Mazhar Ali
Mazhar Ali
Verified email at
TitleCited byYear
Security in cloud computing: Opportunities and challenges
M Ali, SU Khan, AV Vasilakos
Information sciences 305, 357-383, 2015
A taxonomy and survey on green data center networks
K Bilal, SUR Malik, O Khalid, A Hameed, E Alvarez, V Wijaysekara, R Irfan, ...
Future Generation Computer Systems 36, 189-208, 2014
SeDaSC: secure data sharing in clouds
M Ali, R Dhamotharan, E Khan, SU Khan, AV Vasilakos, K Li, AY Zomaya
IEEE Systems Journal 11 (2), 395-404, 2017
Incremental proxy re-encryption scheme for mobile cloud computing environment
AN Khan, MLM Kiah, SA Madani, M Ali, S Shamshirband
The Journal of Supercomputing 68 (2), 624-651, 2014
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing
AN Khan, MLM Kiah, SA Madani, M Ali
The Journal of Supercomputing 66 (3), 1687-1706, 2013
DROPS: Division and replication of data in the cloud for optimal performance and security
M Ali, K Bilal, S Khan, B Veeravalli, K Li, A Zomaya
IEEE Transactions on Cloud computing 6 (2), 303-315, 2018
BSS: block-based sharing scheme for secure data storage services in mobile cloud environment
AN Khan, MLM Kiah, M Ali, SA Madani, S Shamshirband
The Journal of Supercomputing 70 (2), 946-976, 2014
A survey on energy-efficient methodologies and architectures of network-on-chip
A Abbas, M Ali, A Fayyaz, A Ghosh, A Kalra, SU Khan, MUS Khan, ...
Computers & Electrical Engineering 40 (8), 333-347, 2014
A cloud-manager-based re-encryption scheme for mobile users in cloud environment: a hybrid approach
AN Khan, MLM Kiah, M Ali, S Shamshirband
Journal of Grid Computing 13 (4), 651-675, 2015
Personalized healthcare cloud services for disease risk assessment and wellness management using social media
A Abbas, M Ali, MUS Khan, SU Khan
Pervasive and Mobile Computing 28, 81-99, 2016
DaSCE: Data security for cloud environment with semi-trusted third party
M Ali, S Malik, S Khan
IEEE Transactions on Cloud Computing 5 (4), 642-655, 2017
3D-RP: A DHT-based routing protocol for MANETs
SA Abid, M Othman, N Shah, M Ali, AR Khan
The Computer Journal 58 (2), 258-279, 2014
Pirax: framework for application piracy control in mobile cloud environment
M Othman, M Ali, AN Khan, SA Madani
The Journal of Supercomputing 68 (2), 753-776, 2014
On the Correlation of Sensor Location and Human Activity Recognition in Body Area Networks (BANs)
MUS Khan, A Abbas, M Ali, M Jawad, SU Khan, K Li, AY Zomaya
IEEE Systems Journal 12 (1), 82-91, 2018
A cloud based framework for identification of influential health experts from Twitter
A Abbas, MUS Khan, M Ali, SU Khan, LT Yang
2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 …, 2015
Segregating spammers and unsolicited bloggers from genuine experts on Twitter
MUS Khan, M Ali, A Abbas, SU Khan, AY Zomaya
IEEE Transactions on Dependable and Secure Computing 15 (4), 551-560, 2016
Mitigation and Improving SHA-1 Standard Using Collision Detection Approach
Z Al-Odat, M Ali, SU Khan
2018 International Conference on Frontiers of Information Technology (FIT …, 2018
Stochastic and statistical analysis of utility revenues and weather data analysis for consumer demand estimation in smart grids
SM Ali, CA Mehmood, B Khan, M Jawad, U Farid, JK Jadoon, M Ali, ...
PloS one 11 (6), e0156849, 2016
A comparative study and workload distribution model for re‐encryption schemes in a mobile cloud computing environment
AN Khan, M Ali, AR Khan, FG Khan, IA Khan, W Jadoon, S Shamshirband, ...
International Journal of Communication Systems 30 (16), e3308, 2017
Boosting the accuracy of AdaBoost for object detection and recognition
Z Mahmood, M Nazeer, M Arif, I Shahzad, F Khan, M Ali, U Khan, ...
2016 International Conference on Frontiers of Information Technology (FIT …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20