


default search action
Aftab Ali
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j17]Samson Kahsay Gebresilassie
, Joseph Rafferty
, Mamun I. Abu-Tair
, Aftab Ali, Li-Ming Chen, Zhan Cui:
SHIELD: Secure holistic IoT environment with ledger-based defense. Internet Things 30: 101473 (2025) - 2024
- [j16]Radowanul Haque
, Aftab Ali
, Sally I. McClean
, Ian Cleland
, Joost Noppen
:
Heterogeneous Cross-Project Defect Prediction Using Encoder Networks and Transfer Learning. IEEE Access 12: 409-419 (2024) - [j15]Faiza Babar Khan
, Muhammad Hanif Durad
, Asifullah Khan
, Farrukh Aslam Khan
, Muhammad Rizwan
, Aftab Ali
:
Design and Performance Analysis of an Anti-Malware System Based on Generative Adversarial Network Framework. IEEE Access 12: 27683-27708 (2024) - [j14]Yujia Lin, Li-Ming Chen, Aftab Ali, Christopher Nugent
, Ian Cleland, Rongyang Li, Jianguo Ding, Huansheng Ning:
Human digital twin: a survey. J. Cloud Comput. 13(1): 131 (2024) - [j13]Umm-e-Hani Tayyab, Faiza Babar Khan, Asifullah Khan, Muhammad Hanif Durad, Farrukh Aslam Khan, Aftab Ali:
ISAnWin: inductive generalized zero-shot learning using deep CNN for malware detection across windows and android platforms. PeerJ Comput. Sci. 10: e2604 (2024) - [j12]Rabia Khan, Noshina Tariq
, Muhammad Ashraf
, Farrukh Aslam Khan
, Saira Shafi, Aftab Ali
:
FL-DSFA: Securing RPL-Based IoT Networks against Selective Forwarding Attacks Using Federated Learning. Sensors 24(17): 5834 (2024) - [c10]Mamun I. Abu-Tair, Aftab Ali, Samson Kahsay Gebresilassie, Joseph Rafferty, Zhan Cui:
Regulation Compliance System for IoT Environments: GDPR Compliance as a Use-Case. AINA (2) 2024: 147-160 - [c9]Saira Shafi, Noshina Tariq, Farrukh Aslam Khan, Aftab Ali:
Federated Learning for Enhanced Malware Threat Detection to Secure Smart Power Grids. UCAmI 2024: 692-703 - [c8]Muhammad Aaqib, Aftab Ali, Liming Chen, Omar Nibouche:
A Dependable Hybrid Deep Learning Model for IoT Trust Management System. UCAmI 2024: 704-715 - 2023
- [j11]Muhammad Aaqib, Aftab Ali, Liming Chen, Omar Nibouche
:
IoT trust and reputation: a survey and taxonomy. J. Cloud Comput. 12(1): 42 (2023) - [c7]Lixian Xu, Rui Su, Aftab Ali, Jun Liu, Xinfeng Liu, Dehu Yu:
Fault Diagnosis of Pumping Units Based on Extended-Fusion Machine Learning. ISKE 2023: 302-308 - [i2]Muhammad Aaqib, Aftab Ali, Liming Chen, Omar Nibouche:
IoT trust and reputation: a survey and taxonomy. CoRR abs/2304.06119 (2023) - 2022
- [i1]Yujia Lin, Liming Chen, Aftab Ali, Christopher Nugent, Ian Cleland, Rongyang Li, Dazhi Gao, Hang Wang, Yajie Wang, Huansheng Ning:
Human Digital Twin: A Survey. CoRR abs/2212.05937 (2022) - 2021
- [j10]Aftab Ali, Naveed Khan, Mamun I. Abu-Tair, Joost Noppen, Sally I. McClean, Ian R. McChesney:
Discriminating features-based cost-sensitive approach for software defect prediction. Autom. Softw. Eng. 28(2): 11 (2021) - [c6]Naveed Khan
, Zeeshan Tariq
, Aftab Ali, Sally I. McClean, Paul N. Taylor, Detlef D. Nauck:
Early Prediction of Complex Business Processes Using Association Rule Based Mining. RTIP2R 2021: 183-194
2010 – 2019
- 2019
- [c5]Naveed Khan, Zulfiqar Ali, Aftab Ali, Sally I. McClean, Darryl Charles
, Paul N. Taylor, Detlef D. Nauck:
A Generic Model for End State Prediction of Business Processes Towards Target Compliance. SGAI Conf. 2019: 325-335 - [c4]Aftab Ali, Mamun I. Abu-Tair, Joost Noppen, Sally I. McClean, Zhiwei Lin, Ian R. McChesney:
Contributing Features-Based Schemes for Software Defect Prediction. SGAI Conf. 2019: 350-361 - 2018
- [j9]Saleh M. Al-Saleem, Aftab Ali, Naveed Khan:
Energy efficient key agreement scheme for ubiquitous and continuous remote healthcare systems using data mining technique. Clust. Comput. 21(1): 469-480 (2018) - 2017
- [j8]Farrukh Aslam Khan
, Nur Al Hasan Haldar
, Aftab Ali, Mohsin Iftikhar, Tanveer A. Zia
, Albert Y. Zomaya
:
A Continuous Change Detection Mechanism to Identify Anomalies in ECG Signals for WBAN-Based Healthcare Environments. IEEE Access 5: 13531-13544 (2017) - [j7]Nur Al Hasan Haldar
, Farrukh Aslam Khan
, Aftab Ali, Haider Abbas
:
Arrhythmia classification using Mahalanobis distance based improved Fuzzy C-Means clustering for mobile health monitoring systems. Neurocomputing 220: 221-235 (2017) - [j6]Farrukh Aslam Khan, Umar Manzoor, Azhar Khan, Aftab Ali, Haider Abbas, Maruf Pasha:
Peer-to-Peer File Sharing Framework for Smartphones: Deployment and Evaluation on Android. J. Inf. Sci. Eng. 33(6): 1417-1432 (2017) - 2015
- [j5]Aftab Ali, Farrukh Aslam Khan
:
Key Agreement Schemes in Wireless Body Area Networks: Taxonomy and State-of-the-Art. J. Medical Syst. 39(10): 115:1-115:14 (2015) - [c3]Aftab Ali, Nur Al Hasan Haldar
, Farrukh Aslam Khan, Sana Ullah:
ECG Arrhythmia Classification Using Mahalanobis-Taguchi System in a Body Area Network Environment. GLOBECOM 2015: 1-7 - 2014
- [j4]Aftab Ali
, Farrukh Aslam Khan
:
A Broadcast-Based Key Agreement Scheme Using Set Reconciliation for Wireless Body Area Networks. J. Medical Syst. 38(5): 33 (2014) - [c2]Farrukh Aslam Khan
, Aftab Ali, Haider Abbas
, Nur Al Hasan Haldar
:
A Cloud-based Healthcare Framework for Security and Patients' Data Privacy Using Wireless Body Area Networks. FNC/MobiSPC 2014: 511-517 - 2013
- [j3]Aftab Ali
, Farrukh Aslam Khan
:
Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications. EURASIP J. Wirel. Commun. Netw. 2013: 216 (2013) - [j2]Sarah Irum, Aftab Ali
, Farrukh Aslam Khan
, Haider Abbas
:
A Hybrid Security Mechanism for Intra-WBAN and Inter-WBAN Communications. Int. J. Distributed Sens. Networks 9 (2013) - [j1]Aftab Ali
, Sarah Irum, Firdous Kausar
, Farrukh Aslam Khan
:
A cluster-based key agreement scheme using keyed hashing for Body Area Networks. Multim. Tools Appl. 66(2): 201-214 (2013) - 2010
- [c1]Aftab Ali
, Farrukh Aslam Khan
:
An Improved EKG-Based Key Agreement Scheme for Body Area Networks. ISA 2010: 298-308
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-18 01:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint