Chaos-based confusion and diffusion of image pixels using dynamic substitution A Qayyum, J Ahmad, W Boulila, S Rubaiee, F Masood, F Khan, ... IEEE Access 8, 140876-140895, 2020 | 99 | 2020 |
FBASHI: Fuzzy and blockchain-based adaptive security for healthcare IoTs Z Zulkifl, F Khan, S Tahir, M Afzal, W Iqbal, A Rehman, S Saeed, ... IEEE Access 10, 15644-15656, 2022 | 64 | 2022 |
Control of hybrid diesel/PV/battery/ultra-capacitor systems for future shipboard microgrids MU Mutarraf, Y Terriche, KAK Niazi, F Khan, JC Vasquez, JM Guerrero Energies 12 (18), 3460, 2019 | 35 | 2019 |
An expressive hidden access policy CP-ABE F Khan, H Li, L Zhang, J Shen 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC …, 2017 | 33 | 2017 |
Privacy-preserving COVID-19 contact tracing using blockchain S Tahir, H Tahir, A Sajjad, M Rajarajan, F Khan Journal of Communications and Networks 23 (5), 360-373, 2021 | 27 | 2021 |
Owner specified excessive access control for attribute based encryption F Khan, H Li, L Zhang IEEE Access 4, 8967-8976, 2016 | 23 | 2016 |
A novel homomorphic approach for preserving privacy of patient data in telemedicine Y Iqbal, S Tahir, H Tahir, F Khan, S Saeed, AM Almuhaideb, AM Syed Sensors 22 (12), 4432, 2022 | 17 | 2022 |
Granular data access control with a patient-centric policy update for healthcare F Khan, S Khan, S Tahir, J Ahmad, H Tahir, SA Shah Sensors 21 (10), 3556, 2021 | 17 | 2021 |
A homomorphic approach for security and privacy preservation of Smart Airports H Malik, S Tahir, H Tahir, M Ihtasham, F Khan Future Generation Computer Systems 141, 500-513, 2023 | 11 | 2023 |
PUF-based key generation scheme for secure group communication using MEMS M Mehdi, MT Ajani, H Tahir, S Tahir, Z Alizai, F Khan, Q Riaz, M Hussain Electronics 10 (14), 1691, 2021 | 10 | 2021 |
A novel image-based homomorphic approach for preserving the privacy of autonomous vehicles connected to the cloud A Sultan, S Tahir, H Tahir, T Anwer, F Khan, M Rajarajan, O Rana IEEE Transactions on Intelligent Transportation Systems 24 (2), 1936-1948, 2022 | 8 | 2022 |
A novel searchable encryption scheme to reduce the access pattern leakage M Awais, S Tahir, F Khan, H Tahir, R Tahir, R Latif, MY Umair Future Generation Computer Systems 133, 338-350, 2022 | 8 | 2022 |
Automated grading of diabetic macular edema using color retinal photographs M Zubair, J Ahmad, F Alqahtani, F Khan, SA Shah, QH Abbasi, SU Jan 2022 2nd International Conference of Smart Systems and Emerging Technologies …, 2022 | 8 | 2022 |
Efficient attribute-based encryption with repeated attributes optimization F Khan, H Li, Y Zhang, H Abbas, T Yaqoob International Journal of Information Security 20, 431-444, 2021 | 8 | 2021 |
The implementation of encryption algorithms in MQTT protocol for IoT constrained devices Y Iqbal, MF Amjad, F Khan, H Abbas 2022 14th International Conference on Computational Intelligence and …, 2022 | 7 | 2022 |
Ensuring trust and confidentiality for adaptive video streaming in ICN F Khan, H Li Journal of Communications and Networks 21 (6), 539-547, 2019 | 7 | 2019 |
Efficient privacy-preserving decentralized ABE supporting expressive access structures L Zhang, H Li, Y Zhang, F Khan 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2017 | 5 | 2017 |
Privacy-preserving attribute-based encryption supporting expressive access structures L Zhang, H Li, Y Zhang, F Khan 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC …, 2017 | 4 | 2017 |
Privacy Preserving Inference for Deep Neural Networks: Optimizing Homomorphic Encryption for Efficient and Secure Classification A Akram, F Khan, S Tahir, A Iqbal, SA Shah, A Baz IEEE Access, 2024 | 3 | 2024 |
A Novel Fog-based Framework for Preventing Cloud Lock-in while Enabling Searchable Encryption M Raj, S Tahir, F Khan, H Tahir, Z Zulkifl 2021 International Conference on Digital Futures and Transformative …, 2021 | 3 | 2021 |