Mazhar Ali
Mazhar Ali
PhD
Verified email at ciit.net.pk
TitleCited byYear
Security in cloud computing: Opportunities and challenges
M Ali, SU Khan, AV Vasilakos
Information sciences 305, 357-383, 2015
5782015
A taxonomy and survey on green data center networks
K Bilal, SUR Malik, O Khalid, A Hameed, E Alvarez, V Wijaysekara, R Irfan, ...
Future Generation Computer Systems 36, 189-208, 2014
1552014
SeDaSC: secure data sharing in clouds
M Ali, R Dhamotharan, E Khan, SU Khan, AV Vasilakos, K Li, AY Zomaya
IEEE Systems Journal 11 (2), 395-404, 2017
1222017
Incremental proxy re-encryption scheme for mobile cloud computing environment
AN Khan, MLM Kiah, SA Madani, M Ali, S Shamshirband
The Journal of Supercomputing 68 (2), 624-651, 2014
712014
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing
AN Khan, MLM Kiah, SA Madani, M Ali
The Journal of Supercomputing 66 (3), 1687-1706, 2013
612013
DROPS: Division and replication of data in the cloud for optimal performance and security
M Ali, K Bilal, S Khan, B Veeravalli, K Li, A Zomaya
IEEE Transactions on Cloud computing 6 (2), 303-315, 2018
542018
BSS: block-based sharing scheme for secure data storage services in mobile cloud environment
AN Khan, MLM Kiah, M Ali, SA Madani, S Shamshirband
The Journal of Supercomputing 70 (2), 946-976, 2014
492014
A survey on energy-efficient methodologies and architectures of network-on-chip
A Abbas, M Ali, A Fayyaz, A Ghosh, A Kalra, SU Khan, MUS Khan, ...
Computers & Electrical Engineering 40 (8), 333-347, 2014
322014
A cloud-manager-based re-encryption scheme for mobile users in cloud environment: a hybrid approach
AN Khan, MLM Kiah, M Ali, S Shamshirband
Journal of Grid Computing 13 (4), 651-675, 2015
282015
Personalized healthcare cloud services for disease risk assessment and wellness management using social media
A Abbas, M Ali, MUS Khan, SU Khan
Pervasive and Mobile Computing 28, 81-99, 2016
272016
DaSCE: Data security for cloud environment with semi-trusted third party
M Ali, S Malik, S Khan
IEEE Transactions on Cloud Computing 5 (4), 642-655, 2017
232017
3D-RP: A DHT-based routing protocol for MANETs
SA Abid, M Othman, N Shah, M Ali, AR Khan
The Computer Journal 58 (2), 258-279, 2014
222014
Pirax: framework for application piracy control in mobile cloud environment
M Othman, M Ali, AN Khan, SA Madani
The Journal of Supercomputing 68 (2), 753-776, 2014
152014
Segregating spammers and unsolicited bloggers from genuine experts on Twitter
MUS Khan, M Ali, A Abbas, SU Khan, AY Zomaya
IEEE Transactions on Dependable and Secure Computing 15 (4), 551-560, 2016
122016
A cloud based framework for identification of influential health experts from Twitter
A Abbas, MUS Khan, M Ali, SU Khan, LT Yang
2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 …, 2015
122015
On the Correlation of Sensor Location and Human Activity Recognition in Body Area Networks (BANs)
MUS Khan, A Abbas, M Ali, M Jawad, SU Khan, K Li, AY Zomaya
IEEE Systems Journal 12 (1), 82-91, 2018
102018
Mitigation and Improving SHA-1 Standard Using Collision Detection Approach
Z Al-Odat, M Ali, SU Khan
2018 International Conference on Frontiers of Information Technology (FIT …, 2018
62018
A comparative study and workload distribution model for re‐encryption schemes in a mobile cloud computing environment
AN Khan, M Ali, AR Khan, FG Khan, IA Khan, W Jadoon, S Shamshirband, ...
International Journal of Communication Systems 30 (16), e3308, 2017
62017
Boosting the accuracy of AdaBoost for object detection and recognition
Z Mahmood, M Nazeer, M Arif, I Shahzad, F Khan, M Ali, U Khan, ...
2016 International Conference on Frontiers of Information Technology (FIT …, 2016
62016
Stochastic and statistical analysis of utility revenues and weather data analysis for consumer demand estimation in smart grids
SM Ali, CA Mehmood, B Khan, M Jawad, U Farid, JK Jadoon, M Ali, ...
PloS one 11 (6), e0156849, 2016
62016
The system can't perform the operation now. Try again later.
Articles 1–20