default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
- Irfan Ahmed — disambiguation page
- Irfan Ahmed 0001
University of New Orleans, New Orleans, LA, USA - Irfan Ahmed 0002
Higher Colleges of Technology, Ruwais, UAE - Irfan Ahmed 0003
NED University of Engineering and Technology, Karachi, Pakistan - Irfan Ahmed 0004
University of Engineering and Technology, Peshawar, Pakistan - show all
Likely matches
- Ahmed Irfan
SRI International, Menlo Park, USA
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 298 matches
- 2025
- Ahmed Al Amin, Irfan Azam, Md. Masuduzzaman
, Abdullah Qayyum
, Muhammad Sajid Sarwar
, Saud Khan
, Soo Young Shin
:
Gravitational Search Algorithm Swarm-Based UAV Reconnaissance for Multiple Targets Detection in Unknown Environment. IEEE Access 13: 36897-36908 (2025) - Nesren Farhah, Muhammad Adnan, Ahmed Abdullah Alqarni, Muhammad Irfan Uddin, Theyazn H. H. Aldhyani:
AI-Driven Innovation Using Multimodal and Personalized Adaptive Education for Students With Special Needs. IEEE Access 13: 69790-69820 (2025) - Mian Muhammad Kamal
, Syed Zain Ul Abideen
, Mahmoud Ahmad Al-Khasawneh, Amerah A. Alabrah
, Raja Sohail Ahmed Larik, Muhammad Irfan Marwat:
Optimizing Secure Multi-User ISAC Systems With STAR-RIS: A Deep Reinforcement Learning Approach for 6G Networks. IEEE Access 13: 31472-31484 (2025) - Nilarun Mukherjee, Souvik Sengupta
, Mohammad Nadeem Ahmed
, Syed Irfan Yaqoob
, Mohammad Rashid Hussain
, Abu Taha Zamani
:
Bi-Directional Hybrid Attention Feature Pyramid Network for Detecting Diabetic Macular Edema in Retinal Fundus Images. IEEE Access 13: 38726-38744 (2025) - Mueen Uddin
, Muhammad Saad Irshad, Irfan Ali Kandhro, Fuhid Alanazi, Fahad Ahmed, Muhammad Maaz, Saddam Hussain, Syed Sajid Ullah:
Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations. Artif. Intell. Rev. 58(8): 236 (2025) - Rabia Pannu, Muhammad Zubair, Muhammad Owais, Shoaib Hassan, Muhammad Umair, Syed Muhammad Usman, Mousa Ahmed Albashrawi, Irfan Hussain:
Enhanced glaucoma classification through advanced segmentation by integrating cup-to-disc ratio and neuro-retinal rim features. Comput. Medical Imaging Graph. 123: 102559 (2025) - Usman Ali, Irfan Ali Kandhro, Raja Sohail Ahmed Larik, Abdullah Ayub Khan, Muhammad Huzaifa Shahbaz, Muhammad Osama:
The future of third web: a role of blockchain and Web 3.0. Int. J. Electron. Secur. Digit. Forensics 17(3): 391-403 (2025) - Irfan Ali Kandhro, Ali Orangzeb Panhwar, Shafique Ahmed Awan, Raja Sohail Ahmed Larik, Abdul Ahad Abro:
Network security attack classification: leveraging machine learning methods for enhanced detection and defence. Int. J. Electron. Secur. Digit. Forensics 17(1/2): 138-148 (2025) - Songzuo Liu, Irfan Ullah, Muhammad Muzzammil, Niaz Ahmed, Abdul Wahid, Shao Zhen:
Empowering Internet of Underwater Things: An Integrated Simulator for Underwater Magneto-Coupled Wireless Sensor Networks. IEEE Internet Things Mag. 8(1): 109-114 (2025) - Nadeem Yaqub, Jianbiao Zhang, Muhammad Irfan Khalid, Weiru Wang, Markus Helfert, Mansoor Ahmed
, Jungsuk Kim:
Blockchain enabled policy-based access control mechanism to restrict unauthorized access to electronic health records. PeerJ Comput. Sci. 11: e2647 (2025) - Muhammad Haris Rais, Muhammad Ahsan, Irfan Ahmed:
Sabotaging Material Extrusion-Based 3D Printed Parts through Low-Magnitude Kinetic Manipulation Attacks. ACM Trans. Cyber Phys. Syst. 9(1): 5:1-5:26 (2025) - Tahniyat Aslam
, Irfan Ahmed, Sundus Ali:
Analysis of user association in multi-tier, multi-band heterogeneous cellular networks. Telecommun. Syst. 88(1): 8 (2025) - Fahim Ahmed Irfan, Christina Behl, Razib Iqbal:
Verbal Abuse Detection from Short Conversations. CCNC 2025: 1-2 - Syed Ali Qasim
, Taqi Raza
, Irfan Ahmed
:
PLCpot: Application Dialogue Replay based Scalable PLC Honeypot for Industrial Control Systems. ICCPS 2025: 23:1-23:11 - Irfan Ahmed, Muhammad Ateeb:
Enhancing Education Accessibility through Eye Gaze Technology (EGT). IMCOM 2025: 1-8 - Enrico Lipparini
, Thomas Hader, Ahmed Irfan, Stéphane Graham-Lengrand:
Boosting MCSat Modulo Nonlinear Integer Arithmetic via Local Search. CoRR abs/2503.01627 (2025) - 2024
- Irfan Ahmed
, Mohammed Alkahtani
, Qazi Salman Khalid
, Fahad M. Alqahtani
:
Improved Commodity Supply Chain Performance Through AI and Computer Vision Techniques. IEEE Access 12: 24116-24132 (2024) - Rizwan Ahmed
, Rahisham Abd-Rahman
, Zahid Ullah
, Rahmat Ullah
, Irfan Sami
, Mohd Fairouz Mohd Yousof
:
The Insulation Performance of Novel Refrigerant Gas as an Alternative to SF₆ for Medium Voltage Switchgear. IEEE Access 12: 47068-47079 (2024) - Irfan Ahmed
, Lunchakorn Wuttisittikulkij
, Aftab Khan, Abid Iqbal:
The Optimally Designed Deep Autoencoder-Based Compressive Sensing Framework for 1D and 2D Signals. IEEE Access 12: 150520-150539 (2024) - Saleh Almasabi
, Zohaib Mushtaq, Nabeel Ahmed Khan
, Muhammad Irfan
:
Improving FDI Detection for PMU State Estimation Using Adversarial Interventions and Deep Auto-Encoder. IEEE Access 12: 116398-116414 (2024) - Samar M. Alqhtani
, Toufique Ahmed Soomro
, Ahmed Ali Shah
, Abdul Aziz Memon
, Muhammad Irfan
, Saifur Rahman
, Mohammed Jalalah, Abdulkarem Hussein Mohammed Almawgani
, Ladon Ahmed Bade Eljak
:
Improved Brain Tumor Segmentation and Classification in Brain MRI With FCM-SVM: A Diagnostic Approach. IEEE Access 12: 61312-61335 (2024) - Abdullah A. Asiri
, Toufique Ahmed Soomro
, Ahmed Ali Shah
, Ganna Pogrebna
, Muhammad Irfan
, Saeed Alqahtani
:
Optimized Brain Tumor Detection: A Dual-Module Approach for MRI Image Enhancement and Tumor Classification. IEEE Access 12: 42868-42887 (2024) - Mhamad Bakro
, Rakesh Ranjan Kumar, Mohammad Husain, Zubair Ashraf
, Arshad Ali
, Syed Irfan Yaqoob
, Mohammad Nadeem Ahmed
, Nikhat Parveen:
Building a Cloud-IDS by Hybrid Bio-Inspired Feature Selection Algorithms Along With Random Forest Model. IEEE Access 12: 8846-8874 (2024) - Mimonah Al Qathrady, Ahmad Shaf
, Tariq Ali
, Umar Farooq, Aqib Rehman, Samar M. Alqhtani
, Mohammed S. Alshehri
, Sultan Almakdi
, Muhammad Irfan
, Saifur Rahman
, Ladon Ahmed Bade Eljak
:
A Novel Web Framework for Cervical Cancer Detection System: A Machine Learning Breakthrough. IEEE Access 12: 41542-41556 (2024) - Umar Muhammad Modibbo
, Srikant Gupta, Aquil Ahmed, Irfan Ali
:
An integrated multi-objective multi-product inventory managed production planning problem under uncertain environment. Ann. Oper. Res. 339(3): 1679-1723 (2024) - Hala S. Ali
, Irfan Ahmed
:
LAAKA: Lightweight Anonymous Authentication and Key Agreement Scheme for Secure Fog-Driven IoT Systems. Comput. Secur. 140: 103770 (2024) - Haroon Mahmood
, Maliha Arshad, Irfan Ahmed
, Sana Fatima, Hafeez Ur Rehman:
Comparative study of IoT forensic frameworks. Forensic Sci. Int. Digit. Investig. 49: 301748 (2024) - Waseem Akram
, Taimur Hassan, Hamed Toubar, Muhayyuddin Ahmed, Nikola Miskovic, Lakmal D. Seneviratne, Irfan Hussain
:
Aquaculture defects recognition via multi-scale semantic segmentation. Expert Syst. Appl. 237(Part A): 121197 (2024) - Asif Ali, Asif Ali Laghari, Irfan Ahmed Kandhro, Kamlesh Kumar, Salman Younus:
Systematic analysis of on-premise and cloud services. Int. J. Cloud Comput. 13(3): 214-242 (2024) - Raja Sohail Ahmed Larik, Yongli Wang, Irfan Ali Kandhro, Nabila Sehito
, Ghulam Ali Mallah, Fayyaz Ali:
Trilinear pairing-based cryptosystem authentication: for electronic health record security in healthcare system. Int. J. Inf. Comput. Secur. 23(2): 139-162 (2024)
skipping 268 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-06-24 21:19 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint