Mazhar Ali

Orcid: 0000-0003-1098-5715

According to our database1, Mazhar Ali authored at least 46 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Real-Time Cyber-Physical HIL Testbed for Cybersecurity in Distribution Grids with DERs.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2024

2023
Partial transpose moments, principal minors and entanglement detection.
Quantum Inf. Process., May, 2023

Deep reinforcement learning approach towards a smart parking architecture.
Clust. Comput., February, 2023

2022
SELWAK: A Secure and Efficient Lightweight and Anonymous Authentication and Key Establishment Scheme for IoT Based Vehicular Ad hoc Networks.
Sensors, 2022

A multi-attack resilient lightweight IoT authentication scheme.
Trans. Emerg. Telecommun. Technol., 2022

2021
SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud.
IEEE Trans. Cloud Comput., 2021

Genuinely entangling uncorrelated atoms via Jaynes-Cummings interactions.
Quantum Inf. Process., 2021

A survey on privacy and access control schemes in fog computing.
Int. J. Commun. Syst., 2021

Secure Hash Algorithms and the Corresponding FPGA Optimization Techniques.
ACM Comput. Surv., 2021

Voltage Feasibility Boundaries for Power System Security Assessment.
CoRR, 2021

A Survey on Privacy-Preserving Authentication Schemes in VANETs: Attacks, Challenges and Open Issues.
IEEE Access, 2021

Malware Detection in Android via Neural Network using Entropy Features.
Proceedings of the International Conference on Frontiers of Information Technology, 2021

Malware Detection and Classification along with Trade-off Analysis for Number of Features, Feature Types, and Speed.
Proceedings of the International Conference on Frontiers of Information Technology, 2021

2020
A scalable model for real-time venue recommendations using MapReduce.
Concurr. Comput. Pract. Exp., 2020

Requirement Validation for Embedded Systems in Automotive Industry Through Modeling.
IEEE Access, 2020

AdaDiffGrad: An Adaptive Batch Size Implementation Technique for DiffGrad Optimization Method.
Proceedings of the 14th International Conference on Innovations in Information Technology, 2020

2019
A fog-based security framework for intelligent traffic light control system.
Multim. Tools Appl., 2019

A load balanced task scheduling heuristic for large-scale computing systems.
Comput. Syst. Sci. Eng., 2019

Secure-CamFlow: A device-oriented security model to assist information flow control systems in cloud environments for IoTs.
Concurr. Comput. Pract. Exp., 2019

Towards a Fog Enabled Efficient Car Parking Architecture.
IEEE Access, 2019

Optimal Energy Management for Off-Grid Hybrid System using Hybrid Optimization Technique.
Proceedings of the 2019 IEEE PES Innovative Smart Grid Technologies Europe, 2019

2018
Segregating Spammers and Unsolicited Bloggers from Genuine Experts on Twitter.
IEEE Trans. Dependable Secur. Comput., 2018

DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security.
IEEE Trans. Cloud Comput., 2018

On the Correlation of Sensor Location and Human Activity Recognition in Body Area Networks (BANs).
IEEE Syst. J., 2018

Mitigation and Improving SHA-1 Standard Using Collision Detection Approach.
Proceedings of the 2018 International Conference on Frontiers of Information Technology, 2018

Techno-Economic Study of Electricity Generation from Wind at Kallar-Kahar Region in Pakistan.
Proceedings of the 2018 International Conference on Frontiers of Information Technology, 2018

Convolutional Neural Networks as Means to Identify Apposite Sensor Combination for Human Activity Recognition.
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018

2017
DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party.
IEEE Trans. Cloud Comput., 2017

SeDaSC: Secure Data Sharing in Clouds.
IEEE Syst. J., 2017

A comparative study and workload distribution model for re-encryption schemes in a mobile cloud computing environment.
Int. J. Commun. Syst., 2017

2016
Personalized healthcare cloud services for disease risk assessment and wellness management using social media.
Pervasive Mob. Comput., 2016

Security and Dependability of Cloud-Assisted Internet of Things.
IEEE Cloud Comput., 2016

Boosting the Accuracy of AdaBoost for Object Detection and Recognition.
Proceedings of the International Conference on Frontiers of Information Technology, 2016

2015
Security in cloud computing: Opportunities and challenges.
Inf. Sci., 2015

A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach.
J. Grid Comput., 2015

Merging of DHT-based logical networks in MANETs.
Trans. Emerg. Telecommun. Technol., 2015

3D-RP: A DHT-Based Routing Protocol for MANETs.
Comput. J., 2015

A Cloud Based Framework for Identification of Influential Health Experts from Twitter.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

2014
Pirax: framework for application piracy control in mobile cloud environment.
J. Supercomput., 2014

Incremental proxy re-encryption scheme for mobile cloud computing environment.
J. Supercomput., 2014

BSS: block-based sharing scheme for secure data storage services in mobile cloud environment.
J. Supercomput., 2014

Evolution of Genuine Multipartite Entanglement of Specific and Random States Under non-Markovian Noise.
Open Syst. Inf. Dyn., 2014

A taxonomy and survey on Green Data Center Networks.
Future Gener. Comput. Syst., 2014

A survey on energy-efficient methodologies and architectures of network-on-chip.
Comput. Electr. Eng., 2014

2013
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing.
J. Supercomput., 2013

2007
The Jamiołkowski Isomorphism and a Simplified Proof for the Correspondence Between Vectors Having Schmidt Number k and k-Positive Maps.
Open Syst. Inf. Dyn., 2007


  Loading...