Muhammad Asif Habib

Orcid: 0000-0002-2675-1975

Affiliations:
  • National Textile University, Faisalabad, Pakistan
  • Johannes Kepler University, Linz, Austria (PhD 2011)


According to our database1, Muhammad Asif Habib authored at least 41 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
ARLexic game: an augmented reality-based serious game for training of dyslexic and dysgraphic children.
Virtual Real., December, 2023

Task offloading in mmWave based 5G vehicular cloud computing.
J. Ambient Intell. Humaniz. Comput., 2023

2022
Radio Network Forensic with mmWave Using the Dominant Path Algorithm.
Secur. Commun. Networks, 2022

Performing in-situ analytics: Mining frequent patterns from big IoT data at network edge with D-HARPP.
Eng. Appl. Artif. Intell., 2022

Cyber Automated Network Resilience Defensive Approach against Malware Images.
Proceedings of the International Conference on Frontiers of Information Technology, 2022

Development of a Machine Learning Model for Prediction of Colour Trends in Fashion Industry.
Proceedings of the International Conference on Frontiers of Information Technology, 2022

Emotional States Detection Model from Handwriting by using Machine Learning.
Proceedings of the International Conference on Frontiers of Information Technology, 2022

Development of an Embedded Device for Stroke Prediction via Artificial Intelligence-Based Algorithms.
Proceedings of the International Conference on Frontiers of Information Technology, 2022

2021
Hybrid approach for big data localization and semantic annotation.
Concurr. Comput. Pract. Exp., 2021

ARFC: Advance response function of TCP CUBIC for IoT-based applications using big data.
Concurr. Comput. Pract. Exp., 2021

Role of Design Attributes to Determine the Intention to Use Online Learning via Cognitive Beliefs.
IEEE Access, 2021

Detecting White Cotton Bolls Using High-Resolution Aerial Imagery Acquired Through Unmanned Aerial System.
IEEE Access, 2021

2020
MDCBIR-MF: multimedia data for content-based image retrieval by using multiple features.
Multim. Tools Appl., 2020

A Secure Provenance Scheme for Detecting Consecutive Colluding Users in Distributed Networks.
Int. J. Parallel Program., 2020

Loss Based Congestion Control Module for Health Centers Deployed by Using Advanced IoT Based SDN Communication Networks.
Int. J. Parallel Program., 2020

D-GENE: Deferring the GENEration of Power Sets for Discovering Frequent Itemsets in Sparse Big Data.
IEEE Access, 2020

Deep Convolution Neural Network for Big Data Medical Image Classification.
IEEE Access, 2020

2019
Parallel query execution over encrypted data in database-as-a-service (DaaS).
J. Supercomput., 2019

HARPP: HARnessing the Power of Power sets for Mining Frequent Itemsets.
Inf. Technol. Control., 2019

Privacy-based medical data protection against internal security threats in heterogeneous Internet of Medical Things.
Int. J. Distributed Sens. Networks, 2019

Security and privacy based access control model for internet of connected vehicles.
Future Gener. Comput. Syst., 2019

TRICE: Mining Frequent Itemsets by Iterative TRimmed Transaction LattICE in Sparse Big Data.
IEEE Access, 2019

A Watermarking Technique Based on File Page Objects for PDF.
Proceedings of the IEEE Pacific Rim Conference on Communications, 2019

The Experimental Investigation of the Influence of Gender in Enjoyment, Ease of use, Satisfaction, and Usefulness during Interaction in Gaming Environment.
Proceedings of the XX International Conference on Human Computer Interaction, 2019

Understanding Blockchain: Platforms, Applications and Implementation Challenges.
Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, 2019

A Review of Current Security Issues in Internet of Things.
Proceedings of the Recent Trends and Advances in Wireless and IoT-enabled Networks, 2019

A Review of Internet of Things (IoT) Connectivity Techniques.
Proceedings of the Recent Trends and Advances in Wireless and IoT-enabled Networks, 2019

2018
Analysis of Factors Affecting Energy Aware Routing in Wireless Sensor Network.
Wirel. Commun. Mob. Comput., 2018

CDCSS: cluster-based distributed cooperative spectrum sensing model against primary user emulation (PUE) cyber attacks.
J. Supercomput., 2018

A generic methodology for geo-related data semantic annotation.
Concurr. Comput. Pract. Exp., 2018

Speeding Up the Internet of Things: LEAIoT: A Lightweight Encryption Algorithm Toward Low-Latency Communication for the Internet of Things.
IEEE Consumer Electron. Mag., 2018

Impact of web design features on irritation for E-commerce websites.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

TCP CUBIC: A Transport Protocol for Improving the Performance of TCP in Long Distance High Bandwidth Cyber-Physical Systems.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

2017
Enhancement in Data-Recovery and Re-Transmit Mechanisms of TCP.
Proceedings of the 42nd IEEE Conference on Local Computer Networks Workshops, 2017

Agent-based Modeling and Simulation of Virus on a Scale-Free Network.
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017

Bottom up Approach for Better Requirements Elicitation.
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017

Auto Configuration Based Enhanced and Secure Domain Naming Service for IPV-6 Internet of Things.
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017

An Evaluation of Role Based Access Control Towards Easier Management Compared to Tight Security.
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017

Modelling and Simulation of Resource constrained Vaccination Strategies and Epidemic Outbreaks.
Proceedings of the 2017 International Conference on Frontiers of Information Technology, 2017

2010
Mutual exclusion and role inheritance affecting least privilege in RBAC.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

2009
Object based dynamic separation of duty in RBAC.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009


  Loading...