フォロー
Muhammad Khurram Khan
Muhammad Khurram Khan
[King Saud University, Saudi Arabia] [Founder/CEO, Global Foundation for Cyber Studies and Research]
確認したメール アドレス: ksu.edu.sa - ホームページ
タイトル
引用先
引用先
Medical image analysis using convolutional neural networks: a review
SM Anwar, M Majid, A Qayyum, M Awais, M Alnowami, MK Khan
Journal of medical systems 42 (11), 1-13, 2018
6472018
A survey on privacy protection in blockchain system
Q Feng, D He, S Zeadally, MK Khan, N Kumar
Journal of Network and Computer Applications 126, 45-58, 2019
5392019
Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’
MK Khan, K Alghathbar
Sensors 10 (3), 2450-2459, 2010
499*2010
Diagnosing COVID-19 pneumonia from X-ray and CT images using deep learning and transfer learning algorithms
HS Maghdid, AT Asaad, KZ Ghafoor, AS Sadiq, S Mirjalili, MK Khan
Multimodal image exploitation and learning 2021 11734, 99-110, 2021
3632021
An enhanced smart card based remote user password authentication scheme
X Li, J Niu, MK Khan, J Liao
Journal of Network and Computer Applications 36 (5), 1365-1371, 2013
2832013
Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’
MK Khan, SK Kim, K Alghathbar
Computer Communications 34 (3), 305-309, 2011
2802011
Performance evaluation of score level fusion in multimodal biometric systems
M He, SJ Horng, P Fan, RS Run, RJ Chen, JL Lai, MK Khan, KO Sentosa
Pattern Recognition 43 (5), 1789-1800, 2010
2762010
b-SPECS+: Batch verification for secure pseudonymous authentication in VANET
SJ Horng, SF Tzeng, Y Pan, P Fan, X Wang, T Li, MK Khan
IEEE transactions on information forensics and security 8 (11), 1860-1875, 2013
2512013
Secure surveillance framework for IoT systems using probabilistic image encryption
K Muhammad, R Hamza, J Ahmad, J Lloret, H Wang, SW Baik
IEEE Transactions on Industrial Informatics 14 (8), 3679-3689, 2018
2412018
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
R Amin, SKH Islam, GP Biswas, MK Khan, L Leng, N Kumar
Computer Networks 101, 42-62, 2016
2372016
Improving the security of ‘a flexible biometrics remote user authentication scheme’
MK Khan, J Zhang
Computer Standards & Interfaces 29 (1), 82-85, 2007
2372007
A robust and anonymous patient monitoring system using wireless medical sensor networks
R Amin, SKH Islam, GP Biswas, MK Khan, N Kumar
Future Generation Computer Systems 80, 483-495, 2018
2332018
Millimeter-wave wireless communications for IoT-cloud supported autonomous vehicles: Overview, design, and challenges
L Kong, MK Khan, F Wu, G Chen, P Zeng
IEEE Communications Magazine 55 (1), 62-68, 2017
2292017
Dynamic remote data auditing for securing big data storage in cloud computing
M Sookhak, MK Khan
University of Malaya, 2015
2232015
On cloud security attacks: A taxonomy and intrusion detection and prevention as a service
S Iqbal, MLM Kiah, B Dhaghighi, M Hussain, S Khan, MK Khan, ...
Journal of Network and Computer Applications 74, 98-120, 2016
2222016
An effective memetic differential evolution algorithm based on chaotic local search
D Jia, G Zheng, MK Khan
Information Sciences 181 (15), 3175-3187, 2011
2142011
Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition
L Leng, J Zhang, J Xu, MK Khan, K Alghathbar
2010 international conference on information and communication technology …, 2010
2102010
Securing software defined networks: taxonomy, requirements, and open issues
A Akhunzada, E Ahmed, A Gani, MK Khan, M Imran, S Guizani
IEEE Communications Magazine 53 (4), 36-44, 2015
2082015
Enhancing security and privacy for identity-based batch verification scheme in VANETs
SF Tzeng, SJ Horng, T Li, X Wang, PH Huang, MK Khan
IEEE Transactions on Vehicular Technology 66 (4), 3235-3248, 2015
2032015
Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
MK Khan, J Zhang, X Wang
Chaos, Solitons & Fractals 35 (3), 519-524, 2008
2002008
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20