关注
Isma Masood
Isma Masood
在 aston.ac.uk 的电子邮件经过验证
标题
引用次数
引用次数
年份
EACMS: Emergency access control management system for personal health record based on blockchain
AR Rajput, Q Li, MT Ahvanooey, I Masood
IEEE Access 7, 84304-84317, 2019
1532019
Towards smart healthcare: patient data privacy and security in sensor‐cloud infrastructure
I Masood, Y Wang, A Daud, NR Aljohani, H Dawood
Wireless Communications and Mobile Computing 2018 (1), 2143897, 2018
702018
Securing drug distribution systems from tampering using blockchain
M Humayun, NZ Jhanjhi, M Niazi, F Amsaad, I Masood
Electronics 11 (8), 1195, 2022
412022
Selfish herd optimization algorithm based on chaotic strategy for adaptive IIR system identification problem
R Zhao, Y Wang, C Liu, P Hu, H Jelodar, C Yuan, YC Li, I Masood, ...
Soft Computing 24, 7637-7684, 2020
232020
Privacy management of patient physiological parameters
I Masood, Y Wang, A Daud, NR Aljohani, H Dawood
Telematics and Informatics 35 (4), 677-701, 2018
202018
Selfish herds optimization algorithm with orthogonal design and information update for training multi-layer perceptron neural network
R Zhao, Y Wang, P Hu, H Jelodar, C Yuan, YC Li, I Masood, M Rabbani
Applied Intelligence 49, 2339-2381, 2019
192019
Recommendation system based on semantic scholar mining and topic modeling on conference publications
H Jelodar, Y Wang, G Xiao, M Rabbani, R Zhao, S Ayobi, P Hu, I Masood
Soft Computing 25, 3675-3696, 2021
182021
ALO-DM: A smart approach based on ant lion optimizer with differential mutation operator in big data analytics
P Hu, Y Wang, H Wang, R Zhao, C Yuan, Y Zheng, Q Lu, Y Li, I Masood
Database Systems for Advanced Applications: DASFAA 2018 International …, 2018
102018
A survey of real-time approximate nearest neighbor query over streaming data for fog computing
X Jiang, P Hu, Y Li, C Yuan, I Masood, H Jelodar, M Rabbani, Y Wang
Journal of Parallel and Distributed Computing 116, 50-62, 2018
92018
An empirical study on investigating the role of KMS in promoting trust within GSD teams
M Humayun, C Gang, I Masood
Proceedings of the 17th International Conference on Evaluation and …, 2013
62013
A blockchain-based system for patient data privacy and security
I Masood, A Daud, Y Wang, A Banjar, R Alharbey
Multimedia Tools and Applications, 1-25, 2024
32024
Patient’s data privacy and security in mHealth applications: a Charles proxy-based recommendation
AR Rajput, I Masood, A Tabassam, MS Aslam, Z ShaoYu, MA Rajput
Soft Computing 27 (23), 18165-18180, 2023
32023
Corrigendum to “Towards Smart Healthcare: Patient Data Privacy and Security in Sensor-Cloud Infrastructure”.
I Masood, Y Wang, A Daud, NR Aljohani, H Dawood
Wireless Communications & Mobile Computing, 2019
12019
Recommendation System based on Semantic Scholar Mining and Topic modeling: A behavioral analysis of researchers from six conferences
H Jelodar, Y Wang, M Rabbani, R Zhao, S Ayobi, P Hu, I Masood
arXiv preprint arXiv:1812.08304, 2018
12018
A systematic mapping study on patient data privacy and security for software system development
I Masood, S Zafar
Sixth Intern. Conf. on Software Engineering Advances (ICSEA), 2011
12011
Securing Drug Distribution Systems from Tampering Using Blockchain. Electronics 2022, 11, 1195
M Humayun, NZ Jhanjhi, M Niazi, F Amsaad, I Masood
s Note: MDPI stays neu-tral with regard to jurisdictional claims in …, 2022
2022
Maximizing bichromatic reverse k nearest neighbor with multi-level tags queries in spatial-textual databases
C Zhao, Y Wang, X Jiang, C Yuan, Y Li, I Masood
2017 International Conference on Progress in Informatics and Computing (PIC …, 2017
2017
A Review on Models for Software Quality Enhancement from User’s Perspective
A Ikram, I Masood, T Sarfraz, T Amjad
系统目前无法执行此操作,请稍后再试。
文章 1–18