Molecular engineering of carbon nitride towards photocatalytic H2 evolution and dye degradation A Hayat, N Shaishta, I Uddin, M Khan, SKB Mane, A Hayat, I Ullah, T Ali, ... Journal of Colloid and Interface Science 597, 39-47, 2021 | 40 | 2021 |
History based forward and feedback mechanism in cooperative spectrum sensing including malicious users in cognitive radio network N Gul, IM Qureshi, A Omar, A Elahi, S Khan PloS one 12 (8), e0183387, 2017 | 34 | 2017 |
A genetic algorithm-based soft decision fusion scheme in cognitive iot networks with malicious users MS Khan, N Gul, J Kim, IM Qureshi, SM Kim Wireless Communications and Mobile Computing 2020, 1-10, 2020 | 32 | 2020 |
Support vector machine-based classification of malicious users in cognitive radio networks MS Khan, L Khan, N Gul, M Amir, J Kim, SM Kim Wireless Communications and Mobile Computing 2020, 1-11, 2020 | 29 | 2020 |
A double adaptive approach to tackle malicious users in cognitive radio networks MS Khan, M Jibran, I Koo, SM Kim, J Kim Wireless Communications and Mobile Computing 2019, 1-9, 2019 | 28 | 2019 |
Energy-efficient channel handoff for sensor network-assisted cognitive radio network M Usman, M Sajjad Khan, H Vu-Van, K Insoo Sensors 15 (8), 18012-18039, 2015 | 21 | 2015 |
Establishment of trust in internet of things by integrating trusted platform module: To counter cybersecurity challenges M Faisal, I Ali, MS Khan, SM Kim, J Kim Complexity 2020, 1-9, 2020 | 17 | 2020 |
Boosted trees algorithm as reliable spectrum sensing scheme in the presence of malicious users N Gul, MS Khan, SM Kim, J Kim, A Elahi, Z Khalil Electronics 9 (6), 1038, 2020 | 14 | 2020 |
Robust spectrum sensing via double-sided neighbor distance based on genetic algorithm in cognitive radio networks N Gul, MS Khan, J Kim, SM Kim Mobile Information Systems 2020, 1-10, 2020 | 11 | 2020 |
LSTPD: least slack time-based preemptive deadline constraint scheduler for Hadoop clusters I Ullah, MS Khan, M Amir, J Kim, SM Kim IEEE Access 8, 111751-111762, 2020 | 11 | 2020 |
Differential Evolution Based Reliable Cooperative Spectrum Sensing in the Presence of Malicious Users SA Noor Gul, I. M. Qureshi, Muhammad Sajjad Khan, Atif Elahi Wireless Personal Communications, 2020 | 11 | 2020 |
The Effect of Multiple Energy Detector on Evidence Theory Based Cooperative Spectrum Sensing Scheme for Cognitive Radio Networks. MS Khan, I Koo J. Inf. Process. Syst. 12 (2), 295-309, 2016 | 11 | 2016 |
An intelligent hybrid mutual authentication scheme for industrial internet of thing networks M Adil, J Ali, MS Khan, J Kim, R Alturki, M Zakarya, M Khan, R Khan, ... Comput., Mater. Continua 68 (1), 447-470, 2021 | 10 | 2021 |
A received signal strength based localization approach for multiple target nodes via Bayesian compressive sensing MS Khan, J Kim, EH Lee, SM Kim 2019 22nd International Multitopic Conference (INMIC), 1-6, 2019 | 10 | 2019 |
Productive behaviour of Lyallpur Silver Black and Rhode Island Red breeds of poultry M Ashraf, S Mahmood, MS Khan, F Ahmad Int. J. Agri. Biol 5 (3), 384-387, 2003 | 10 | 2003 |
Cyber security and key management issues for internet of things: Techniques, requirements, and challenges M Faisal, I Ali, MS Khan, J Kim, SM Kim Complexity 2020, 1-9, 2020 | 9 | 2020 |
Assessment the influence of climate and human activities in vegetation degradation using GIS and remote sensing techniques AE Jahelnabi, W Wu, AD Boloorani, HM Salem, M Nazeer, SM Fadoul, ... Contemporary Problems of Ecology 13, 685-693, 2020 | 9 | 2020 |
Differential evolution based machine learning scheme for secure cooperative spectrum sensing system N Gul, SM Kim, S Ahmed, MS Khan, J Kim Electronics 10 (14), 1687, 2021 | 8 | 2021 |
Particle swarm optimization in the presence of malicious users in cognitive IoT networks with data N Gul, MS Khan, SM Kim, M St-Hilaire, I Ullah, J Kim Scientific Programming 2020, 1-11, 2020 | 8 | 2020 |
A comparative analysis of different outlier detection techniques in cognitive radio networks with malicious users A Ahmed, MS Khan, N Gul, I Uddin, SM Kim, J Kim Wireless Communications and Mobile Computing 2020, 1-18, 2020 | 7 | 2020 |