关注
Dr. Gauhar Ali
Dr. Gauhar Ali
Post Doctoral Fellowship, Prince Sultan University, Saudia Arabia
在 psu.edu.sa 的电子邮件经过验证
标题
引用次数
引用次数
年份
Blockchain based permission delegation and access control in Internet of Things (BACI)
G Ali, N Ahmad, Y Cao, M Asif, H Cruickshank, QE Ali
Computers & Security 86, 318-334, 2019
1032019
xDBAuth: Blockchain based cross domain authentication and authorization framework for Internet of Things
G Ali, N Ahmad, Y Cao, S Khan, H Cruickshank, EA Qazi, A Ali
IEEE access 8, 58800-58816, 2020
882020
Issues, challenges, and research opportunities in intelligent transport system for security and privacy
QE Ali, N Ahmad, AH Malik, G Ali, WU Rehman
Applied Sciences 8 (10), 1964, 2018
612018
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
M Alam, X Zhang, K Khan, G Ali
Proceedings of the 16th ACM symposium on Access control models and …, 2011
492011
A UAV-Swarm-Communication Model Using a Machine-Learning Approach for Search-and-Rescue Applications
MEA Hisham Khalil, Saeed Ur Rahman, Inam Ullah, Inayat Khan, Abdulaziz ...
Drones 6 (12), 372, 2022
312022
BCON: Blockchain based access CONtrol across multiple conflict of interest domains
G Ali, N Ahmad, Y Cao, QE Ali, F Azim, H Cruickshank
Journal of Network and Computer Applications 147, 102440, 2019
252019
A comprehensive survey of Energy-Efficient Mac and Routing protocols for Underwater Wireless Sensor Networks.
JK Zahid Ullah Khan *, Qiao Gang, Aman Muhammad, Muhammad Muzzammil, Sajid ...
Electronics 11, 3015, 2022
232022
An Efficient and Secure Energy Trading Approach with Machine Learning Technique and Consortium Blockchain
AM Tehreem Ashfaq, Muhammad Irfan Khalid, Gauhar Ali, Mohammad El Affendi ...
Sensors 22 (19), 7263, 2022
172022
ASPA: Advanced strong pseudonym based authentication in intelligent transport system
QE Ali, N Ahmad, AH Malik, WU Rehman, AU Din, G Ali
PloS one 14 (8), e0221213, 2019
162019
Intrusion Detection in the Internet of Things Using Fusion of GRU-LSTM Deep Learning Model
MEA Mohammad S. Al-kahtani, Zahid Mehmood, Tariq Sadad, Islam Zada, Gauhar Ali
Intelligence Automation and Soft Computing 37 (2), 2279-2290, 2023
13*2023
Spata: Strong pseudonym-based authentication in intelligent transport system
QE Ali, N Ahmad, AH Malik, G Ali, M Asif, M Khalid, Y Cao
IEEE Access 6, 79114-79128, 2018
122018
Performance evaluation of routing protocols for underwater wireless sensor networks
T Rahman, I Ahmad, A Zeb, I Khan, G Ali, M ElAffendi
Journal of Marine Science and Engineering 11 (1), 38, 2022
112022
Proof of pseudonym: Blockchain-based privacy preserving protocol for intelligent transport system
S Johar, N Ahmad, A Durrani, G Ali
IEEE Access 9, 163625-163639, 2021
72021
An improved multiple manoeuver management protocol for platoon mobility in vehicular ad hoc networks
NA Fida, N Ahmad, Y Cao, MA Jan, G Ali
IET Intelligent Transport Systems 15 (7), 886-901, 2021
72021
BlockAuth: A blockchain-based framework for secure vehicle authentication and authorization
G Ali, M Elaffendi, N Ahmad
PLoS ONE, 2023
62023
Digital information credibility: Towards a set of guidelines for quality assessment of grey literature in multivocal literature review
MF Abrar, MS Khan, I Khan, G Ali, S Shah
Applied Sciences 13 (7), 4483, 2023
62023
Tilpdeep: a lightweight deep learning technique for handwritten transformed invariant Pashto text recognition
M Shabir, Z Jan, N Islam, I Khan, G Ali, M ElAffendi
IEEE Access 11, 23393-23406, 2023
52023
Towards a formal framework for cross domain access control
Q Alam, M Alam, G Ali, F Azim, KH Khan, T Ali, M Ali, A Hayat
International Information Institute (Tokyo). Information 15 (10), 4303, 2012
52012
Robust benchmark for propagandist text detection and mining high-quality data
PN Ahmad, Y Liu, G Ali, MA Wani, M ElAffendi
Mathematics 11 (12), 2668, 2023
42023
NPR-LBN: next point of interest recommendation using large bipartite networks with edge and cloud computing
I Khan, A Sadad, G Ali, M ElAffendi, R Khan, T Sadad
Journal of Cloud Computing 12 (1), 54, 2023
32023
系统目前无法执行此操作,请稍后再试。
文章 1–20