Follow
Dr. Rafiullah Khan
Dr. Rafiullah Khan
Visiting Fellow, School of Computing, Macquarie University Sydney, Australia
Verified email at mq.edu.au - Homepage
Title
Cited by
Cited by
Year
EEWMP: an IoT-based energy-efficient water management platform for smart irrigation
R Ullah, AW Abbas, M Ullah, RU Khan, IU Khan, N Aslam, SS Aljameel
Scientific Programming 2021, 1-9, 2021
402021
Acute myeloid leukemia (AML) detection using AlexNet model
M Shaheen, R Khan, RR Biswal, M Ullah, A Khan, MI Uddin, M Zareei, ...
Complexity 2021, 1-8, 2021
332021
Remote diagnosis and triaging model for skin cancer using EfficientNet and extreme gradient boosting
IU Khan, N Aslam, T Anwar, SS Aljameel, M Ullah, R Khan, A Rehman, ...
Complexity 2021, 1-13, 2021
312021
Roman Urdu opinion mining system (RUOMiS)
M Daud, R Khan, A Daud
Computer Science & Engineering: An International Journal (CSEIJ) 4 (5/6), 1-9, 2015
312015
USAD: an intelligent system for slang and abusive text detection in PERSO-Arabic-scripted Urdu
NU Haq, M Ullah, R Khan, A Ahmad, A Almogren, B Hayat, B Shafi
Complexity 2020, 1-7, 2020
182020
QuPiD attack: machine learning-based privacy quantification mechanism for PIR protocols in health-related web search
R Khan, A Ahmad, AO Alsayed, M Binsawad, MA Islam, M Ullah
Scientific Programming 2020, 2020
182020
ObSecure Logging (OSLo): a framework to protect and evaluate the web search privacy in health care domain
M Ullah, MA Islam, R Khan, M Aleem, MA Iqbal
Journal of Medical Imaging and Health Informatics 9 (6), 1181-1190, 2019
122019
Privacy Exposure Measure: A Privacy-Preserving Technique for Health-Related Web Search
MA Khan, Rafiullah and Islam, Muhammad Arshad and Ullah, Mohib and Aleem ...
Journal of Medical Imaging and Health Informatics 9 (6), 1196--1204, 2019
112019
Revealing pir protocols protected users
R Khan, M Ullah, MA Islam
2016 Sixth International Conference on Innovative Computing Technology …, 2016
112016
Poshida, a protocol for private information retrieval
M Ullah, R Khan, MA Islam
2016 Sixth International Conference on Innovative Computing Technology …, 2016
112016
Quantification of PIR protocols privacy
R Khan, Mohibullah, MA Islam
International Conference on Communication, Computing and Digital Systems (C …, 2017
102017
An effective deep learning approach for the classification of bacteriosis in peach leave
M Akbar, M Ullah, B Shah, RU Khan, T Hussain, F Ali, F Alenezi, I Syed, ...
Frontiers in Plant Science 13, 4723, 2022
92022
Multi-group ObScure logging (MG-OSLo) A privacy-preserving protocol for private web search
M Ullah, R Khan, MIU Haq, A Khan, W Alosaimi, MI Uddin, A Alharbi
IEEE Access 9, 79005-79020, 2021
92021
Poshida II, a multi group distributed peer to peer protocol for private web search
M Ullah, R Khan, MA Islam
2016 International Conference on Frontiers of Information Technology (FIT …, 2016
82016
IDBR: IoT enabled depth base routing method for underwater wireless sensor network
U Farooq, M Ullah, RU Khan, A Alharbi, MI Uddin, MIU Haq, W Alosaimi
Journal of Sensors 2021, 1-8, 2021
72021
Conceptual Framework of Redundant Link Aggregation
R Khan, S Ali
Computer Science & Engineering: An International Journal, 2013
72013
Profile aware obscure logging (paoslo): A web search privacy-preserving protocol to mitigate digital traces
M Ullah, RU Khan, IU Khan, N Aslam, SS Aljameel, MI Ul Haq, MA Islam
Security and Communication Networks 2022, 2022
62022
SiFSO: Fish Swarm Optimization-Based Technique for Efficient Community Detection in Complex Networks
Y Ahmad, M Ullah, R Khan, B Shafi, A Khan, M Zareei, A Aldosary, ...
Complexity 2020, 2020
62020
NN-QuPiD attack: neural network-based privacy quantification model for private information retrieval protocols
R Khan, M Ullah, A Khan, MI Uddin, M Al-Yahya
Complexity 2021, 1-8, 2021
52021
On the Effectiveness of Private Information Retrieval Protocols
R Khan
Capital University of Science and Technology, Islamabad, Pakistan, 2020
42020
The system can't perform the operation now. Try again later.
Articles 1–20