient and Privacy-preserving Blockchain-based Secure Data Aggregation in Smart Grids

Mahmood, A., Khan, A., Anjum, A., Maple, C. and Jeon, G. 2023. An Efficient and Privacy-preserving Blockchain-based Secure Data Aggregation in Smart Grids. Sustainable Energy Technologies and Assessments. 60, pp. 1-11. https://doi.org/10.1016/j.seta.2023.103414

Data Provenance in Healthcare: Approaches, Challenges, and Future Directions

Mansoor Ahmed (PhD), Amil Dar, Markus Helfert, Khan, A. and Jungsuk Kim 2023. Data Provenance in Healthcare: Approaches, Challenges, and Future Directions. Sensors. 23 (14), pp. 1-26. https://doi.org/10.3390/s23146495

Privacy Preservation in the Internet of Vehicles using Local Differential Privacy and IOTA Ledger

Iftikhar, Z., Anjum, A., Jeon, G., Shah, M. A. and Khan, A. 2023. Privacy Preservation in the Internet of Vehicles using Local Differential Privacy and IOTA Ledger. Springer Cluster Computing . pp. 1-17. https://doi.org/10.1007/s10586-023-04002-0

A Privacy-Enabled, Blockchain-Based Smart Marketplace

Bello Musa Yakubu, Majid Iqbal Khan, Khan, A., Adeel Anjum, Madiha Syed and Semeen Rehman 2023. A Privacy-Enabled, Blockchain-Based Smart Marketplace. Applied Sciences. 13 (5), pp. 1-16. https://doi.org/10.3390/app13052914

Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart homes

Yakubu, M, Y., Khan, M. I., Khan, A., Jabeen, F. and Jeon, G. 2023. Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart homes. Digital Communications and Networks. pp. 1-15. https://doi.org/10.1016/j.dcan.2023.01.013

Preserving Privacy of High-Dimensional Data by l-Diverse Constrained Slicing

Amin, Z., Anjum, A., Khan, A., Ahmad, A. and Jeon, G. 2022. Preserving Privacy of High-Dimensional Data by l-Diverse Constrained Slicing. Electronics. 11 (8), p. 1257. https://doi.org/10.3390/electronics11081257

Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches

Kanwal, T., Attaullaha, H., Anjum, A., Khan, A. and Jeon, G. 2022. Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches. Elsevier Digital Communications and Networks. pp. 1-16. https://doi.org/10.1016/j.dcan.2022.09.025

Fault-Tolerant Secure Data Aggregation Schemes in Smart Grids: Techniques, Design Challenges, and Future Trends

Khan, H. M., Khan, A., Khan, B. and Jeon, G. 2022. Fault-Tolerant Secure Data Aggregation Schemes in Smart Grids: Techniques, Design Challenges, and Future Trends. MDPI Energies. 15 (24), p. 9350.. https://doi.org/10.3390/en15249350

Privacy-Preserving V2I Communication and Secure Authentication Using ECC With Physical Unclonable Function

Nawaz, I., Ali Shah, M., Khan, A. and Jeon, S. 2024. Privacy-Preserving V2I Communication and Secure Authentication Using ECC With Physical Unclonable Function. Wireless Networks. pp. 1-16. https://doi.org/10.1007/s11276-024-03651-2

A Robust Internet of Drones Security Surveillance Communication Network Based on IOTA

Gilani, S. Y., Anjum, A., Khan, A., Khan, A., Syed, M. H., Moqurrab, S. A. and Srivastava, G. 2024. A Robust Internet of Drones Security Surveillance Communication Network Based on IOTA. Internet of Things. pp. 1-21. https://doi.org/10.1016/j.iot.2024.101066
  • 319
    total views of outputs
  • 154
    total downloads of outputs
  • 25
    views of outputs this month
  • 9
    downloads of outputs this month