Mansoor Ahmed (PhD)
Mansoor Ahmed (PhD)
Research Fellow @ ADAPT Centre & IVI- MU, Ireland; Former Marie-Curie (MSCA) Fellow
Verified email at - Homepage
Cited by
Cited by
Smart Cities: A Survey on Security Concerns
AKMA Sidra Ijaz, Munam Ali Shah
International Journal of Advanced Computer Science and Applications 7 (2), 2016
Android Malware Detection & Protection: A Survey
AKMA Saba Arshad, Munam Ali Shah
International Journal of Advanced Computer Science and Applications 7 (2), 2016
Towards a Formally Verified Zero Watermarking Scheme for Data Integrity in the Internet of Things based-wireless Sensor Networks
MMR Khizar Hameed, Abid Khan, Mansoor Ahmed, Alavalapati Goutham Reddy
Future Generation Computer Systems 82, 274-289, 2018
Leveraging IoT and fog computing in healthcare systems
KS Awaisi, S Hussain, M Ahmed, AA Khan, G Ahmed
IEEE Internet of Things Magazine 3 (2), 52-56, 2020
SemanticLIFE ‐A Framework for Managing Information of A Human Lifetime
MA Hoang H.H., Karim M.S., Khusro S., LanzenbergerM., Latif K., Michlmayr E ...
Proceedings of 6th International Conference on Information Integration and …, 2004
CDED-Net: Joint segmentation of optic disc and optic cup for glaucoma screening
M Tabassum, TM Khan, M Arsalan, SS Naqvi, M Ahmed, HA Madni, ...
IEEE Access 8, 102733-102747, 2020
Towards Reliable and Energy-Efficient Incremental Cooperative Communication for Wireless Body Area Networks
MA Sidrah Yousaf, Nadeem Javaid, Umar Qasim, Nabil Alrajeh, Zahoor Ali Khan
Sensors 16, 2016
Towards ontology-based multilingual URL filtering: A Big Data Problem
GJ Mubashar Hussain, Mansoor Ahmed, Hasan Ali Khattak, Muhammad Imran, Abid ...
The Journal of Supercomputing 74 (10), 5003–5021, 2018
τ-Safety: A Privacy Model for Sequential Publication with Arbitrary Updates
MMA Adeel Anjum, Guillaume Raschia, Marc Gelgon, Abid Khan, Sai fur Rehman ...
Computer and Security: Elsevier 66, 20-39, 2017
Intelligent role-based access control model and framework using semantic business roles in multi-domain environments
R Ghazal, AK Malik, N Qadeer, B Raza, AR Shahid, H Alquhayz
IEEE Access 8, 12253-12267, 2020
Privacy-preserving model and generalization correlation attacks for 1: M data with multiple sensitive attributes
T Kanwal, SAA Shaukat, A Anjum, KKR Choo, A Khan, N Ahmad, ...
Information Sciences 488, 238-256, 2019
Security and privacy issues in fog computing
A Ali, M Ahmed, M Imran, HA Khattak
Fog Computing: Theory and Practice, 105-137, 2020
Privacy preserving data by conceptualizing smart cities using MIDR-Angelization
A Anjum, T Ahmed, A Khan, N Ahmad, M Ahmad, M Asif, AG Reddy, ...
Sustainable cities and society 40, 326-334, 2018
A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS)
S Beg, A Anjum, M Ahmad, S Hussain, G Ahmad, S Khan, KKR Choo
Journal of Network and Computer Applications 174, 102874, 2021
Information Collection Centric Techniques for Cloud Resource Management: Taxonomy, Analysis and Challenges
MKK Sidra Aslam, Saif ul Islam, Abid Khan, Mansoor Ahmed, Adnan Akhundzada
Journal of Network and Computer Applications 100, 80-94, 2017
Towards an Ontology‐Based Risk Assessment in Collaborative Environment Using SemanticLIFE
AMT Mansoor Ahmed, Amin Anjomshoaa
International Conference on Availability, Reliability and Security, 2007
BCALS: Blockchain‐based secure log management system for cloud computing
A Ali, A Khan, M Ahmed, G Jeon
Transactions on Emerging Telecommunications Technologies 33 (4), e4272, 2022
Watermarking as a service (WaaS) with anonymity
G Naz, Farah and Khan, Abid and Ahmed, Mansoor and Khan, Majid Iqbal and Din ...
Multimedia Tools and Applications, 1--25, 2019
Buyer Seller Watermarking Protocols Issues and Challenges - A Survey
MASN Abid Khan, Farhana Jabeen,Farah Naz, Sabah Suhail
Journal of Network and Computer Applications: Elsevier 75, 317–334, 2016
S-box design based on optimize LFT parameter selection: a practical approach in recommendation system domain
S Beg, N Ahmad, A Anjum, M Ahmad, A Khan, F Baig, A Khan
Multimedia Tools and Applications 79, 11667-11684, 2020
The system can't perform the operation now. Try again later.
Articles 1–20