Fake news outbreak 2021: Can we stop the viral spread? T Khan, A Michalas, A Akhunzada Journal of Network and Computer Applications 190, 103112, 2021 | 94 | 2021 |
Clustering depth based routing for underwater wireless sensor networks T Khan, I Ahmad, W Aman, I Azam, ZA Khan, U Qasim, S Avais, N Javaid 2016 IEEE 30th International Conference on Advanced Information Networking …, 2016 | 36 | 2016 |
MobiSink: Cooperative routing protocol for underwater sensor networks with sink mobility PM Shah, I Ullah, T Khan, MS Hussain, ZA Khan, U Qasim, N Javaid 2016 IEEE 30th international conference on advanced information networking …, 2016 | 29 | 2016 |
Garbled role-based access control in the cloud M Alam, N Emmanuel, T Khan, Y Xiang, H Hassan Journal of Ambient Intelligence and Humanized Computing 9, 1153-1166, 2018 | 23 | 2018 |
A reliable and interference-aware routing protocol for underwater wireless sensor networks A Majid, I Azam, T Khan, ZA Khan, U Qasim, N Javaid 2016 10th International Conference on Complex, Intelligent, and Software …, 2016 | 19 | 2016 |
Blind faith: Privacy-preserving machine learning using function approximation T Khan, A Bakas, A Michalas 2021 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2021 | 15 | 2021 |
Post-quantum cryptographic communication protocol I Mustafa, T Khan, M Alam, N Javaid, A Khan, A Akhunzada US Patent 10,581,604, 2020 | 14 | 2020 |
Towards augmented proactive cyberthreat intelligence T Khan, M Alam, A Akhunzada, A Hur, M Asif, MK Khan Journal of Parallel and Distributed Computing 124, 47-59, 2019 | 13 | 2019 |
Clinicopathological study of eyelid tumors in Hyderabad-A review of 57 cases S Karan, M Nathani, T Khan, S Ireni, S Khader J Med Appl Sci 6 (2), 72-6, 2016 | 13 | 2016 |
Trust and believe-should we? evaluating the trustworthiness of twitter users T Khan, A Michalas 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 12 | 2020 |
Seeing and believing: Evaluating the trustworthiness of twitter users T Khan, A Michalas IEEE Access 9, 110505-110516, 2021 | 9 | 2021 |
A scheme for three-way secure and verifiable e-voting M Nassar, Q Malluhi, T Khan 2018 IEEE/ACS 15th International Conference on Computer Systems and …, 2018 | 9 | 2018 |
A high-level domain-specific language for SIEM (design, development and formal verification) A Nazir, M Alam, SUR Malik, A Akhunzada, MN Cheema, MK Khan, ... Cluster Computing 20, 2423-2437, 2017 | 9 | 2017 |
Split ways: Privacy-preserving training of encrypted data using split learning T Khan, K Nguyen, A Michalas arXiv preprint arXiv:2301.08778, 2023 | 8 | 2023 |
Secure policy execution using reusable garbled circuit in the cloud M Alam, N Emmanuel, T Khan, A Khan, N Javaid, KKR Choo, R Buyya Future Generation Computer Systems 87, 488-501, 2018 | 8 | 2018 |
An efficient, secure, and queryable encryption for NoSQL-based databases hosted on untrusted cloud environments M Alenezi, M Usama, K Almustafa, W Iqbal, MA Raza, T Khan International Journal of Information Security and Privacy (IJISP) 13 (2), 14-31, 2019 | 7 | 2019 |
Algorithm for detecting antipatterns in microservices projects R Borges, T Khan CEUR-WS, 2019 | 7 | 2019 |
Love or hate? Share or split? Privacy-preserving training using split learning and homomorphic encryption T Khan, K Nguyen, A Michalas, A Bakas 2023 20th Annual International Conference on Privacy, Security and Trust …, 2023 | 5 | 2023 |
Structures and data preserving homomorphic signatures N Emmanuel, A Khan, M Alam, T Khan, MK Khan Journal of Network and Computer Applications 102, 58-70, 2018 | 4 | 2018 |
A More Secure Split: Enhancing the Security of Privacy-Preserving Split Learning T Khan, K Nguyen, A Michalas Nordic Conference on Secure IT Systems, 307-329, 2023 | 2 | 2023 |