EACMS: Emergency access control management system for personal health record based on blockchain AR Rajput, Q Li, MT Ahvanooey, I Masood IEEE Access 7, 84304-84317, 2019 | 153 | 2019 |
Towards smart healthcare: patient data privacy and security in sensor‐cloud infrastructure I Masood, Y Wang, A Daud, NR Aljohani, H Dawood Wireless Communications and Mobile Computing 2018 (1), 2143897, 2018 | 70 | 2018 |
Securing drug distribution systems from tampering using blockchain M Humayun, NZ Jhanjhi, M Niazi, F Amsaad, I Masood Electronics 11 (8), 1195, 2022 | 41 | 2022 |
Selfish herd optimization algorithm based on chaotic strategy for adaptive IIR system identification problem R Zhao, Y Wang, C Liu, P Hu, H Jelodar, C Yuan, YC Li, I Masood, ... Soft Computing 24, 7637-7684, 2020 | 23 | 2020 |
Privacy management of patient physiological parameters I Masood, Y Wang, A Daud, NR Aljohani, H Dawood Telematics and Informatics 35 (4), 677-701, 2018 | 20 | 2018 |
Selfish herds optimization algorithm with orthogonal design and information update for training multi-layer perceptron neural network R Zhao, Y Wang, P Hu, H Jelodar, C Yuan, YC Li, I Masood, M Rabbani Applied Intelligence 49, 2339-2381, 2019 | 19 | 2019 |
Recommendation system based on semantic scholar mining and topic modeling on conference publications H Jelodar, Y Wang, G Xiao, M Rabbani, R Zhao, S Ayobi, P Hu, I Masood Soft Computing 25, 3675-3696, 2021 | 18 | 2021 |
ALO-DM: A smart approach based on ant lion optimizer with differential mutation operator in big data analytics P Hu, Y Wang, H Wang, R Zhao, C Yuan, Y Zheng, Q Lu, Y Li, I Masood Database Systems for Advanced Applications: DASFAA 2018 International …, 2018 | 10 | 2018 |
A survey of real-time approximate nearest neighbor query over streaming data for fog computing X Jiang, P Hu, Y Li, C Yuan, I Masood, H Jelodar, M Rabbani, Y Wang Journal of Parallel and Distributed Computing 116, 50-62, 2018 | 9 | 2018 |
An empirical study on investigating the role of KMS in promoting trust within GSD teams M Humayun, C Gang, I Masood Proceedings of the 17th International Conference on Evaluation and …, 2013 | 6 | 2013 |
A blockchain-based system for patient data privacy and security I Masood, A Daud, Y Wang, A Banjar, R Alharbey Multimedia Tools and Applications, 1-25, 2024 | 3 | 2024 |
Patient’s data privacy and security in mHealth applications: a Charles proxy-based recommendation AR Rajput, I Masood, A Tabassam, MS Aslam, Z ShaoYu, MA Rajput Soft Computing 27 (23), 18165-18180, 2023 | 3 | 2023 |
Corrigendum to “Towards Smart Healthcare: Patient Data Privacy and Security in Sensor-Cloud Infrastructure”. I Masood, Y Wang, A Daud, NR Aljohani, H Dawood Wireless Communications & Mobile Computing, 2019 | 1 | 2019 |
Recommendation System based on Semantic Scholar Mining and Topic modeling: A behavioral analysis of researchers from six conferences H Jelodar, Y Wang, M Rabbani, R Zhao, S Ayobi, P Hu, I Masood arXiv preprint arXiv:1812.08304, 2018 | 1 | 2018 |
A systematic mapping study on patient data privacy and security for software system development I Masood, S Zafar Sixth Intern. Conf. on Software Engineering Advances (ICSEA), 2011 | 1 | 2011 |
Securing Drug Distribution Systems from Tampering Using Blockchain. Electronics 2022, 11, 1195 M Humayun, NZ Jhanjhi, M Niazi, F Amsaad, I Masood s Note: MDPI stays neu-tral with regard to jurisdictional claims in …, 2022 | | 2022 |
Maximizing bichromatic reverse k nearest neighbor with multi-level tags queries in spatial-textual databases C Zhao, Y Wang, X Jiang, C Yuan, Y Li, I Masood 2017 International Conference on Progress in Informatics and Computing (PIC …, 2017 | | 2017 |
A Review on Models for Software Quality Enhancement from User’s Perspective A Ikram, I Masood, T Sarfraz, T Amjad | | |