Muhammad Yousaf

Orcid: 0000-0002-7210-9529

According to our database1, Muhammad Yousaf authored at least 49 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Modified Singular Value Decomposition (MSVD) Approach for the Enhancement of CCTV Low-Quality Images.
IEEE Access, 2024

2023
Lightweight and authentic symmetric session key cryptosystem for client-server mobile communication.
J. Supercomput., September, 2023

Robust and lightweight symmetric key exchange algorithm for next-generation IoE.
Internet Things, July, 2023

Rough Substructures Based on Overlaps of Successor in Quantales Under Serial Fuzzy Relations.
IEEE Access, 2023

2022
A Comparative Study of the Genetic Deep Learning Image Segmentation Algorithms.
Symmetry, 2022

GA-based geometrically optimized topology robustness to improve ambient intelligence for future internet of things.
Comput. Commun., 2022

Analytical Modeling and Optimization of Partitioned Permanent Magnet Consequent Pole Switched Flux Machine With Flux Barrier.
IEEE Access, 2022

Ultra-Miniaturized Antenna for Deeply Implanted Biomedical Devices.
IEEE Access, 2022

2021
Poor Coding Leads to DoS Attack and Security Issues in Web Applications for Sensors.
Secur. Commun. Networks, 2021

Cryptographic strength evaluation of AES s-box variants.
Int. J. Inf. Comput. Secur., 2021

An Ultra-Miniaturized Antenna With Ultra-Wide Bandwidth Characteristics for Medical Implant Systems.
IEEE Access, 2021

Improvement of Transient Stability of the Power Grids by a Judicious Auto-Reclosing Scheme in the Presence of Synchronous-Based DGs.
Proceedings of the IEEE Industry Applications Society Annual Meeting, 2021

Risk of Loss of Protection Coordination in Distribution Grids with High Penetration of Distributed Energy Resources.
Proceedings of the IEEE Industry Applications Society Annual Meeting, 2021

An Adaptive Protection Scheme for Dual-Setting Directional Recloser and Fuse Coordination for Distribution Grids with Distributed Generation.
Proceedings of the IEEE Industry Applications Society Annual Meeting, 2021

2020
Cryptographic Strength Evaluation of Key Schedule Algorithms.
Secur. Commun. Networks, 2020

A smart card oriented secure electronic voting machine built on NTRU.
Int. Arab J. Inf. Technol., 2020

Fake News Detection Using Machine Learning Ensemble Methods.
Complex., 2020

eMUD: Enhanced Manufacturer Usage Description for IoT Botnets Prevention on Home WiFi Routers.
IEEE Access, 2020

A Control Strategy to Mitigate the Sensitivity Deterioration of Overcurrent Protection in Distribution Networks with the Higher Concentration of Synchronous and Inverter Based DG Units.
Proceedings of the IEEE Industry Applications Society Annual Meeting, 2020

2019
UAV-Empowered Disaster-Resilient Edge Architecture for Delay-Sensitive Communication.
IEEE Netw., 2019

Performance analysis of radio spectrum for cognitive radio wireless networks using discrete time Markov chain.
J. Syst. Softw., 2019

M-Polynomials and Degree-Based Topological Indices of VC<sub>5</sub>C<sub>7</sub>[p, q] and HC<sub>5</sub>C<sub>7</sub>[p, q] Nanotubes.
IEEE Access, 2019

A Miniaturized Wide Band Implantable Antenna for Biomedical Application.
Proceedings of the UK/China Emerging Technologies, 2019

A Compact Wide Band Implantable Antenna for Biotelemetry.
Proceedings of the Second International Conference on Latest trends in Electrical Engineering and Computing Technologies, 2019

Miniaturized High Gain Antenna for Biomedical Application.
Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, 2019

2018
Public-Safety LTE: Communication Services, Standardization Status, and Disaster-Resilient Architecture.
CoRR, 2018

UCAM: Usage, Communication and Access Monitoring Based Detection System for IoT Botnets.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Priority-Based Device Discovery in Public Safety D2D Networks with Full Duplexing.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2018

Effective Resource Allocation in Fog for Efficient Energy Distribution.
Proceedings of the Advances in Network-Based Information Systems, 2018

Design and Implementation of an End-to-End Web based Trusted Email System.
Proceedings of the 9th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2018) / The 8th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2018) / Affiliated Workshops, 2018

2017
Protection coordination for a distribution system in the presence of distributed generation.
Turkish J. Electr. Eng. Comput. Sci., 2017

2015
Neighbor Node Trust based Intrusion Detection System for WSN.
Proceedings of the 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2015)/ The 5th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2015)/ Affiliated Workshops, 2015

2014
A Secure Architecture for Inter-cloud Virtual Machine Migration.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Generation of AES-Like S-Boxes by Replacing Affine Matrix.
Proceedings of the 12th International Conference on Frontiers of Information Technology, 2014

Security Analysis of DTLS Structure and Its Application to Secure Multicast Communication.
Proceedings of the 12th International Conference on Frontiers of Information Technology, 2014

ISP Independent Architecture (IIA) for IPv6 Packet Traversing and Inter-connectivity over Hybrid (IPv4/IPv6) Internet.
Proceedings of the 5th International Conference on Ambient Systems, 2014

Performance Analysis of IPv6 QoS for Multimedia Applications Using Real Testbed.
Proceedings of the 5th International Conference on Ambient Systems, 2014

Evaluation of IEEE 802.11n for Multimedia Application in VANET.
Proceedings of the 5th International Conference on Ambient Systems, 2014

2013
Application of a discontinuous Galerkin finite element method to special relativistic hydrodynamic models.
Comput. Math. Appl., 2013

2012
An Architecture for Exploiting Multihoming in Mobile Devices for Vertical Handovers & Bandwidth Aggregation.
Wirel. Pers. Commun., 2012

Performance comparison of end-to-end mobility management protocols for TCP.
J. Netw. Comput. Appl., 2012

The space-time CESE method for solving special relativistic hydrodynamic equations.
J. Comput. Phys., 2012

2011
The space-time CE/SE method for solving ultra-relativistic Euler equations.
Comput. Phys. Commun., 2011

Evaluating Impact of Mobility on Wireless Routing Protocols
CoRR, 2011

2010
On the implementation of End-to-End Mobility Management Framework (EMF).
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

Security issues related with DNS dynamic updates for mobile nodes: a survey.
Proceedings of the FIT '10, 2010

2009
A Cross-Layer User Centric Vertical Handover Decision Approach Based on MIH Local Triggers.
Proceedings of the Wireless and Mobile Networking - Second IFIP WG 6.8 Joint Conference, 2009

An analysis of service disruption time for TCP applications using end-to-end mobility management protocols.
Proceedings of the MoMM'2009, 2009

An Intelligent Prediction Model for Generating LGD Trigger of IEEE 802.21 MIH.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009


  Loading...