Mohsin Khan

Orcid: 0000-0003-1815-8642

According to our database1, Mohsin Khan authored at least 26 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Online learning: predicting student engagement and continued intention.
Int. J. Learn. Technol., 2023

A Multi-pronged Self-adaptive Controller for Analyzing Misconfigurations for Kubernetes Clusters and IoT Edge Devices.
Proceedings of the Service-Oriented and Cloud Computing, 2023

2022
Structural and Statistical Analysis of Multidimensional Linear Approximations of Random Functions and Permutations.
IEEE Trans. Inf. Theory, 2022

Co-clustering based classification of multi-view data.
Appl. Intell., 2022

2021
Traffic Congestion Reduction and Accident Circumvention System via Incorporation of CAV and VANET.
Int. J. Ambient Comput. Intell., 2021

AKMA: Delegated Authentication System of 5G.
IEEE Commun. Stand. Mag., 2021

Real, Forged or Deep Fake? Enabling the Ground Truth on the Internet.
IEEE Access, 2021

2019
Linear Approximations of Random Functions and Permutations.
IACR Cryptol. ePrint Arch., 2019

A novel approach for fuzzy clustering based on neutrosophic association matrix.
Comput. Ind. Eng., 2019

Privacy Preserving AKMA in 5G.
Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, 2019

2018
Systematic Review of Decision Making Algorithms in Extended Neutrosophic Sets.
Symmetry, 2018

Segmentation of dental X-ray images in medical imaging using neutrosophic orthogonal matrices.
Expert Syst. Appl., 2018

Analyzing Self-Driving Cars on Twitter.
CoRR, 2018

Defeating the Downgrade Attack on Identity Privacy in 5G.
Proceedings of the Security Standardisation Research - 4th International Conference, 2018

On Security Analysis of Generic Dynamic Authenticated Group Key Exchange.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

2017
Privacy Enhanced Fast Mutual Authentication in 5G Network Using Identity Based Encryption.
J. ICT Stand., 2017

Enhanced Handover Mechanism in Long Term Evolution (LTE) Networks.
Int. J. Commun. Networks Inf. Secur., 2017

Concealing IMSI in 5G Network Using Identity Based Encryption.
Proceedings of the Network and System Security - 11th International Conference, 2017

On De-synchronization of User Pseudonyms in Mobile Networks.
Proceedings of the Information Systems Security - 13th International Conference, 2017

AES and SNOW 3G are Feasible Choices for a 5G Phone from Energy Perspective.
Proceedings of the 5G for Future Wireless Networks - First International Conference, 2017

2014
Three dimensional channel aware scheduling in relay-assisted multi-cell LTE-A downlink.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

2012
Web based teleoperation architecture and H.264 video encoder.
Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering, 2012

2008
MaXlab: A Novel Application for the Cross Comparison and Integration of Biological Signatures from Microarray Studies.
Silico Biol., 2008

2007
CIDA: An integrated software for the design, characterisation and global comparison of microarrays.
J. Integr. Bioinform., 2007

2006
Analysing Microarray Data using the Multi-functional Immune Ontologiser.
J. Integr. Bioinform., 2006

Application of Bioinformatics in the Design of Gene Expression Microarrays.
Proceedings of the Leveraging Applications of Formal Methods, 2006


  Loading...