Fawad Khan

Orcid: 0000-0001-6609-5928

According to our database1, Fawad Khan authored at least 28 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
HLSBD2: a quantum secure hybrid level source based data deduplication for the cloud.
J. Ambient Intell. Humaniz. Comput., January, 2024

Privacy Preserving Inference for Deep Neural Networks: Optimizing Homomorphic Encryption for Efficient and Secure Classification.
IEEE Access, 2024

2023
Symmetries of the Energy-Momentum Tensor for Static Plane Symmetric Spacetimes.
Symmetry, August, 2023

A homomorphic approach for security and privacy preservation of Smart Airports.
Future Gener. Comput. Syst., April, 2023

A Novel Image-Based Homomorphic Approach for Preserving the Privacy of Autonomous Vehicles Connected to the Cloud.
IEEE Trans. Intell. Transp. Syst., February, 2023

Tool Health Classification in Metallic Milling Process Using Acoustic Emission and Long Short-Term Memory Networks: A Deep Learning Approach.
IEEE Access, 2023

2022
Recent Advances in Sensors for Fire Detection.
Sensors, 2022

A Novel Homomorphic Approach for Preserving Privacy of Patient Data in Telemedicine.
Sensors, 2022

ENCVIDC: an innovative approach for encoded video content classification.
Neural Comput. Appl., 2022

A novel searchable encryption scheme to reduce the access pattern leakage.
Future Gener. Comput. Syst., 2022

FBASHI: Fuzzy and Blockchain-Based Adaptive Security for Healthcare IoTs.
IEEE Access, 2022

2021
Granular Data Access Control with a Patient-Centric Policy Update for Healthcare.
Sensors, 2021

A new secure authentication based distance bounding protocol.
PeerJ Comput. Sci., 2021

Privacy-preserving COVID-19 contact tracing using blockchain.
J. Commun. Networks, 2021

Efficient attribute-based encryption with repeated attributes optimization.
Int. J. Inf. Sec., 2021

Determining Spatiotemporal Distribution of Macronutrients in a Cornfield Using Remote Sensing and a Deep Learning Model.
IEEE Access, 2021

Encryption and Re-Randomization Techniques for Malware Propagation.
IEEE Access, 2021

2020
Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution.
IEEE Access, 2020

Trusted Network Slicing among Multiple Mobile Network Operators.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
Digital Competence Assessment Across Generations: A Finnish Sample Using the Digcomp Framework.
Int. J. Digit. Lit. Digit. Competence, 2019

Security Safety and Trust Management (SSTM' 19).
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

2017
Efficient privacy-preserving decentralized ABE supporting expressive access structures.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Privacy-Preserving Attribute-Based Encryption Supporting Expressive Access Structures.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

An Expressive Hidden Access Policy CP-ABE.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
Owner Specified Excessive Access Control for Attribute Based Encryption.
IEEE Access, 2016

2014
A new method based on Haar wavelet for the numerical solution of two-dimensional nonlinear integral equations.
J. Comput. Appl. Math., 2014

Location Identity Based Content Security Scheme for Content Centric Networking.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Content Security Scheme for Content Centric Networks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014


  Loading...