Rafiullah Khan

Orcid: 0000-0002-0229-7747

According to our database1, Rafiullah Khan authored at least 54 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Robust Counting in Overcrowded Scenes Using Batch-Free Normalized Deep ConvNet.
Comput. Syst. Sci. Eng., 2023

Advancing SQL Injection Detection for High-Speed Data Centers: A Novel Approach Using Cascaded NLP.
CoRR, 2023

Cybersecurity Engineering: Bridging the Security Gaps in Advanced Automotive Systems and ISO/SAE 21434.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

An Investigation of Machine Learning Algorithms for High-bandwidth SQL Injection Detection Utilising BlueField-3 DPU Technology.
Proceedings of the 36th IEEE International System-on-Chip Conference, 2023

Investigation of Communication Overhead of SoC Lookaside Accelerators.
Proceedings of the 36th IEEE International System-on-Chip Conference, 2023

2022
Profile Aware ObScure Logging (PaOSLo): A Web Search Privacy-Preserving Protocol to Mitigate Digital Traces.
Secur. Commun. Networks, 2022

An Ml-based classification scheme for analyzing the social network reviews of yemeni people.
Int. Arab J. Inf. Technol., 2022

SEAL: Semantically Enriched Authoring in LATEX - A Model for Scientific Discourse.
IEEE Access, 2022



2021
EEWMP: An IoT-Based Energy-Efficient Water Management Platform for Smart Irrigation.
Sci. Program., 2021

IDBR: Iot Enabled Depth Base Routing Method for Underwater Wireless Sensor Network.
J. Sensors, 2021

Acute Myeloid Leukemia (AML) Detection Using AlexNet Model.
Complex., 2021

NN-QuPiD Attack: Neural Network-Based Privacy Quantification Model for Private Information Retrieval Protocols.
Complex., 2021

Remote Diagnosis and Triaging Model for Skin Cancer Using EfficientNet and Extreme Gradient Boosting.
Complex., 2021

Multi-Group ObScure Logging (MG-OSLo) A Privacy-Preserving Protocol for Private Web Search.
IEEE Access, 2021


Bird's-eye view on the Automotive Cybersecurity Landscape & Challenges in adopting AI/ML.
Proceedings of the Sixth International Conference on Fog and Mobile Edge Computing, 2021

2020
QuPiD Attack: Machine Learning-Based Privacy Quantification Mechanism for PIR Protocols in Health-Related Web Search.
Sci. Program., 2020

USAD: An Intelligent System for Slang and Abusive Text Detection in PERSO-Arabic-Scripted Urdu.
Complex., 2020

SiFSO: Fish Swarm Optimization-Based Technique for Efficient Community Detection in Complex Networks.
Complex., 2020

Risk Assessment and Decision Support for Sustainable Traffic Safety in Hong Kong Waters.
IEEE Access, 2020

A Secure Cloud Migration, Monitoring and Analytics Framework for Industrial Internet of Things.
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020

A Seamless Cloud Migration Approach to Secure Distributed Legacy Industrial SCADA Systems.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2020

2019
ObSecure Logging (OSLo): A Framework to Protect and Evaluate the Web Search Privacy in Health Care Domain.
J. Medical Imaging Health Informatics, 2019

Privacy Exposure Measure: A Privacy-Preserving Technique for Health-Related Web Search.
J. Medical Imaging Health Informatics, 2019

2018
Design and implementation of an automated network monitoring and reporting back system.
J. Ind. Inf. Integr., 2018

Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

2017
Energy saving through intelligent coordination among daily used fixed and mobile devices.
Sustain. Comput. Informatics Syst., 2017

Network Connectivity Proxy: Architecture, Implementation, and Performance Analysis.
IEEE Syst. J., 2017

Design and implementation of UPnP-based energy gateway for demand side management in smart grid.
J. Ind. Inf. Integr., 2017

Design and implementation of Ad-Hoc collaborative proxying scheme for reducing network energy waste.
Digit. Commun. Networks, 2017

Design and Implementation of Security Gateway for Synchrophasor Based Real-Time Control and Monitoring in Smart Grid.
IEEE Access, 2017

STRIDE-based threat modeling for cyber-physical systems.
Proceedings of the 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe, 2017

2016
Assessing the Potential for Saving Energy by Impersonating Idle Networked Devices.
IEEE J. Sel. Areas Commun., 2016

Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016

IEEE C37.118-2 Synchrophasor Communication Framework - Overview, Cyber Vulnerabilities Analysis and Performance Evaluation.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Poshida II, a Multi Group Distributed Peer to Peer Protocol for Private Web Search.
Proceedings of the International Conference on Frontiers of Information Technology, 2016

Achieving Energy Saving through Proxying Applications on behalf of Idle Devices.
Proceedings of the 7th International Conference on Ambient Systems, 2016

2015
Saving energy by delegating network activity to home gateways.
IEEE Trans. Consumer Electron., 2015

Roman Urdu Opinion Mining System (RUOMiS).
CoRR, 2015

2014
Energy-aware home area networking.
PhD thesis, 2014

An Authentication and Key Management Scheme for Heterogeneous Sensor Networks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

A Secure Authentication and Key Management Scheme for Wireless Sensor Networks.
Proceedings of the Sensor Systems and Software - 5th International Conference, 2014

Improving Smartphones Battery Life by Reducing Energy Waste of Background Applications.
Proceedings of the Eighth International Conference on Next Generation Mobile Apps, 2014

Localization Performance Evaluation of Extended Kalman Filter in Wireless Sensors Network.
Proceedings of the 5th International Conference on Ambient Systems, 2014

2013
Conceptual Framework of Redundant Link Aggregation
CoRR, 2013

Content-location based key management scheme for content centric networks.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Design of Home Energy Gateway boosting the development of Smart Grid applications at Home.
Proceedings of the 4th Annual International Conference on Energy Aware Computing Systems and Applications, 2013

Smart proxying: An optimal strategy for improving battery life of mobile devices.
Proceedings of the International Green Computing Conference, 2013

Design and Implementation of Cooperative Network Connectivity Proxy Using Universal Plug and Play.
Proceedings of the Future Internet, 2013

2012
Smart proxying for reducing network energy consumption.
Proceedings of the International Symposium on Performance Evaluation of Computer & Telecommunication Systems, 2012

Design of UPnP based cooperative network connectivity proxy.
Proceedings of the Sustainable Internet and ICT for Sustainability, 2012

Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges.
Proceedings of the 10th International Conference on Frontiers of Information Technology, 2012


  Loading...