关注
Tanveer Khan
Tanveer Khan
PhD Researcher at Tampere University
在 tuni.fi 的电子邮件经过验证
标题
引用次数
引用次数
年份
Fake news outbreak 2021: Can we stop the viral spread?
T Khan, A Michalas, A Akhunzada
Journal of Network and Computer Applications 190, 103112, 2021
942021
Clustering depth based routing for underwater wireless sensor networks
T Khan, I Ahmad, W Aman, I Azam, ZA Khan, U Qasim, S Avais, N Javaid
2016 IEEE 30th International Conference on Advanced Information Networking …, 2016
362016
MobiSink: Cooperative routing protocol for underwater sensor networks with sink mobility
PM Shah, I Ullah, T Khan, MS Hussain, ZA Khan, U Qasim, N Javaid
2016 IEEE 30th international conference on advanced information networking …, 2016
292016
Garbled role-based access control in the cloud
M Alam, N Emmanuel, T Khan, Y Xiang, H Hassan
Journal of Ambient Intelligence and Humanized Computing 9, 1153-1166, 2018
232018
A reliable and interference-aware routing protocol for underwater wireless sensor networks
A Majid, I Azam, T Khan, ZA Khan, U Qasim, N Javaid
2016 10th International Conference on Complex, Intelligent, and Software …, 2016
192016
Blind faith: Privacy-preserving machine learning using function approximation
T Khan, A Bakas, A Michalas
2021 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2021
152021
Post-quantum cryptographic communication protocol
I Mustafa, T Khan, M Alam, N Javaid, A Khan, A Akhunzada
US Patent 10,581,604, 2020
142020
Towards augmented proactive cyberthreat intelligence
T Khan, M Alam, A Akhunzada, A Hur, M Asif, MK Khan
Journal of Parallel and Distributed Computing 124, 47-59, 2019
132019
Clinicopathological study of eyelid tumors in Hyderabad-A review of 57 cases
S Karan, M Nathani, T Khan, S Ireni, S Khader
J Med Appl Sci 6 (2), 72-6, 2016
132016
Trust and believe-should we? evaluating the trustworthiness of twitter users
T Khan, A Michalas
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
122020
Seeing and believing: Evaluating the trustworthiness of twitter users
T Khan, A Michalas
IEEE Access 9, 110505-110516, 2021
92021
A scheme for three-way secure and verifiable e-voting
M Nassar, Q Malluhi, T Khan
2018 IEEE/ACS 15th International Conference on Computer Systems and …, 2018
92018
A high-level domain-specific language for SIEM (design, development and formal verification)
A Nazir, M Alam, SUR Malik, A Akhunzada, MN Cheema, MK Khan, ...
Cluster Computing 20, 2423-2437, 2017
92017
Split ways: Privacy-preserving training of encrypted data using split learning
T Khan, K Nguyen, A Michalas
arXiv preprint arXiv:2301.08778, 2023
82023
Secure policy execution using reusable garbled circuit in the cloud
M Alam, N Emmanuel, T Khan, A Khan, N Javaid, KKR Choo, R Buyya
Future Generation Computer Systems 87, 488-501, 2018
82018
An efficient, secure, and queryable encryption for NoSQL-based databases hosted on untrusted cloud environments
M Alenezi, M Usama, K Almustafa, W Iqbal, MA Raza, T Khan
International Journal of Information Security and Privacy (IJISP) 13 (2), 14-31, 2019
72019
Algorithm for detecting antipatterns in microservices projects
R Borges, T Khan
CEUR-WS, 2019
72019
Love or hate? Share or split? Privacy-preserving training using split learning and homomorphic encryption
T Khan, K Nguyen, A Michalas, A Bakas
2023 20th Annual International Conference on Privacy, Security and Trust …, 2023
52023
Structures and data preserving homomorphic signatures
N Emmanuel, A Khan, M Alam, T Khan, MK Khan
Journal of Network and Computer Applications 102, 58-70, 2018
42018
A More Secure Split: Enhancing the Security of Privacy-Preserving Split Learning
T Khan, K Nguyen, A Michalas
Nordic Conference on Secure IT Systems, 307-329, 2023
22023
系统目前无法执行此操作,请稍后再试。
文章 1–20