Skip navigation

Items where Greenwich Author is "Waqas, Dr Muhammad"

Items where Greenwich Author is "Waqas, Dr Muhammad"

Group by: Item Type | Date | Funders | Uncontrolled Keywords | No Grouping
Jump to: BGP security; blockchain; prefix hijacking; trust model; secure routing | Blockchain, ITS, VNA, repairing, 5G, DAO, incentive | Cloud Computing, Task Scheduling, Cloud Sim Simulator, Scheduling algorithms, Makespan Metric, Total Completion Time. | DNS, DNS over HTTPS, cybersecurity, machine learning | Edge cloud resource scheduling; deep reinforcement learning; multi-objective optimization; Markov decision process | Hybrid task Partitioning and Offloading, mobile computing, machine learning | IIoT; trusted measure; energy efficient | Industrial Internet of Things, flexible manufacturing system, physical unclonable functions, user authentication, security | Internet of Drones; physical unclonable functions; user authentication; key agreement; security | Internet of Things; cross-domain authentication; mutual identity authentication; key agreement; random oracle model | IoT-enabled healthcare, anonymous authentication, key agreement, physical unclonable functions, security | attribute-based signcryption, multi-authority, outsourced computation, constant-size ciphertext, access control. | authentication; threshold signature; authorization update; mobile edge computing | blockchain; Internet of Vehicles; security; authentication; key processing | ciphertext-policy attribute-based encryption, pairing-free, access control, Internet of Things | cloud computing; mobile edge computing; ensemble learning; resource scheduling | cloud computing; security threats; security attacks | cloud-assisted IIoT, symmetric searchable encryption, forward and backward privacy, state chain structure | dynamic networks, tasks offload, blockchains, mean-field game, fractional repetition code | industry recommendation systems, graph neural network, knowledge graph, attention mechanism | inter-domain routing, BGP security, Blockchain, trust model, trust mechanisms, trust evaluation | internet of vehicles; Intelligent Transportation System; authentication; key agreement; blockchain; security. | internet of vehicles; blockchain; security; authentication; key exchange; PUF | intrusion detection; IoT; fog computing; autoencoder; pseudo-siamese neural network | key exchange; authentication; authenticated encryption with associated data; wearable computing; security | many-objective optimization; intrusion detection; information entropy; in-vehicle network | marine vehicles, accuracy, location awareness, training, semantic segmentation, object recognition, decoding, infrared imaging, supervised learning, semisupervised learning, infrared ship images, object segmentation, weakly-supervised learning, semi-supervised learning, pixel-level pseudo-labels | mobile edge computing; task offloading; resource allocation; many-objective optimization | protocols, security, authentication, medical services, passwords, servers, Telemedicine, Internet of Things, hash functions, threat modeling, security, authenticated encryption, Ascon, secure communication | security, network slicing. data communication, computational efficiency, cryptography, heterogeneous networks, public key cryptography, performance evaluation, next generation networking, data mining, heterogeneous signcryption, generalized signcryption, random oracle model, network slicing | sensors, calibration, Internet of Things, servers, sensor systems, noise, data models, sensor phenomena and characterization, intelligent sensors, concept drift, sensor drift, variational autoencoder, soft calibration, latent distribution, Kullback-Leibler divergence | smart manufacturing; security; authentication; Internet of Things; resource-limited IoT devices; mutual authentication | software defined data center networks; network updates; DCTCP; out-of-order packets; packet drop; SDN | symmetric searchable encryption, conjunctive keyword search, forward and backward privacy, Cloud server | wearable devices, security, privacy, anonymous, authentication, key agreement, hash functions.
Number of items: 35.

BGP security; blockchain; prefix hijacking; trust model; secure routing

Yang, Qiong, Ma, Li, Tu, Shanshan, Ullah, Sami, Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544 and Alasmary, Hisham (2024) Towards blockchain-based secure BGP routing, challenges and future research directions. Computers, Materials and Continua, 79 (2). pp. 2035-2062. ISSN 1546-2218 (Print), 1546-2226 (Online) (doi:10.32604/cmc.2024.049970)

Blockchain, ITS, VNA, repairing, 5G, DAO, incentive

Arshad, Usama, Halim, Zahid, Alasmar, Hisham and Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544 (2024) Futuristic decentralized vehicular network architecture and repairing management system on blockchain. IEEE Internet of Things Journal, 11 (13). pp. 23604-23616. ISSN 2327-4662 (Online) (doi:10.1109/JIOT.2024.3386600)

Cloud Computing, Task Scheduling, Cloud Sim Simulator, Scheduling algorithms, Makespan Metric, Total Completion Time.

Sati, Omar Salem, Zhang, Jiangjiang, Tu, Shanshan and Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544 (2024) Performance evaluation of scheduling algorithms using CloudSim. In: NCIC 2024: The 2nd International Conference on Networks, Communications and Intelligent Computing, 22nd - 25th November, 2024, Beijing, China. (In Press)

DNS, DNS over HTTPS, cybersecurity, machine learning

Dawood, Muhammad, Tu, Shanshan, Xiao, Chuangbai, Haris, Muhammad, Alasmary, Hisham, Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544 and Rehman, Sadaqat Ur (2024) The impact of Domain Name Server (DNS) over Hypertext Transfer Protocol Secure (HTTPS) on cyber security: limitations, challenges, and detection techniques. Computers, Materials and Continua, 80 (3). pp. 4513-4542. ISSN 1546-2218 (Print), 1546-2226 (Online) (doi:10.32604/cmc.2024.050049)

Edge cloud resource scheduling; deep reinforcement learning; multi-objective optimization; Markov decision process

Zhang, Jiangjian, Ning, Zhenhu, Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544, Alasmary, Hisham, Tu, Shanshan and Chen, Sheng (2023) Hybrid edge-cloud collaborator resource scheduling approach based on deep reinforcement learning and multi-objective optimization. IEEE Transactions on Computer. ISSN 0018-9340 (Print), 1557-9956 (Online) (doi:10.1109/TC.2023.3326977)

Hybrid task Partitioning and Offloading, mobile computing, machine learning

Bano, Shehr, Abbas, Ghulam, Bilal, Muhammad, Abbas, Ziaul Haq, Ali, Zaiwar and Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544 (2024) PHyPO: Priority-based Hybrid task Partitioning and Offloading in mobile computing using automated machine learning. PLoS ONE, 19 (12):e0314198. ISSN 1932-6203 (Online) (doi:10.1371/journal.pone.0314198)

IIoT; trusted measure; energy efficient

Wang, Yilei, Sun, Xin, Zheng, Guiping, Rashid, Ahmar, Ullah, Sami, Alasmary, Hisham and Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544 (2024) Enhancing energy efficiency with a dynamic trust measurement scheme in power distribution network. Computers, Materials and Continua, 78 (3). pp. 3909-3927. ISSN 1546-2218 (Print), 1546-2226 (Online) (doi:10.32604/cmc.2024.047767)

Industrial Internet of Things, flexible manufacturing system, physical unclonable functions, user authentication, security

Hammad, Muhammad, Badshah, Akhtar, Almeer, Mohammed A., Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544, Song, Houbing, Chen, Sheng and Han, Zhu (2025) Lightweight and robust key agreement for securing IIoT-driven flexible manufacturing systems. IEEE Internet of Things. ISSN 2327-4662 (Online) (doi:10.1109/JIOT.2025.3535846)

Internet of Drones; physical unclonable functions; user authentication; key agreement; security

Badshah, Akhtar, Abbas, Ghulam, Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544, Tu, Shanshan, Abbas, Ziaul Haq, Muhammad, Fazal and Chen, Sheng (2024) USAF-IoD: Ultralightweight and Secure Authenticated key agreement Framework for Internet of Drones environment. IEEE Transactions on Vehicular Technology. ISSN 0018-9545 (Print), 1939-9359 (Online) (doi:10.1109/TVT.2024.3375758)

Internet of Things; cross-domain authentication; mutual identity authentication; key agreement; random oracle model

Gong, Bei, Guiping, Zheng and Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544 (2023) LCDMA: Lightweight Cross-domain Mutual Identity Authentication scheme for Internet of Things. IEEE Internet of Things Journal, 10 (14). pp. 12590-12602. ISSN 2327-4662 (Online) (doi:10.1109/JIOT.2023.3252051)

IoT-enabled healthcare, anonymous authentication, key agreement, physical unclonable functions, security

Ullah, Sana, Tu, Shanshan, Badshah, Akhtar and Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544 (2025) A robust anonymous authentication scheme for securing IoT-enabled healthcare services. In: 2024 8th Cyber Security in Networking Conference (CSNet). IEEE, pp. 1-6. ISBN 979-8331534110 ISSN 2768-0010 (Print), 2768-0029 (Online) (doi:10.1109/CSNet64211.2024.10851748)

attribute-based signcryption, multi-authority, outsourced computation, constant-size ciphertext, access control.

Gong, Bei, Guo, Chong, Guo, Chong, Guo, Chen, Sun, Yao, Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544 and Chen, Sheng (2023) SLIM: a Secure and Lightweight Multi-Authority Attribute-Based Signcryption Scheme for IoT. IEEE Transactions on Information Forensics and Security, 19. pp. 1299-1312. ISSN 1556-6013 (Print), 1556-6021 (Online) (doi:10.1109/TIFS.2023.3331566)

authentication; threshold signature; authorization update; mobile edge computing

Chen, Lei, Guo, Chong, Gong, Bei, Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544, Deng, Lihua and Qin, Haowen (2024) A secure cross-domain authentication scheme based on threshold signature for MEC. Journal of Cloud Computing, 13 (70). pp. 1-12. ISSN 2192-113X (Print), 2192-113X (Online) (doi:10.1186/s13677-024-00631-x)

blockchain; Internet of Vehicles; security; authentication; key processing

Tu, Shanshan, Haoyu, Yu, Badshah, Akhtar, Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544, Halim, Zahid and Ahmad, Iftekhar (2023) Secure Internet of Vehicles (IoV) with decentralized consensus blockchain mechanism. IEEE Transactions on Vehicular Technology, 72 (9). pp. 11227-11236. ISSN 0018-9545 (Print), 1939-9359 (Online) (doi:10.1109/TVT.2023.3268135)

ciphertext-policy attribute-based encryption, pairing-free, access control, Internet of Things

Guo, Chong, Gong, Bei, Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544, Alasmary, Hisham, Tu, Shanshan and Chen, Sheng (2024) An efficient pairing-free ciphertext-policy attribute-based encryption scheme for Internet of Things. Sensors, 24 (21):6843. ISSN 1424-8220 (Online) (doi:10.3390/s24216843)

cloud computing; mobile edge computing; ensemble learning; resource scheduling

Zhang, Jiangjiang, Ning, Zhenhu, Ali, Raja Hashim, Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544, Tu, Shanshan and Ahmad, Iftekhar (2023) A many-objective ensemble optimization algorithm for the edge cloud resource scheduling problem. IEEE Transactions on Mobile Computing. pp. 1-18. ISSN 1536-1233 (Print), 1558-0660 (Online) (doi:10.1109/TMC.2023.3235064)

cloud computing; security threats; security attacks

Muhammad, Dawood, Tu, Shanshan, Xiao, Chuangbai, Alasmary, Hisham, Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544 and Rehman, Sadaqat (2023) Cyberattacks and security of cloud computing: a complete guideline. Symmetry, 15 (11):1981. pp. 1-33. ISSN 2073-8994 (Online) (doi:10.3390/sym15111981)

cloud-assisted IIoT, symmetric searchable encryption, forward and backward privacy, state chain structure

Peng, Tianqi, Gong, Bei, Tu, Shanshan, Namoun, Abdallah, Alshmrany, Sami, Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544, Alasmary, Hisham and Chen, Sheng (2024) Forward and backward private searchable encryption for cloud-assisted industrial IoT. Sensors, 24 (23):7597. ISSN 1424-8220 (Online) (doi:10.3390/s24237597)

dynamic networks, tasks offload, blockchains, mean-field game, fractional repetition code

Bai, Fenhua, Shen, Tao, Yu, Zhuo, Song, Jian, Gong, Bei, Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544 and Alasmary, Hisham (2024) Blockchain-enhanced time-variant mean field-optimized dynamic computation sharing in mobile network. IEEE Transactions on Wireless Communications, 23 (9). pp. 12140-12156. ISSN 1536-1276 (Print), 1558-2248 (Online) (doi:10.1109/TWC.2024.3388411)

industry recommendation systems, graph neural network, knowledge graph, attention mechanism

Elahi, Ehsan, Anwar, Sajid, Al-kfairy, Mousa, Rodrigues, Joel J.P.C., Ngueilbaye, Alladoumbaye, Halim, Zahid and Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544 (2024) Graph attention-based neural collaborative filtering for item-specific recommendation system using knowledge graph. Expert Systems with Applications, 266:126133. ISSN 0957-4174 (Print), 1873-6793 (Online) (doi:10.1016/j.eswa.2024.126133)

inter-domain routing, BGP security, Blockchain, trust model, trust mechanisms, trust evaluation

Yang, Qiong, Ma, Li, Ullah, Sami, Tu, Shanshan, Alasmary, Hisham and Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544 (2025) Blockchain-based trust model for inter-domain routing. Computers, Materials and Continua. ISSN 1546-2218 (Print), 1546-2226 (Online) (doi:10.32604/cmc.2025.059497)

internet of vehicles; Intelligent Transportation System; authentication; key agreement; blockchain; security.

Badshah, Akhtar, Abbas, Ghulam, Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544, Muhammad, Fazal, Abbas, Ziaul Haq, Bilal, Muhammad and Song, Houbing (2024) Blockchain-assisted lightweight authenticated key agreement security framework for smart vehicles-enabled Intelligent Transportation System. IEEE Transactions on Automation Science and Engineering. ISSN 1545-5955 (Print), 1558-3783 (Online) (doi:10.1109/TASE.2024.3381068)

internet of vehicles; blockchain; security; authentication; key exchange; PUF

Badshah, Akhtar, Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544, Muhammad, Fazal, Abbas, Ghulam, Abbas, Ziaul Haq, Chaudhry, Shehzad Ashraf and Chen, Sheng (2022) AAKE-BIVT: Anonymous Authenticated Key Exchange scheme for Blockchain-Enabled Internet of Vehicles in smart Transportation. IEEE Transactions on Intelligent Transportation Systems, 24 (2). pp. 1739-1755. ISSN 1524-9050 (Print), 1558-0016 (Online) (doi:10.1109/TITS.2022.3220624)

intrusion detection; IoT; fog computing; autoencoder; pseudo-siamese neural network

Tu, Shanshan, Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544, Badshah, Akhtar, Yin, Mingxi and Abbas, Ghulam (2023) Network Intrusion Detection System (NIDS) based on Pseudo-Siamese Stacked Autoencoders in fog computing. IEEE Transactions on Service Computing, 16 (6). pp. 4317-4327. ISSN 1939-1374 (Online) (doi:10.1109/TSC.2023.3319953)

key exchange; authentication; authenticated encryption with associated data; wearable computing; security

Tu, Shanshan, Badshah, Akhtar, Alasmary, Hisham and Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544 (2023) EAKE-WC: Efficient and Anonymous Authenticated Key Exchange scheme for wearable computing. IEEE Transactions on Mobile Computing. ISSN 1536-1233 (Print), 1558-0660 (Online) (doi:10.1109/TMC.2023.3297854)

many-objective optimization; intrusion detection; information entropy; in-vehicle network

Zhang, Jiangjiang, Gong, Bei, Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544, Tu, Shanshan and Chen, Sheng (2023) Many-objective optimization-based intrusion detection for in-vehicle network security. IEEE Transactions on Intelligent Transportation Systems. pp. 1-15. ISSN 1524-9050 (Print), 1558-0016 (Online) (doi:10.1109/TITS.2023.3296002)

marine vehicles, accuracy, location awareness, training, semantic segmentation, object recognition, decoding, infrared imaging, supervised learning, semisupervised learning, infrared ship images, object segmentation, weakly-supervised learning, semi-supervised learning, pixel-level pseudo-labels

Ibrahim Ali, Isa, Namoun, Abdallah, Ullah, Sami, Alasmary, Hisham, Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544 and Ahmad, Iftekhar (2024) Infrared ship segmentation based on weakly-supervised and semi-supervised learning. IEEE Access, 12. pp. 117908-117920. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2024.3448301)

mobile edge computing; task offloading; resource allocation; many-objective optimization

Zhang, Jiangjiang, Gong, Bei, Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544, Tu, Shanshan and Han, Zhu (2023) A hybrid many-objective optimization algorithm for task offloading and resource allocation in multi-server mobile edge computing networks. IEEE Transactions on Services Computing, 16 (5). pp. 3101-3114. ISSN 1939-1374 (Online) (doi:10.1109/TSC.2023.3268990)

protocols, security, authentication, medical services, passwords, servers, Telemedicine, Internet of Things, hash functions, threat modeling, security, authenticated encryption, Ascon, secure communication

Zeng, Dake, Badshah, Akhtar, Tu, Shanshan, Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544 and Han, Zhu (2025) A security-enhanced ultra-lightweight and anonymous user authentication protocol for Telehealthcare Information Systems. IEEE Transactions on Mobile Computing (TMC). ISSN 1536-1233 (Print), 1558-0660 (Online) (doi:10.1109/TMC.2025.3526519)

security, network slicing. data communication, computational efficiency, cryptography, heterogeneous networks, public key cryptography, performance evaluation, next generation networking, data mining, heterogeneous signcryption, generalized signcryption, random oracle model, network slicing

Gong, Bei, Wu, Yong, Zhang, Jiangjiang, Tu, Shanshan, Alasmary, Hisham and Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544 (2025) Multi-heterogeneous signcryption scheme for next generation slicing networking. IEEE Transactions on Network Science and Engineering. ISSN 2327-4697 (Online) (doi:10.1109/TNSE.2025.3571867)

sensors, calibration, Internet of Things, servers, sensor systems, noise, data models, sensor phenomena and characterization, intelligent sensors, concept drift, sensor drift, variational autoencoder, soft calibration, latent distribution, Kullback-Leibler divergence

Hossain, Kamal, Ahmad, Iftekhar, Habibi, Dayoush and Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544 (2024) Enhancing IoT sensors precision through sensor drift calibration with variational autoencoder. IEEE Internet of Things Journal. ISSN 2327-4662 (Online) (doi:10.1109/JIOT.2024.3503616)

smart manufacturing; security; authentication; Internet of Things; resource-limited IoT devices; mutual authentication

Hammad, Muhammad, Badshah, Akhtar, Abbas, Ghulam, Alasmary, Hisham, Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544 and Khan, Waseem Ahmed (2023) A provable secure and efficient authentication framework for smart manufacturing industry. IEEE Access, 11. pp. 67626-6763. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2023.3290913)

software defined data center networks; network updates; DCTCP; out-of-order packets; packet drop; SDN

Basit Dogar, Abdul, Ullah, Sami, Zhang, Yiran, Alasmary, Hisham, Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544 and Chen, Sheng (2024) Resilient TCP variant enabling smooth network updates for software-defined data center networks. Tsinghua Science and Technology, 29 (5). pp. 1615-1632. ISSN 1007-0214 (Online) (doi:10.26599/TST.2024.9010010)

symmetric searchable encryption, conjunctive keyword search, forward and backward privacy, Cloud server

Peng, Tianqi, Gong, Bei, Guo, Chong, Badshah, Akhtar, Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544, Alasmary, Hisham and Chen, Sheng (2025) An efficient conjunctive keyword searchable encryption for cloud-based IoT systems. Digital Communications and Networks. ISSN 2352-8648 (Online) (doi:10.1016/j.dcan.2025.03.002)

wearable devices, security, privacy, anonymous, authentication, key agreement, hash functions.

Ai, Xin, Badshah, Akhtar, Tu, Shanshan, Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544 and Ahmad, Iftekhar (2025) An improved ultra-lightweight anonymous authenticated key agreement protocol for wearable devices. IEEE Transactions on Mobile Computing (TMC). ISSN 1536-1233 (Print), 1558-0660 (Online) (doi:10.1109/TMC.2025.3526076)

This list was generated on Tue Jun 17 01:18:16 2025 UTC.