Follow
Dr. Muhammad Sajjad Khan
Title
Cited by
Cited by
Year
Molecular engineering of carbon nitride towards photocatalytic H2 evolution and dye degradation
A Hayat, N Shaishta, I Uddin, M Khan, SKB Mane, A Hayat, I Ullah, T Ali, ...
Journal of Colloid and Interface Science 597, 39-47, 2021
402021
History based forward and feedback mechanism in cooperative spectrum sensing including malicious users in cognitive radio network
N Gul, IM Qureshi, A Omar, A Elahi, S Khan
PloS one 12 (8), e0183387, 2017
342017
A genetic algorithm-based soft decision fusion scheme in cognitive iot networks with malicious users
MS Khan, N Gul, J Kim, IM Qureshi, SM Kim
Wireless Communications and Mobile Computing 2020, 1-10, 2020
322020
Support vector machine-based classification of malicious users in cognitive radio networks
MS Khan, L Khan, N Gul, M Amir, J Kim, SM Kim
Wireless Communications and Mobile Computing 2020, 1-11, 2020
292020
A double adaptive approach to tackle malicious users in cognitive radio networks
MS Khan, M Jibran, I Koo, SM Kim, J Kim
Wireless Communications and Mobile Computing 2019, 1-9, 2019
282019
Energy-efficient channel handoff for sensor network-assisted cognitive radio network
M Usman, M Sajjad Khan, H Vu-Van, K Insoo
Sensors 15 (8), 18012-18039, 2015
212015
Establishment of trust in internet of things by integrating trusted platform module: To counter cybersecurity challenges
M Faisal, I Ali, MS Khan, SM Kim, J Kim
Complexity 2020, 1-9, 2020
172020
Boosted trees algorithm as reliable spectrum sensing scheme in the presence of malicious users
N Gul, MS Khan, SM Kim, J Kim, A Elahi, Z Khalil
Electronics 9 (6), 1038, 2020
142020
Robust spectrum sensing via double-sided neighbor distance based on genetic algorithm in cognitive radio networks
N Gul, MS Khan, J Kim, SM Kim
Mobile Information Systems 2020, 1-10, 2020
112020
LSTPD: least slack time-based preemptive deadline constraint scheduler for Hadoop clusters
I Ullah, MS Khan, M Amir, J Kim, SM Kim
IEEE Access 8, 111751-111762, 2020
112020
Differential Evolution Based Reliable Cooperative Spectrum Sensing in the Presence of Malicious Users
SA Noor Gul, I. M. Qureshi, Muhammad Sajjad Khan, Atif Elahi
Wireless Personal Communications, 2020
112020
The Effect of Multiple Energy Detector on Evidence Theory Based Cooperative Spectrum Sensing Scheme for Cognitive Radio Networks.
MS Khan, I Koo
J. Inf. Process. Syst. 12 (2), 295-309, 2016
112016
An intelligent hybrid mutual authentication scheme for industrial internet of thing networks
M Adil, J Ali, MS Khan, J Kim, R Alturki, M Zakarya, M Khan, R Khan, ...
Comput., Mater. Continua 68 (1), 447-470, 2021
102021
A received signal strength based localization approach for multiple target nodes via Bayesian compressive sensing
MS Khan, J Kim, EH Lee, SM Kim
2019 22nd International Multitopic Conference (INMIC), 1-6, 2019
102019
Productive behaviour of Lyallpur Silver Black and Rhode Island Red breeds of poultry
M Ashraf, S Mahmood, MS Khan, F Ahmad
Int. J. Agri. Biol 5 (3), 384-387, 2003
102003
Cyber security and key management issues for internet of things: Techniques, requirements, and challenges
M Faisal, I Ali, MS Khan, J Kim, SM Kim
Complexity 2020, 1-9, 2020
92020
Assessment the influence of climate and human activities in vegetation degradation using GIS and remote sensing techniques
AE Jahelnabi, W Wu, AD Boloorani, HM Salem, M Nazeer, SM Fadoul, ...
Contemporary Problems of Ecology 13, 685-693, 2020
92020
Differential evolution based machine learning scheme for secure cooperative spectrum sensing system
N Gul, SM Kim, S Ahmed, MS Khan, J Kim
Electronics 10 (14), 1687, 2021
82021
Particle swarm optimization in the presence of malicious users in cognitive IoT networks with data
N Gul, MS Khan, SM Kim, M St-Hilaire, I Ullah, J Kim
Scientific Programming 2020, 1-11, 2020
82020
A comparative analysis of different outlier detection techniques in cognitive radio networks with malicious users
A Ahmed, MS Khan, N Gul, I Uddin, SM Kim, J Kim
Wireless Communications and Mobile Computing 2020, 1-18, 2020
72020
The system can't perform the operation now. Try again later.
Articles 1–20