default search action
Hassaan Khaliq Qureshi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Rimsha Saeed, Hassaan Khaliq Qureshi, Christiana Ioannou, Marios Lestas:
A Proactive Model for Intrusion Detection Using Image Representation of Network Flows. IEEE Access 12: 160653-160666 (2024) - [j33]Asmad Bin Abdul Razzaque, Hassaan Khaliq Qureshi, Andrea Baiocchi:
The role of SIC on the design of next generation multiple access. Ann. des Télécommunications 79(5-6): 343-360 (2024) - [c38]Osama Saleem, Awais Bin Asif, Soheyb Ribouh, Nouman Ashraf, Hassaan Khaliq Qureshi:
RIS assisted Cooperative Computation Offloading for Autonomous Vehicle in Mobile Edge Computing. VTC Fall 2024: 1-6 - 2023
- [j32]Waqar Ali Aziz, Iacovos Ioannou, Marios Lestas, Hassaan Khaliq Qureshi, Adnan Iqbal, Vasos Vassiliou:
Content-Aware Network Traffic Prediction Framework for Quality of Service-Aware Dynamic Network Resource Management. IEEE Access 11: 99716-99733 (2023) - [j31]Qamar Abbas, Syed Ali Hassan, Hassaan Khaliq Qureshi, Kapal Dev, Haejoon Jung:
A comprehensive survey on age of information in massive IoT networks. Comput. Commun. 197: 199-213 (2023) - [c37]Waqar Ali Aziz, Hassaan Khaliq Qureshi, Adnan Iqbal, Anwer Al-Dulaimi, Saba Al-Rubaye:
Towards Accurate Categorization of Network IP Traffic Using Deep Packet Inspection and Machine Learning. GLOBECOM 2023: 1-6 - [c36]Muhammad Imran, Hassaan Khaliq Qureshi, Irene Amerini:
BHAC-MRI: Backdoor and Hybrid Attacks on MRI Brain Tumor Classification Using CNN. ICIAP (2) 2023: 332-344 - [c35]Myra Khalid, Aamina Akbar, Hassaan Khaliq Qureshi, Sobia Jangsher:
Joint Backhaul Pairing and Resource Allocation of Moving Small Cells Using NOMA. ISNCC 2023: 1-6 - [i3]Asad Aftab, Chrysostomos Chrysostomou, Hassaan Khaliq Qureshi, Semeen Rehman:
Holo-Block Chain: A Hybrid Approach for Secured IoT Healthcare Ecosystem. CoRR abs/2304.14175 (2023) - 2022
- [j30]Muhammad Asaad Cheema, Rafay Iqbal Ansari, Nouman Ashraf, Syed Ali Hassan, Hassaan Khaliq Qureshi, Ali Kashif Bashir, Christos Politis:
Blockchain-based secure delivery of medical supplies using drones. Comput. Networks 204: 108706 (2022) - [j29]Faizan Mehmood, Nouman Ashraf, Lourdes Alvarez, Tahir Nadeem Malik, Hassaan Khaliq Qureshi, Tariq Kamal:
Grid integrated photovoltaic system with fuzzy based maximum power point tracking control along with harmonic elimination. Trans. Emerg. Telecommun. Technol. 33(2) (2022) - [j28]Muhammad Zawish, Nouman Ashraf, Rafay Iqbal Ansari, Steven Davy, Hassaan Khaliq Qureshi, Nauman Aslam, Syed Ali Hassan:
Toward On-Device AI and Blockchain for 6G-Enabled Agricultural Supply Chain Management. IEEE Internet Things Mag. 5(2): 160-166 (2022) - [j27]Muhammad Waseem Akhtar, Syed Ali Hassan, Aamir Mahmood, Haejoon Jung, Hassaan Khaliq Qureshi, Mikael Gidlund:
Q2A-NOMA: A Q-Learning-Based QoS-Aware NOMA System Design for Diverse Data Rate Requirements. IEEE Trans. Ind. Informatics 18(11): 7549-7559 (2022) - [c34]Asmad Bin Abdul Razzaque, Hassaan Khaliq Qureshi, Andrea Baiocchi:
Low vs high spectral efficiency communications with SIC and random access. PEMWN 2022: 1-6 - [c33]Awais Bin Asif, Christos Liaskos, Andreas Pitsillides, Hassaan Khaliq Qureshi, Marios Lestas:
Optimal Path Selection in Cascaded Intelligent Reflecting Surfaces. VTC Fall 2022: 1-5 - [c32]Asad Aftab, Chrysostomos Chrysostomou, Hassaan Khaliq Qureshi, Semeen Rehman:
Holo-Block Chain: A Hybrid Approach for Secured IoT Healthcare Ecosystem. WiMob 2022: 243-250 - [i2]Muhammad Zawish, Nouman Ashraf, Rafay Iqbal Ansari, Steven Davy, Hassaan Khaliq Qureshi, Nauman Aslam, Syed Ali Hassan:
Towards On-Device AI and Blockchain for 6G enabled Agricultural Supply-chain Management. CoRR abs/2203.06465 (2022) - 2021
- [j26]Muhammad Asaad Cheema, Muhammad Karam Shehzad, Hassaan Khaliq Qureshi, Syed Ali Hassan, Haejoon Jung:
A Drone-Aided Blockchain-Based Smart Vehicular Network. IEEE Trans. Intell. Transp. Syst. 22(7): 4160-4170 (2021) - [j25]Syed Muhammad Danish, Kaiwen Zhang, Hans-Arno Jacobsen, Nouman Ashraf, Hassaan Khaliq Qureshi:
BlockEV: Efficient and Secure Charging Station Selection for Electric Vehicles. IEEE Trans. Intell. Transp. Syst. 22(7): 4194-4211 (2021) - [c31]Abdul Nasir, Hassaan Khaliq Qureshi, Israr Ullah, Muttukrishnan Rajarajan:
EHA-BeeSensor: Hybrid Protocol for Energy Proficient Routing in IoT Network using Swarm Intelligence. CAMAD 2021: 1-7 - 2020
- [j24]Madiha Amjad, Hassaan Khaliq Qureshi, Syed Ali Hassan, Arsalan Ahmad, Sobia Jangsher:
Optimization of MAC Frame Slots and Power in Hybrid VLC/RF Networks. IEEE Access 8: 21653-21664 (2020) - [j23]Syed Muhammad Danish, Marios Lestas, Hassaan Khaliq Qureshi, Kaiwen Zhang, Waqar Asif, Muttukrishnan Rajarajan:
Securing the LoRaWAN join procedure using blockchains. Clust. Comput. 23(3): 2123-2138 (2020) - [j22]Mahnoor Anjum, Muhammad Abdullah Khan, Syed Ali Hassan, Aamir Mahmood, Hassaan Khaliq Qureshi, Mikael Gidlund:
RSSI Fingerprinting-Based Localization Using Machine Learning in LoRa Networks. IEEE Internet Things Mag. 3(4): 53-59 (2020) - [j21]H. Faizan Saeed, Sobia Jangsher, Moayad Aloqaily, Hassaan Khaliq Qureshi, Jalel Ben-Othman:
Joint pairing and resource allocation for backhaul of small cells using NOMA. J. Comput. Sci. 45: 101197 (2020) - [j20]Muhammad Shehryar Aslam, Alishba Khan, Abeera Atif, Syed Ali Hassan, Aamir Mahmood, Hassaan Khaliq Qureshi, Mikael Gidlund:
Exploring Multi-Hop LoRa for Green Smart Cities. IEEE Netw. 34(2): 225-231 (2020) - [c30]Muhammad Asaad Cheema, Hassaan Khaliq Qureshi, Chrysostomos Chrysostomou, Marios Lestas:
Utilizing Blockchain for Distributed Machine Learning based Intrusion Detection in Internet of Things. DCOSS 2020: 429-435 - [c29]Madiha Amjad, Marios Lestas, Hassaan Khaliq Qureshi, Taqwa Saeed, Andreas Pitsillides:
Concentration Gradient based Routing for Molecular Nanonetworks. ICOIN 2020: 336-341 - [c28]Waqar Ali Aziz, Hassaan Khaliq Qureshi, Adnan Iqbal, Marios Lestas:
Accurate Prediction of Streaming Video Traffic in TCP/IP Networks using DPI and Deep Learning. IWCMC 2020: 310-315 - [c27]Asad Aftab, Nouman Ashraf, Hassaan Khaliq Qureshi, Syed Ali Hassan, Sobia Jangsher:
BLOCK-ML: Blockchain and Machine Learning for UAV-BSs Deployment. VTC Fall 2020: 1-5 - [c26]Syed Muhammad Mohsin, Nouman Ashraf, Sheraz Aslam, Hassaan Khaliq Qureshi, Iqra Mustafa, Muhammad Asaad Cheema, Muhammad Bilal Qureshi:
A Cost Efficient Fair Pricing Scheme for Low Energy Consumers of Networked Smart Cities. VTC Spring 2020: 1-5 - [i1]Mahnoor Anjum, Muhammad Abdullah Khan, Syed Ali Hassan, Aamir Mahmood, Hassaan Khaliq Qureshi, Mikael Gidlund:
RSSI Fingerprinting-based Localization Using Machine Learning in LoRa Networks. CoRR abs/2006.01278 (2020)
2010 – 2019
- 2019
- [j19]Zaeema Iftikhar, Sobia Jangsher, Hassaan Khaliq Qureshi, Moayad Aloqaily:
Resource Efficient Allocation and RRH Placement for Backhaul of Moving Small Cells. IEEE Access 7: 47379-47389 (2019) - [j18]Madiha Amjad, Hassaan Khaliq Qureshi, Sobia Jangsher:
Reserve before transmit (RBT): VLC MAC layer frame structure for 5G indoor internet applications. Trans. Emerg. Telecommun. Technol. 30(2) (2019) - [j17]Nouman Ashraf, Muhammad Faizan Ghuman, Waqar Asif, Hassaan Khaliq Qureshi, Adnan Iqbal, Marios Lestas:
Energy management in harvesting enabled sensing nodes: Prediction and control. J. Netw. Comput. Appl. 132: 104-117 (2019) - [j16]Benish Sharfeen Khan, Sobia Jangsher, Hassaan Khaliq Qureshi, Syed Hassan Ahmed:
Predicted mobility based profitable relay selection in cooperative cellular network with mobile relays. Phys. Commun. 37 (2019) - [j15]Nouman Ashraf, Ammar Hasan, Hassaan Khaliq Qureshi, Marios Lestas:
Combined Data Rate and Energy Management in Harvesting Enabled Tactile IoT Sensing Devices. IEEE Trans. Ind. Informatics 15(5): 3006-3015 (2019) - [c25]Zohaib Ahmed, Syed Muhammad Danish, Hassaan Khaliq Qureshi, Marios Lestas:
Protecting IoTs from Mirai Botnet Attacks Using Blockchains. CAMAD 2019: 1-6 - [c24]Benish Sharfeen Khan, Sobia Jangsher, Hassaan Khaliq Qureshi, Shahid Mumtaz:
Energy Efficient Caching in Cooperative Small Cell Network. CCNC 2019: 1-6 - [c23]Syed Muhammad Danish, Marios Lestas, Waqar Asif, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan:
A Lightweight Blockchain Based Two Factor Authentication Mechanism for LoRaWAN Join Procedure. ICC Workshops 2019: 1-6 - [c22]H. Faizan Saeed, Sobia Jangsher, Hassaan Khaliq Qureshi, Moayad Aloqaily, Jalel Ben-Othman:
Backhaul Pairing of Small Cells Using Non-Orthogonal Multiple Access. ISCC 2019: 993-997 - [c21]Shahzeb Ahsan, Syed Ali Hassan, Ahsan Adeel, Hassaan Khaliq Qureshi:
Improving Channel Utilization of LoRaWAN by using Novel Channel Access Mechanism. IWCMC 2019: 1656-1661 - [c20]Abdullah Bin Masood, Marios Lestas, Hassaan Khaliq Qureshi, Nicolas Christofides, Nouman Ashraf, Faizan Mehmood:
Closing the Loop in Cyber-Physical Systems using Blockchain: Microgrid Frequency Control Example. MENACOMM 2019: 1-6 - [c19]Abdullah Bin Masood, Hassaan Khaliq Qureshi, Syed Muhammad Danish, Marios Lestas:
Realizing an Implementation Platform for Closed Loop Cyber-Physical Systems Using Blockchain. VTC Spring 2019: 1-5 - [c18]Madiha Amjad, Hassaan Khaliq Qureshi, Sobia Jangsher:
Optimization of Slot Allocation in Hybrid VLC/RF Networks for Throughput Maximization. Wireless Days 2019: 1-4 - 2018
- [j14]Saira Sattar, Hassaan Khaliq Qureshi, Muhammad Saleem, Shahid Mumtaz, Jonathan Rodriguez:
Reliability and energy-efficiency analysis of safety message broadcast in VANETs. Comput. Commun. 119: 118-126 (2018) - [j13]Syed Fasih Ali Gardazi, Rizwan Ahmad, Hassaan Khaliq Qureshi, Waqas Ahmed:
On achieving throughput optimality with energy prediction-based power allocation in 5G networks. Trans. Emerg. Telecommun. Technol. 29(10) (2018) - [j12]Umber Saleem, Sobia Jangsher, Hassaan Khaliq Qureshi, Syed Ali Hassan:
Joint Subcarrier and Power Allocation in the Energy-Harvesting-Aided D2D Communication. IEEE Trans. Ind. Informatics 14(6): 2608-2617 (2018) - [c17]Syed Muhammad Danish, Hassaan Khaliq Qureshi, Sobia Jangsher:
Jamming Attack Analysis of Wireless Power Transfer on LoRaWAN Join Procedure. GLOBECOM Workshops 2018: 1-6 - [c16]Muhammad Haris, Sobia Jangsher, Hassaan Khaliq Qureshi, Shahid Mumtaz, Anwer Al-Dulaimi:
Power Allocation for Reliable Smart Grid Communication Employing Neighborhood Area Networks. GLOBECOM 2018: 1-6 - [c15]Syed Muhammad Danish, Arfa Nasir, Hassaan Khaliq Qureshi, Ayesha Binte Ashfaq, Shahid Mumtaz, Jonathan Rodriguez:
Network Intrusion Detection System for Jamming Attack in LoRaWAN Join Procedure. ICC 2018: 1-6 - [c14]Syed Muhammad Danish, Hassaan Khaliq Qureshi, Sobia Jangsher, Marios Lestas:
Effects of Wireless Power Transfer on LoRaWAN Join Procedure. IWCMC 2018: 944-949 - [c13]Madiha Amjad, Hassaan Khaliq Qureshi, Marios Lestas, Shahid Mumtaz, Joel J. P. C. Rodrigues:
Energy Prediction Based MAC Layer Optimization for Harvesting Enabled WSNs in Smart Cities. VTC Spring 2018: 1-6 - 2017
- [j11]Muhammad, Hassaan Khaliq Qureshi, Umber Saleem, Muhammad Saleem, Andreas Pitsillides, Marios Lestas:
Harvested Energy Prediction Schemes for Wireless Sensor Networks: Performance Evaluation and Enhancements. Wirel. Commun. Mob. Comput. 2017 (2017) - [c12]Nouman Ashraf, Waqar Asif, Hassaan Khaliq Qureshi, Marios Lestas:
Active energy management for harvesting enabled wireless sensor networks. WONS 2017: 57-60 - 2016
- [j10]Muhammad Zeeshan, Asad Ali, Anjum Naveed, Alex X. Liu, Ann L. Wang, Hassaan Khaliq Qureshi:
Modeling packet loss probability and busy time in multi-hop wireless networks. EURASIP J. Wirel. Commun. Netw. 2016: 168 (2016) - [j9]Waqar Asif, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan, Marios Lestas:
Combined Banzhaf & Diversity Index (CBDI) for critical node detection. J. Netw. Comput. Appl. 64: 76-88 (2016) - [j8]Waqar Asif, Marios Lestas, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan:
Optimization based spectral partitioning for node criticality assessment. J. Netw. Comput. Appl. 75: 279-292 (2016) - [c11]Umber Saleem, Hassaan Khaliq Qureshi, Sobia Jangsher, Muhammad Saleem:
Transmission power management for throughput maximization in harvesting enabled D2D network. ISCC 2016: 1078-1083 - 2015
- [j7]Junaid Ahmed Khan, Hassaan Khaliq Qureshi, Adnan Iqbal:
Energy management in Wireless Sensor Networks: A survey. Comput. Electr. Eng. 41: 159-176 (2015) - [j6]Hassaan Khaliq Qureshi, Adnan Iqbal, Waqar Asif:
Topology Control for Harvesting Enabled Wireless Sensor Networks: A Design Approach. Wirel. Pers. Commun. 82(1): 81-101 (2015) - [c10]Waqar Asif, Marios Lestas, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan:
Spectral partitioning for node criticality. ISCC 2015: 877-882 - [c9]Rehan Qayyum, Adnan Iqbal, Hassaan Khaliq Qureshi:
Performance analysis of data delivery reliability schemes in underwater sensor networks. ISCC 2015: 1020-1025 - [c8]Muhammad Faizan Ghuman, Adnan Iqbal, Hassaan Khaliq Qureshi, Marios Lestas:
ASIM: Solar Energy Availability Model for Wireless Sensor Networks. ENSsys@SenSys 2015: 21-26 - 2014
- [j5]Mahzeb Fiaz, Roomana Yousaf, Maryam Hanfi, Waqar Asif, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan:
Adding the Reliability on Tree Based Topology Construction Algorithms for Wireless Sensor Networks. Wirel. Pers. Commun. 74(2): 989-1004 (2014) - [c7]Waqar Asif, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan, Marios Lestas:
CBDI: Combined Banzhaf & diversity index for finding critical nodes. GLOBECOM 2014: 758-763 - [c6]Saeed Ullah, Imdad Ullah, Hassaan Khaliq Qureshi, Rim Haw, Sungman Jang, Choong Seon Hong:
Passive packet loss detection in Wi-Fi networks and its effect on HTTP traffic characteristics. ICOIN 2014: 428-432 - [c5]Junaid Ahmed Khan, Hassaan Khaliq Qureshi, Adnan Iqbal:
TRW: An energy storage capacity model for energy harvesting sensors in wireless sensor networks. PIMRC 2014: 1931-1936 - 2013
- [j4]Hassaan Khaliq Qureshi, Sajjad Rizvi, Muhammad Saleem, Syed Ali Khayam, Veselin Rakocevic, Muttukrishnan Rajarajan:
Evaluation and improvement of CDS-based topology control for wireless sensor networks. Wirel. Networks 19(1): 31-46 (2013) - [c4]Waqar Asif, Hassaan Khaliq Qureshi, Muttukrishnan Rajarajan:
Variable rate adaptive modulation (VRAM) for introducing small-world model into WSNs. CISS 2013: 1-6 - [c3]Ahsan Nawaz Khan, Junaid Khalid, Hassaan Khaliq Qureshi:
Performance Analysis of Contention-Based Random Access Procedure in Clustered LTE Networks. NGMAST 2013: 203-209 - [c2]M. Saqib Inayat, Ijlal Delawer, Muhammad Junaid, Muhammad U. Ilyas, Hassaan Khaliq Qureshi, Zawar Shah:
Evaluating Spectrum Occupancy in Islamabad Using Long-Range Ultra-Wideband Spectrum Sensors. VTC Fall 2013: 1-6 - 2012
- [j3]Sajjad Rizvi, Hassaan Khaliq Qureshi, Syed Ali Khayam, Veselin Rakocevic, Muttukrishnan Rajarajan:
A1: An energy efficient topology control algorithm for connected area coverage in wireless sensor networks. J. Netw. Comput. Appl. 35(2): 597-605 (2012) - 2011
- [j2]Hassaan Khaliq Qureshi, Sajjad Rizvi, Muhammad Saleem, Syed Ali Khayam, Veselin Rakocevic, Muttukrishnan Rajarajan:
Poly: A reliable and energy efficient topology control protocol for wireless sensor networks. Comput. Commun. 34(10): 1235-1242 (2011) - [j1]Hassaan Khaliq Qureshi, Junaid Jameel Ahmad, Syed Ali Khayam, Veselin Rakocevic, Muttukrishnan Rajarajan:
Graph-Theoretic Complexity Reduction for Markovian Wireless Channel Models. Wirel. Pers. Commun. 58(4): 831-849 (2011) - 2010
- [c1]Hassaan Khaliq Qureshi, Sajjad Rizvi, Muhammad Saleem, Syed Ali Khayam, Muttukrishnan Rajarajan, Veselin Rakocevic:
An energy efficient Clique-based CDS discovery protocol for wireless sensor networks. CISS 2010: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint