Muhammad Waqas

Orcid: 0000-0003-0814-7544

Affiliations:
  • University of Bahrain, Computer Engineering Department, Zallaq, Bahrain
  • Edith Cowan University, School of Engineering, Perth, WA, Australia
  • Ghulam Ishaq Khan Institute of Engineering Sciences and Technology, Swabi, Pakistan
  • Beijing University of Technology, School of Computing, China
  • Tsinghua University, Department of Electronic Engineering, Beijing, China (PhD 2019)


According to our database1, Muhammad Waqas authored at least 101 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A secure cross-domain authentication scheme based on threshold signature for MEC.
J. Cloud Comput., December, 2024

EAKE-WC: Efficient and Anonymous Authenticated Key Exchange Scheme for Wearable Computing.
IEEE Trans. Mob. Comput., May, 2024

A Many-Objective Ensemble Optimization Algorithm for the Edge Cloud Resource Scheduling Problem.
IEEE Trans. Mob. Comput., February, 2024

Hybrid Edge-Cloud Collaborator Resource Scheduling Approach Based on Deep Reinforcement Learning and Multiobjective Optimization.
IEEE Trans. Computers, January, 2024

SLIM: A Secure and Lightweight Multi-Authority Attribute-Based Signcryption Scheme for IoT.
IEEE Trans. Inf. Forensics Secur., 2024

2023
Many-Objective Optimization Based Intrusion Detection for in-Vehicle Network Security.
IEEE Trans. Intell. Transp. Syst., December, 2023

On the Effect of Emotion Identification from Limited Translated Text Samples Using Computational Intelligence.
Int. J. Comput. Intell. Syst., December, 2023

Cyberattacks and Security of Cloud Computing: A Complete Guideline.
Symmetry, November, 2023

Secure Internet of Vehicles (IoV) With Decentralized Consensus Blockchain Mechanism.
IEEE Trans. Veh. Technol., September, 2023

LCDMA: Lightweight Cross-Domain Mutual Identity Authentication Scheme for Internet of Things.
IEEE Internet Things J., July, 2023

Weakly-supervised butterfly detection based on saliency map.
Pattern Recognit., June, 2023

Deep convolutional cross-connected kernel mapping support vector machine based on SelectDropout.
Inf. Sci., May, 2023

RSU assisted reliable relay selection for emergency message routing in intermittently connected VANETs.
Wirel. Networks, April, 2023

Infrared ship target segmentation based on Adversarial Domain Adaptation.
Knowl. Based Syst., April, 2023

Cooperative Computational Offloading in Mobile Edge Computing for Vehicles: A Model-Based DNN Approach.
IEEE Trans. Veh. Technol., March, 2023

AAKE-BIVT: Anonymous Authenticated Key Exchange Scheme for Blockchain-Enabled Internet of Vehicles in Smart Transportation.
IEEE Trans. Intell. Transp. Syst., February, 2023

Defense scheme against advanced persistent threats in mobile fog computing security.
Comput. Networks, February, 2023

A Hybrid Many-Objective Optimization Algorithm for Task Offloading and Resource Allocation in Multi-Server Mobile Edge Computing Networks.
IEEE Trans. Serv. Comput., 2023

Network Intrusion Detection System (NIDS) Based on Pseudo-Siamese Stacked Autoencoders in Fog Computing.
IEEE Trans. Serv. Comput., 2023

Multi-hop emergency message dissemination through optimal cooperative forwarder in grid-based 5G-VANETs.
J. Ambient Intell. Humaniz. Comput., 2023

Deep neural network-based identification of driving risk utilizing driver dependent vehicle driving features: a scheme for critical infrastructure protection.
J. Ambient Intell. Humaniz. Comput., 2023

Network load prediction and anomaly detection using ensemble learning in 5G cellular networks.
Comput. Commun., 2023

A Provable Secure and Efficient Authentication Framework for Smart Manufacturing Industry.
IEEE Access, 2023

Secrecy Capacity Analysis with Imperfect Channel State Information and Varying Interference for 6G C-V2X Communication.
Proceedings of the 10th International Conference on Wireless Networks and Mobile Communications, 2023

Cloud-based Smart Parking System using Internet of Things.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Distance Vector and Prominent Reliable Path Selection based Stochastic Routing in Distributed Internet of Things.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

2022
Relay Hybrid Precoding in UAV-Assisted Wideband Millimeter-Wave Massive MIMO System.
IEEE Trans. Wirel. Commun., 2022

Non-Acted Text and Keystrokes Database and Learning Methods to Recognize Emotions.
ACM Trans. Multim. Comput. Commun. Appl., 2022

Blockchain-Based Offline Auditing for the Cloud in Vehicular Networks.
IEEE Trans. Netw. Serv. Manag., 2022

Social Phenomena and Fog Computing Networks: A Novel Perspective for Future Networks.
IEEE Trans. Comput. Soc. Syst., 2022

EmoPercept: EEG-based emotion classification through perceiver.
Soft Comput., 2022

SCCA: A slicing-and coding-based consensus algorithm for optimizing storage in blockchain-based IoT data sharing.
Peer-to-Peer Netw. Appl., 2022

A novel binary chaotic genetic algorithm for feature selection and its utility in affective computing and healthcare.
Neural Comput. Appl., 2022

Adaptive feature fusion for time series classification.
Knowl. Based Syst., 2022

A Novel Framework for Smart Systems Using Blockchain-Enabled Internet of Things.
IT Prof., 2022

A position-based reliable emergency message routing scheme for road safety in VANETs.
Comput. Networks, 2022

The role of artificial intelligence and machine learning in wireless networks security: principle, practice and challenges.
Artif. Intell. Rev., 2022

Intelligent Task Offloading for Smart Devices in Mobile Edge Computing.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

Enhancing Security in The Internet of Things Ecosystem using Reinforcement Learning and Blockchain.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

Resource Allocation for Blockchain-Enabled Fog Computing with Deep Reinforcement Learning.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

A Reliable and Stable V2V Routing Scheme for Warning Message Dissemination in VANETs using Bi-Directional Clustering.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

Infrared Ship Video Target Tracking Based on Cross-Connection and Spatial Transformer Network.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Blockchain Enable IoT Using Deep Reinforcement Learning: A Novel Architecture to Ensure Security of Data Sharing and Storage.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Ciphertext-Policy Attribute-based Encryption for Securing IoT Devices in Fog Computing.
Proceedings of the International Conference on Computer, 2022

Deep Reinforcement Learning based Intrusion Detection System with Feature Selections Method and Optimal Hyper-parameter in IoT Environment.
Proceedings of the International Conference on Computer, 2022

2021
Reinforcement Learning Assisted Impersonation Attack Detection in Device-to-Device Communications.
IEEE Trans. Veh. Technol., 2021

A hybrid list-based task scheduling scheme for heterogeneous computing.
J. Supercomput., 2021

A Multi-Task CNN for Maritime Target Detection.
IEEE Signal Process. Lett., 2021

ModPSO-CNN: an evolutionary convolution neural network with application to visual recognition.
Soft Comput., 2021

EEMDS: An Effective Emergency Message Dissemination Scheme for Urban VANETs.
Sensors, 2021

Clustering of graphs using pseudo-guided random walk.
J. Comput. Sci., 2021

A neural network architecture optimizer based on DARTS and generative adversarial learning.
Inf. Sci., 2021

A fusing framework of shortcut convolutional neural networks.
Inf. Sci., 2021

An Evolutionary Computing-Based Efficient Hybrid Task Scheduling Approach for Heterogeneous Computing Environment.
J. Grid Comput., 2021

Efficient dynamic multi-replica auditing for the cloud with geographic location.
Future Gener. Comput. Syst., 2021

Spectrum utilization efficiency in CRNs with hybrid spectrum access and channel reservation: A comprehensive analysis under prioritized traffic.
Future Gener. Comput. Syst., 2021

Utilizing 3D joints data extracted through depth camera to train classifiers for identifying suicide bomber.
Expert Syst. Appl., 2021

An effective genetic algorithm-based feature selection method for intrusion detection systems.
Comput. Secur., 2021

A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing.
Comput. Networks, 2021

An In-ad contents-based viewability prediction framework using Artificial Intelligence for Web Ads.
Artif. Intell. Rev., 2021

$4 \times 4$ Massive MIMO Antennas for 39 GHz Millimeter-Wave Applications.
Proceedings of the International Conference on UK-China Emerging Technologies, 2021

Recent Development, Trends and Challenges in IoT Security.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021

Deep Learning Models for Intelligent Healthcare: Implementation and Challenges.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021

2020
The Allocation and Reuse Scheme of Physical Cell Identifications Based on Maximum Degree First Coloring Algorithm.
IEEE Syst. J., 2020

S6AE: Securing 6LoWPAN Using Authenticated Encryption Scheme.
Sensors, 2020

Spectrum utilization efficiency in the cognitive radio enabled 5G-based IoT.
J. Netw. Comput. Appl., 2020

Optimisation-based training of evolutionary convolution neural network for visual classification applications.
IET Comput. Vis., 2020

Power maximisation technique for generating secret keys by exploiting physical layer security in wireless communication.
IET Commun., 2020

Deep Learning Techniques for Future Intelligent Cross-Media Retrieval.
CoRR, 2020

A Comprehensive Survey on Mobility-Aware D2D Communications: Principles, Practice and Challenges.
IEEE Commun. Surv. Tutorials, 2020

Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL.
Comput. Commun., 2020

Tracking area list allocation scheme based on overlapping community algorithm.
Comput. Networks, 2020

Spectrum efficiency in CRNs using hybrid dynamic channel reservation and enhanced dynamic spectrum access.
Ad Hoc Networks, 2020

A Review on Green Caching Strategies for Next Generation Communication Networks.
IEEE Access, 2020

RBO-EM: Reduced Broadcast Overhead Scheme for Emergency Message Dissemination in VANETs.
IEEE Access, 2020

A Novel Quantum Inspired Particle Swarm Optimization Algorithm for Electromagnetic Applications.
IEEE Access, 2020

Hybrid Precoding Design for Two-Way Relay-Assisted Terahertz Massive MIMO Systems.
IEEE Access, 2020

Interference Management in Ultra-Dense 5G Networks With Excessive Drone Usage.
IEEE Access, 2020

An Efficient Approach for Selecting a Secure Relay Node in Fog Computing Social Ties Network.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

Service Completion Probability Enhancement and Fairness for SUs using Hybrid Mode CRNs.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL).
ISC Int. J. Inf. Secur., 2019

Unsupervised pre-trained filter learning approach for efficient convolution neural network.
Neurocomputing, 2019

Tracking areas planning based on spectral clustering in small cell networks.
IET Commun., 2019

Water Preservation in Soan River Basin using Deep Learning Techniques.
CoRR, 2019

Mobility-Aware Fog Computing in Dynamic Environments: Understandings and Implementation.
IEEE Access, 2019

2018
Social-Aware Secret Key Generation for Secure Device-to-Device Communication via Trusted and Non-Trusted Relays.
IEEE Trans. Wirel. Commun., 2018

Socially Aware Secrecy-Ensured Resource Allocation in D2D Underlay Communication: An Overlapping Coalitional Game Scheme.
IEEE Trans. Wirel. Commun., 2018

Mobility Assisted Content Transmission For Device-to-Device Communication Underlaying Cellular Networks.
IEEE Trans. Veh. Technol., 2018

A Survey on Socially Aware Device-to-Device Communications.
IEEE Commun. Surv. Tutorials, 2018

Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack.
IEEE Access, 2018

FHC-PCIA: A Physical Cell Identification Allocation Method Based on Fuzzy Hierarchical Clustering for Heterogeneous Cellular Network.
IEEE Access, 2018

SSLSS: Semi-Supervised Learning-Based Steganalysis Scheme for Instant Voice Communication Network.
IEEE Access, 2018

A Quantum Particle Swarm Optimization Method With Fitness Selection Methodology for Electromagnetic Inverse Problems.
IEEE Access, 2018

Incentive Mechanism Design for Computation Offloading in Heterogeneous Fog Computing: A Contract-Based Approach.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Confidential Information Ensurance through Physical Layer Security in Device-to-Device Communication.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Impact of thermal aging on the intermetallic compound particle size and mechanical properties of lead free solder for green electronics.
Microelectron. Reliab., 2017

Efficient clustering of large uncertain graphs using neighborhood information.
Int. J. Approx. Reason., 2017

Security and Privacy in Device-to-Device (D2D) Communication: A Review.
IEEE Commun. Surv. Tutorials, 2017

Mobility-assisted device to device communications for Content Transmission.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

2015
Clustering large probabilistic graphs using multi-population evolutionary algorithm.
Inf. Sci., 2015

2013
Genetic programming based degree constrained spanning tree extraction.
Proceedings of the Eighth International Conference on Digital Information Management (ICDIM 2013), 2013


  Loading...