Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey SU al. Computer Science Review 47, 2022 | 59 | 2022 |
A review of signcryption schemes based on hyper elliptic curve S Ullah, XY Li, L Zhang 2017 3rd International Conference on Big Data Computing and Communications …, 2017 | 41 | 2017 |
IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic F Ullah, S Ullah, G Srivastava, JCW Lin Digital Communications and Networks 10 (1), 190-204, 2024 | 30 | 2024 |
Cyber-threat detection system using a hybrid approach of transfer learning and multi-model image representation F Ullah, S Ullah, MR Naeem, L Mostarda, S Rho, X Cheng Sensors 22 (15), 5883, 2022 | 19 | 2022 |
A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization F Ullah, G Srivastava, S Ullah Journal of Cloud Computing 11 (1), 75, 2022 | 15 | 2022 |
Blind signcryption scheme based on hyper elliptic curves cryptosystem SUN Din Peer-to-Peer Networking and Applications 14, 917-932, 2021 | 13 | 2021 |
Droid-MCFG: Android malware detection system using manifest and control flow traces with multi-head temporal convolutional network F Ullah, S Ullah, G Srivastava, JCW Lin Physical Communication 57, 101975, 2023 | 11 | 2023 |
A novel trusted third party based signcryption scheme Shamsher Ullah et al. Multimedia Tools and Applications, 2020 | 11 | 2020 |
Kernel homomorphic encryption protocol S Ullah, XY Li, MT Hussain, Z Lan Journal of Information Security and Applications 48, 102366, 2019 | 11 | 2019 |
A Survey on X.509 Public-Key Infrastructure, Certificate Revocation, and Their Modern Implementation on Blockchain and Ledger Technologies S Khan, F Luo, Z Zhang, F Ullah, F Amin, SF Qadri, MBB Heyat, R Ruby, ... IEEE Communications Surveys & Tutorials, 2023 | 10 | 2023 |
A Scalable Federated Learning Approach for Collaborative Smart Healthcare System with Intermittent Clients using Medical Imaging U Farhan, S Gautam, X Heng, U Shamsher, CWL Jerry, Z Yue IEEE Journal of Biomedical and Health Informatics, 1-13, 2023 | 8 | 2023 |
Toras: Trustworthy load-balanced opportunistic routing for asynchronous duty-cycled wsns MUF Qaisar, X Wang, A Hawbani, A Khan, A Ahmed, FT Wedaj, S Ullah IEEE Systems Journal, 2022 | 8 | 2022 |
Nric: A noise removal approach for nonlinear isomap method M Yousaf, MSS Khan, TU Rehman, S Ullah, L Jing Neural Processing Letters 53, 2277-2304, 2021 | 7 | 2021 |
A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments S Ullah, Z Jiangbin, MT Hussain, N Din, F Ullah, MU Farooq Journal of Information Security and Applications 70, 103346, 2022 | 6 | 2022 |
NMal-Droid: network-based android malware detection system using transfer learning and CNN-BiGRU ensemble U Farhan, U Shamsher, G Srivastava, L Jerry Chun-Wei, Z Yue Wireless Networks, 2023 | 5 | 2023 |
Γ-Access Policy: Attribute-Based Encryption Scheme for Social Network Based Data Trading S Ullah, L Zhang, MW Sardar, MT Hussain China Communications 18 (8), 183-198, 2021 | 4 | 2021 |
BLIND SIGNCRYPTION SCHEME BASED ON HYPER ELLIPTIC CURVE FOR UNTRACEABLE PAYMENT SYSTEM SU et Proc. 13th International Conference on Statistical Sciences 28, 337-344, 2015 | 4* | 2015 |
Ee-tar: Energy efficient and thermal aware routing protocol for software defined wireless body area networks A Ahmed, X Wang, A Hawbani, MU Farooq, T Qureshi, S Ullah 2020 IEEE 8th International Conference on Information, Communication and …, 2020 | 3 | 2020 |
QuSigS: A quantum Signcryption scheme to recover key escrow problem and key revocation problem in cloud computing S Ullah, MT Hussain, M Yousaf Multimedia Tools and Applications, 2022 | 2 | 2022 |
Privacy-Preserving Federated Learning Approach for Distributed Malware Attacks With Intermittent Clients and Image Representation U Farhan, S Gautam, U Shamsher, L Mostarda IEEE Transactions on Consumer Electronics, 1-12, 2023 | 1 | 2023 |