default search action
Muhammad Usman 0001
Person information
- affiliation: University of South Wales, UK
- affiliation (former): University of Surrey, UK
- affiliation (PhD): Griffith University, Australia
Other persons with the same name
- Muhammad Usman (aka: Usman Muhammad) — disambiguation page
- Muhammad Usman 0002
— Blekinge Institute of Technology, Karlskrona, Sweden (and 1 more)
- Muhammad Usman 0003
— Glasgow Caledonian University, School of Computing, Engineering and Built Environment, Glasgow, UK (and 3 more)
- Muhammad Usman 0004
— University Hasselt, Diepenbeek, Belgium
- Muhammad Usman 0005
— Shaheed Zulfikar Ali Bhutto Institute of Science and Technology, Islamabad, Pakistan
- Muhammad Usman 0008
— University of Dayton, Department of Mathematics, OH, USA (and 1 more)
- Muhammad Usman 0009
— University of Melbourne, Parkville, Victoria, Australia (and 1 more)
- Muhammad Usman 0010
— York University, Toronto, Ontario, Canada
- Muhammad Usman 0011
(aka: Muhammad Usman Asad) — University of Ulsan, South Korea (and 1 more)
- Muhammad Usman 0012
— Gwangju Institute of Science & Technology, Korea
- Muhammad Usman 0013
— FAST - National University of Computer & Emerging Sciences, Islamabad, Pakistan
- Muhammad Usman 0014 — King's College London, Division of Imaging Sciences and Biomedical Engineering, UK
- Muhammad Usman 0015
— University of South Wales, Engineering and Science, UK (and 2 more)
- Muhammad Usman 0016
— Julius Maximillian's University Wuerzburg, Institute for Geography and Geology, Germany (and 2 more)
- Muhammad Usman 0017
— University College Dublin, Ireland (and 2 more)
- Muhammad Usman 0018
— Quaid-i-Azam University, Faculty of Natural Sciences, Department of Computer Sciences, Islamabad, Pakistan
- Muhammad Usman 0019
— Hanyang University ERICA Campus, Department of Mechatronics Engineering, Ansan, South Korea (and 1 more)
- Muhammad Usman 0020
— Ghulam Ishaq Khan Institute of Engineering Sciences and Technology, Topi, Pakistan (and 1 more)
- Muhammad Usman 0021
— Peking University, College of Engineering, BIC-ESAT, Beijing, China (and 1 more)
- Muhammad Usman 0022
— University of Engineering and Technology Taxila, Sub-Campus Chakwal, Department of Electronics Engineering, Pakistan
- Muhammad Usman 0023
— University of Padova, Department of Industrial Engineering, Italy
- Muhammad Usman 0024 — University of Texas at Austin, TX, USA
- Muhammad Usman 0025
— University of the Punjab, Centre for Geographical Information System, Lahore, Pakistan
- Muhammad Usman 0026
— COMSATS University Islamabad (CUI), Pakistan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j11]Khalid Hasan, Mohammad Jabed Morshed Chowdhury
, Kamanashis Biswas
, Khandakar Ahmed
, Md. Saiful Islam
, Muhammad Usman:
A blockchain-based secure data-sharing framework for Software Defined Wireless Body Area Networks. Comput. Networks 211: 109004 (2022) - [j10]Bilal Rauf, Haider Abbas
, Muhammad Usman, Tanveer A. Zia
, Waseem Iqbal
, Yawar Abbas Bangash, Hammad Afzal
:
Application Threats to Exploit Northbound Interface Vulnerabilities in Software Defined Networks. ACM Comput. Surv. 54(6): 121:1-121:36 (2022) - [j9]Mohammad Jabed Morshed Chowdhury
, Muhammad Usman
, Md. Sadek Ferdous
, Niaz Chowdhury
, Anam Ibna Harun
, Umme Sumaya Jannat, Kamanashis Biswas
:
A Cross-Layer Trust-Based Consensus Protocol for Peer-to-Peer Energy Trading Using Fuzzy Logic. IEEE Internet Things J. 9(16): 14779-14789 (2022) - [j8]Alireza Jolfaei
, Muhammad Usman
, Manuel Roveri
, Michael Sheng
, Marimuthu Palaniswami
, Krishna Kant
:
Guest Editorial: Computational Intelligence for Human-in-the-Loop Cyber Physical Systems. IEEE Trans. Emerg. Top. Comput. Intell. 6(1): 2-5 (2022) - 2021
- [j7]Nazar Waheed
, Xiangjian He, Muhammad Ikram
, Muhammad Usman, Saad Sajid Hashmi
, Muhammad Usman:
Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures. ACM Comput. Surv. 53(6): 122:1-122:37 (2021) - [j6]Kanwal Mahmud
, Muhammad Usman, Muddassar Azam Sindhu
, Alireza Jolfaei
, Gautam Srivastava
:
Closing the Loop in Feedback Driven Learning Environments Using Trust Decision Making and Utility Theory. IEEE Trans. Emerg. Top. Comput. Intell. 5(1): 6-18 (2021) - [j5]Abdul Rehman Javed
, Muhammad Usman
, Saif Ur Rehman
, Mohib Ullah Khan
, Mohammad Sayad Haghighi
:
Anomaly Detection in Automated Vehicles Using Multistage Attention-Based Convolutional Neural Network. IEEE Trans. Intell. Transp. Syst. 22(7): 4291-4300 (2021) - [j4]Azeem Irshad
, Muhammad Usman
, Shehzad Ashraf Chaudhry
, Ali Kashif Bashir
, Alireza Jolfaei
, Gautam Srivastava
:
Fuzzy-in-the-Loop-Driven Low-Cost and Secure Biometric User Access to Server. IEEE Trans. Reliab. 70(3): 1014-1025 (2021) - 2020
- [i1]Nazar Waheed, Xiangjian He, Muhammad Usman, Muhammad Usman:
Security & Privacy in IoT Using Machine Learning & Blockchain: Threats & Countermeasures. CoRR abs/2002.03488 (2020)
2010 – 2019
- 2015
- [j3]Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu:
Specification and Validation of Enhanced Mobile Agent-Enabled Anomaly Detection and Verification in Resource Constrained Networks. J. Networks 10(6): 353-368 (2015) - [j2]Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu
:
Mobile agent-based cross-layer anomaly detection in smart home sensor networks using fuzzy logic. IEEE Trans. Consumer Electron. 61(2): 197-205 (2015) - 2014
- [j1]Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu:
A Resource-Efficient System for Detection and Verification of Anomalies Using Mobile Agents in Wireless Sensor Networks. J. Networks 9(12): 3427-3444 (2014) - [c9]Muhammad Usman:
Agent-enabled anomaly detection in resource constrained wireless sensor networks. WoWMoM 2014: 1-2 - 2013
- [c8]Kamanashis Biswas, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan, Muhammad Usman:
An energy efficient clique based clustering and routing mechanism in wireless sensor networks. IWCMC 2013: 171-176 - [c7]Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu
:
Formal verification of mobile agent based anomaly detection in Wireless Sensor Networks. LCN Workshops 2013: 1001-1009 - 2012
- [c6]Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu
, Surraya Khanum:
Securing mobile agent based Wireless Sensor Network applications on middleware. ISCIT 2012: 707-712 - [c5]Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu
, Surraya Khanum:
Wireless Smart Home Sensor Networks: Mobile Agent Based Anomaly Detection. UIC/ATC 2012: 322-329 - 2010
- [c4]Azeem Irshad
, Wajahat Noshairwan, Muhammad Shafiq, Shahzada Khurram
, Ehtsham Irshad, Muhammad Usman:
Security Enhancement for Authentication of Nodes in MANET by Checking the CRL Status of Servers. SUComS 2010: 86-95 - [c3]Ehtsham Irshad, Wajahat Noshairwan, Muhammad Shafiq, Shahzada Khurram
, Azeem Irshad
, Muhammad Usman:
Performance Evaluation Analysis of Group Mobility in Mobile Ad Hoc Networks. SUComS 2010: 96-103
2000 – 2009
- 2009
- [c2]Surraya Khanum, Muhammad Usman, Khalid Hussain
, Rehab Zafar, Muhammad Sher:
Energy-Efficient Intrusion Detection System for Wireless Sensor Network Based on MUSK Architecture. HPCA (China) 2009: 212-217 - [c1]Muhammad Usman, Surraya Khanum, Wajahat Noshairwan, Ehtsham Irshad, Azeem Irshad
:
Performance Evaluation of Authentication Certificate Based Seamless Vertical Handoff in GPRS-WLAN. HPCA (China) 2009: 384-389
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-19 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint