Adeel Anjum

Orcid: 0000-0001-5083-0019

Affiliations:
  • Southern University of Science and Technology, Shenzhen, China
  • University of Nantes, France (PhD 2013)


According to our database1, Adeel Anjum authored at least 84 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A robust Internet of Drones security surveillance communication network based on IOTA.
Internet Things, April, 2024

A secure and privacy preserved infrastructure for VANETs based on federated learning with local differential privacy.
Inf. Sci., January, 2024

Optimizing Industrial IoT Data Security Through Blockchain-Enabled Incentive-Driven Game Theoretic Approach for Data Sharing.
IEEE Access, 2024

Exploring Deep Federated Learning for the Internet of Things: A GDPR-Compliant Architecture.
IEEE Access, 2024

2023
Cohort-based kernel principal component analysis with Multi-path Service Routing in Federated Learning.
Future Gener. Comput. Syst., December, 2023

Correction: Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger.
Clust. Comput., December, 2023

Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger.
Clust. Comput., December, 2023

Fuzz-classification (<i>p</i>, <i>l</i>)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches.
Digit. Commun. Networks, October, 2023

ShareChain: Blockchain-enabled model for sharing patient data using federated learning and differential privacy.
Expert Syst. J. Knowl. Eng., June, 2023

Instant_Anonymity: A Lightweight Semantic Privacy Guarantee for 5G-Enabled IIoT.
IEEE Trans. Ind. Informatics, 2023

Improved angelization technique against background knowledge attack for 1:M microdata.
PeerJ Comput. Sci., 2023

Preserving Privacy in Internet of Vehicles (IoV): A Novel Group-Leader-Based Shadowing Scheme Using Blockchain.
IEEE Internet Things J., 2023

2022
Formal verification and complexity analysis of confidentiality aware textual clinical documents framework.
Int. J. Intell. Syst., December, 2022

A Deep Learning-Based Privacy-Preserving Model for Smart Healthcare in Internet of Medical Things Using Fog Computing.
Wirel. Pers. Commun., 2022

<i>Deep-Confidentiality</i>: An IoT-Enabled Privacy-Preserving Framework for Unstructured Big Biomedical Data.
ACM Trans. Internet Techn., 2022

A Novel Privacy Paradigm for Improving Serial Data Privacy.
Sensors, 2022

A strong construction of S-box using Mandelbrot set an image encryption scheme.
PeerJ Comput. Sci., 2022

Thermal image encryption based on laser diode feedback and 2D logistic chaotic map.
Multim. Tools Appl., 2022

Data usage-based privacy and security issues in mobile app recommendation (MAR): a systematic literature review.
Libr. Hi Tech, 2022

iTrace: When IOTA Meets COVID-19 Contact Tracing.
IT Prof., 2022

Fuzzy-Logic-Based Privacy-Aware Dynamic Release of IoT-Enabled Healthcare Data.
IEEE Internet Things J., 2022

A Survey on Big IoT Data Indexing: Potential Solutions, Recent Advancements, and Open Issues.
Future Internet, 2022

(τ, m)-slicedBucket privacy model for sequential anonymization for improving privacy and utility.
Trans. Emerg. Telecommun. Technol., 2022

Towards enhanced threat modelling and analysis using a Markov Decision Process.
Comput. Commun., 2022

An efficient framework for semantically-correlated term detection and sanitization in clinical documents.
Comput. Electr. Eng., 2022

A Secure and Privacy Preserved Parking Recommender System Using Elliptic Curve Cryptography and Local Differential Privacy.
IEEE Access, 2022

2021
An Accurate Deep Learning Model for Clinical Entity Recognition From Clinical Notes.
IEEE J. Biomed. Health Informatics, 2021

A Game-based Thermal-Aware Resource Allocation Strategy for Data Centers.
IEEE Trans. Cloud Comput., 2021

MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus.
Sensors, 2021

F-Classify: Fuzzy Rule Based Classification Method for Privacy Preservation of Multiple Sensitive Attributes.
Sensors, 2021

VisTAS: blockchain-based visible and trusted remote authentication system.
PeerJ Comput. Sci., 2021

A semantic rule based digital fraud detection.
PeerJ Comput. Sci., 2021

Privacy-preserving data collection for 1: M dataset.
Multim. Tools Appl., 2021

A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS).
J. Netw. Comput. Appl., 2021

Improved Generalization for Secure Personal Data Publishing Using Deviation.
IT Prof., 2021

A formal adversarial perspective: Secure and efficient electronic health records collection scheme for multi-records datasets.
Trans. Emerg. Telecommun. Technol., 2021

Privacy preservation of electronic health records with adversarial attacks identification in hybrid cloud.
Comput. Stand. Interfaces, 2021

A robust privacy preserving approach for electronic health records using multiple dataset with multiple sensitive attributes.
Comput. Secur., 2021

Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities.
Clust. Comput., 2021

Fog-enabled secure multiparty computation based aggregation scheme in smart grid.
Comput. Electr. Eng., 2021

ABKS-PBM: Attribute-Based Keyword Search With Partial Bilinear Map.
IEEE Access, 2021

Dynamic Parameters-Based Reversible Data Transform (RDT) Algorithm in Recommendation System.
IEEE Access, 2021

Differentiation of bacterial and viral pneumonia in children under five using deep learning.
Proceedings of the UCC '21: 2021 IEEE/ACM 14th International Conference on Utility and Cloud Computing, Leicester, United Kingdom, December 6 - 9, 2021, 2021

SAID: ECC-Based Secure Authentication and Incentive Distribution Mechanism for Blockchain-Enabled Data Sharing System.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

2020
Privacy Preserving for Multiple Sensitive Attributes against Fingerprint Correlation Attack Satisfying c-Diversity.
Wirel. Commun. Mob. Comput., 2020

An improved surveillance video forgery detection technique using sensor pattern noise and correlation of noise residues.
Multim. Tools Appl., 2020

S-box design based on optimize LFT parameter selection: a practical approach in recommendation system domain.
Multim. Tools Appl., 2020

OBAC: towards agent-based identification and classification of roles, objects, permissions (ROP) in distributed environment.
Multim. Tools Appl., 2020

Cyber Physical Systems and IoT: Architectural Practices, Interoperability, and Transformation.
IT Prof., 2020

A Secure Provenance Scheme for Detecting Consecutive Colluding Users in Distributed Networks.
Int. J. Parallel Program., 2020

MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus.
CoRR, 2020

N-Sanitization: A semantic privacy-preserving framework for unstructured medical datasets.
Comput. Commun., 2020

Application of formal methods to modelling and analysis aspects of business process reengineering.
Bus. Process. Manag. J., 2020

2019
Autonomic workload performance tuning in large-scale data repositories.
Knowl. Inf. Syst., 2019

Data hiding technique in steganography for information security using number theory.
J. Inf. Sci., 2019

Privacy-preserving model and generalization correlation attacks for 1: M data with multiple sensitive attributes.
Inf. Sci., 2019

Thermal-aware resource allocation in earliest deadline first using fluid scheduling.
Int. J. Distributed Sens. Networks, 2019

Privacy-aware relationship semantics-based XACML access control model for electronic health records in hybrid cloud.
Int. J. Distributed Sens. Networks, 2019

Convergence time analysis of OSPF routing protocol using social network metrics.
Future Gener. Comput. Syst., 2019

An efficient privacy preserving protocol for dynamic continuous data collection.
Comput. Secur., 2019

XM-tree: data driven computational model by using metric extended nodes with non-overlapping in high-dimensional metric spaces.
Comput. Math. Organ. Theory, 2019

Anonymous and formally verified dual signature based online e-voting protocol.
Clust. Comput., 2019

On the Feature Selection Methods and Reject Option Classifiers for Robust Cancer Prediction.
IEEE Access, 2019

2018
An efficient approach for publishing microdata for multiple sensitive attributes.
J. Supercomput., 2018

Simulator for modeling, analysis, and visualizations of thermal status in data centers.
Sustain. Comput. Informatics Syst., 2018

Power-efficient scheduling of parallel real-time tasks on performance asymmetric multicore processors.
Sustain. Comput. Informatics Syst., 2018

Indexing through separable partitioning for complex data sharing in P2P systems.
J. Intell. Fuzzy Syst., 2018

Performance prediction and adaptation for database management system workload using Case-Based Reasoning approach.
Inf. Syst., 2018

Secure provenance using an authenticated data structure approach.
Comput. Secur., 2018

An efficient privacy mechanism for electronic health records.
Comput. Secur., 2018

Improved Generalization for Secure Data Publishing.
IEEE Access, 2018

Calculating Completeness of Agile Scope in Scaled Agile Development.
IEEE Access, 2018

A Parallel Implementation of GHB Tree.
Proceedings of the Computational Intelligence and Its Applications, 2018

2017
Formal modeling and verification of security controls for multimedia systems in the cloud.
Multim. Tools Appl., 2017

Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes.
J. Netw. Comput. Appl., 2017

BangA: An Efficient and Flexible Generalization-Based Algorithm for Privacy Preserving Data Publication.
Comput., 2017

A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends.
Comput. Secur., 2017

τ-safety: A privacy model for sequential publication with arbitrary updates.
Comput. Secur., 2017

Identifying Deviations in Software Processes.
IEEE Access, 2017

Decision Support System for Risk Assessment and Management Strategies in Distributed Software Development.
IEEE Access, 2017

2016
m-Skin Doctor: A Mobile Enabled System for Early Melanoma Skin Cancer Detection Using Support Vector Machine.
Proceedings of the eHealth 360°, 2016

2014
Differentially Private K-Anonymity.
Proceedings of the 12th International Conference on Frontiers of Information Technology, 2014

2013
Towards Privacy-Preserving Publication of Continuous and Dynamic Data Spatial Indexing and Bucketization Approaches. (Publication de données qui préserve la vie privée pour des données continues et dynamiques: Les approches d'indexation spatiales et de bucketization).
PhD thesis, 2013

Anonymizing sequential releases under arbitrary updates.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013


  Loading...