default search action
Mohammad S. Khan
Person information
- affiliation: East Tennessee State University, Johnson City, TN, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Amitkumar Vidyakant Jha, Bhargav Appasani, Mohammad S. Khan, Sherali Zeadally, Iyad A. Katib:
6G for intelligent transportation systems: standards, technologies, and challenges. Telecommun. Syst. 86(2): 241-268 (2024) - [j30]Amitkumar Vidyakant Jha, Bhargav Appasani, Mohammad S. Khan, Houbing Herbert Song:
A Novel Clustering Protocol for Network Lifetime Maximization in Underwater Wireless Sensor Networks. IEEE Trans. Green Commun. Netw. 8(4): 1371-1384 (2024) - [c27]Gideon Adele, Abinash Borah, Anirudh Paranjothi, Mohammad S. Khan, Vladimir K. Poulkov:
A Comprehensive Systematic Review of Blockchain-based Intrusion Detection Systems. AIIoT 2024: 605-611 - [c26]Chandler Scott, Mohammad S. Khan, Anirudh Paranjothi, Joshua Qiang Li:
Decentralized Cluster Head Selection in IoV using Federated Deep Reinforcement Learning. CCNC 2024: 1-7 - [c25]Gideon Adele, Abinash Borah, Anirudh Paranjothi, Mohammad S. Khan:
A Survey and Comparative Analysis of Methods for Countering Sybil Attacks in VANETs. CCWC 2024: 178-183 - [c24]Chandler Scott, Mohammad S. Khan, Anirudh Paranjothi, Joshua Qiang Li:
Enabling Rural IoV Communication through Decentralized Clustering and Federated Learning. CCWC 2024: 228-234 - [c23]Chandler Scott, Mohammad S. Khan, Biju Bajracharya, Anirudh Paranjothi:
Trust-Based Security for Decentralized Clustering in IoV. SmartNets 2024: 1-4 - [c22]Volodymyr Voloshyn, Mohammad S. Khan, Gautam Srivastava, Darshan M:
Analysis of NIST Lightweight Cryptographic Algorithms Performance in IoT Security Environments based on MQTT. WCNC 2024: 1-6 - 2023
- [j29]Mahammad Shareef Mekala, Rizwan Patan, Mohammad S. Khan:
Computational Intelligent Sensor-Rank Consolidation Approach for Industrial Internet of Things (IIoT). IEEE Internet Things J. 10(3): 2121-2130 (2023) - [j28]S. Pradeepa, K. R. Manjula, S. Vimal, Mohammad S. Khan, Naveen Chilamkurti, Ashish Kr. Luhach:
DRFS: Detecting Risk Factor of Stroke Disease from Social Media Using Machine Learning Techniques. Neural Process. Lett. 55(4): 3843-3861 (2023) - [c21]Christian Clay, Mohammad S. Khan, Biju Bajracharya:
A Look into the Vulnerabilities of Automatic Dependent Surveillance-Broadcast. CCWC 2023: 933-938 - [c20]Edgar Wallace Bowlin, Mohammad S. Khan, Biju Bajracharya:
A Blockchain Application on Bootstrapping Mobile Nodes within VANET. CCWC 2023: 1011-1016 - [c19]Edgar Wallace Bowlin, Mohammad S. Khan, Biju Bajracharya:
Reducing Bootstrap Overhead within VANET Blockchain Applications through Pruning. SmartNets 2023: 1-6 - [c18]Samuel A. Ige, Mohammad S. Khan, Biju Bajracharya:
Enhancing EV Charging Capabilities Using Haversine and Convex Optimization for ITS. VCC 2023: 165-170 - [c17]Anirudh Paranjothi, Mohammad S. Khan:
Enhancing Security in VANETs with Sybil Attack Detection using Fog Computing. VTC Fall 2023: 1-6 - 2022
- [j27]Mir Wajahat Hussain, Mohammad S. Khan, K. Hemant Kumar Reddy, Diptendu Sinha Roy:
Extended indirect controller-legacy switch forwarding for link discovery in hybrid multi-controller SDN. Comput. Commun. 189: 148-157 (2022) - [c16]Sagnik Banerjee, Mohammad S. Khan, Snehasish Basu, Purba Dutta, Bharati Sanjay Ainapure, Bhargav Appasani:
Terahertz Metamaterial Absorber for Biomedical Sensing and EMI/EMC Applications Using Concentric Resonators. BlackSeaCom 2022: 226-231 - [c15]Adedayo Aribisala, Mohammad S. Khan, Ghaith Husari:
Feed-Forward Intrusion Detection and Classification on a Smart Grid Network. CCWC 2022: 99-105 - [c14]Rizwan Patan, Reza M. Parizi, Seyedamin Pouriyeh, Mohammad S. Khan, Amir H. Gandomi:
A Secured Certificateless Sign-encrypted Blockchain Communication for Intelligent Transport System. CNS 2022: 1-7 - [c13]Pritha Mukherjee, Mohammad S. Khan, Shruti, Sasmita Pahadsingh, Bhargav Appasani:
Terahertz Refractive Index Sensing using Metamaterial Absorber. WF-IoT 2022: 1-5 - 2021
- [j26]Pritam Khan, Yasin Khan, Sudhir Kumar, Mohammad S. Khan, Amir H. Gandomi:
HVD-LSTM based recognition of epileptic seizures and normal human activity. Comput. Biol. Medicine 136: 104684 (2021) - [j25]Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, Mohammad S. Khan:
A kangaroo-based intrusion detection system on software-defined networks. Comput. Networks 184: 107688 (2021) - [j24]Keming Mao, Gautam Srivastava, Reza M. Parizi, Mohammad S. Khan:
Multi-source fusion for weak target images in the Industrial Internet of Things. Comput. Commun. 173: 150-159 (2021) - [j23]Premkumar Chithaluru, Mohammad S. Khan, Manoj Kumar, Thompson Stephan:
ETH-LEACH: An energy enhanced threshold routing protocol for WSNs. Int. J. Commun. Syst. 34(12) (2021) - [j22]Jimmy Ming-Tai Wu, Gautam Srivastava, Jerry Chun-Wei Lin, Youcef Djenouri, Min Wei, Reza M. Parizi, Mohammad S. Khan:
Mining of High-Utility Patterns in Big IoT-based Databases. Mob. Networks Appl. 26(1): 216-233 (2021) - [j21]Adarsh Kumar, Rajalakshmi Krishnamurthi, Anand Nayyar, Ashish Kumar Luhach, Mohammad S. Khan, Anuraj Singh:
A novel Software-Defined Drone Network (SDDN)-based collision avoidance strategies for on-road traffic monitoring and management. Veh. Commun. 28: 100313 (2021) - [c12]Edgar Wallace Bowlin, Mohammad S. Khan:
On Utilizing Prune-able Blockchains for Secure Message Dissemination in VANETs. WF-IoT 2021: 295-300 - [i10]Anirudh Paranjothi, Mohammed Atiquzzaman, Mohammad S. Khan:
F-RouND: Fog-based Rogue Nodes Detection in Vehicular Ad hoc Networks. CoRR abs/2102.00839 (2021) - 2020
- [j20]Anirudh Paranjothi, Mohammad S. Khan, Sherali Zeadally:
A survey on congestion detection and control in connected vehicles. Ad Hoc Networks 108: 102277 (2020) - [j19]Anirudh Paranjothi, Mohammad S. Khan, Rizwan Patan, Reza M. Parizi, Mohammed Atiquzzaman:
VANETomo: A congestion identification and control scheme in connected vehicles using network tomography. Comput. Commun. 151: 275-289 (2020) - [j18]Praveen Kumar Reddy Maddikunta, Thippa Reddy Gadekallu, Rajesh Kaluri, Gautam Srivastava, Reza M. Parizi, Mohammad S. Khan:
Green communication in IoT networks using a hybrid optimization algorithm. Comput. Commun. 159: 97-107 (2020) - [j17]Rajasoundaran Soundararajan, Narayanasamy Palanisamy, Rizwan Patan, Gayathri Nagasubramanian, Mohammed S. Khan:
Secure and concealed watchdog selection scheme using masked distributed selection approach in wireless sensor networks. IET Commun. 14(6): 948-955 (2020) - [j16]Trupti Mayee Behera, Sushanta Kumar Mohapatra, Umesh Chandra Samal, Mohammad S. Khan, Mahmoud Daneshmand, Amir H. Gandomi:
I-SEP: An Improved Routing Protocol for Heterogeneous WSN for IoT-Based Environmental Monitoring. IEEE Internet Things J. 7(1): 710-717 (2020) - [j15]Anirudh Paranjothi, Mohammed Atiquzzaman, Mohammad S. Khan:
PMCD: Platoon - Merging approach for cooperative driving. Internet Technol. Lett. 3(1) (2020) - [j14]David A. Schmidt, Mohammad S. Khan, Brian T. Bennett:
Spline-based intrusion detection for VANET utilizing knot flow classification. Internet Technol. Lett. 3(3) (2020) - [j13]Richa Sharma, Sudha Morwal, Basant Agarwal, Ramesh Chandra, Mohammad S. Khan:
A deep neural network-based model for named entity recognition for Hindi language. Neural Comput. Appl. 32(20): 16191-16203 (2020) - [j12]Shanmuganathan Vimal, Yesudhas Harold Robinson, Mohammad S. Khan, Manju Khari, Amir H. Gandomi:
R-CNN and wavelet feature extraction for hand gesture recognition with EMG signals. Neural Comput. Appl. 32(21): 16723-16736 (2020) - [c11]Anirudh Paranjothi, Mohammed Atiquzzaman, Mohammad S. Khan:
F-RouND: Fog-based Rogue Nodes Detection in Vehicular Ad hoc Networks. GLOBECOM 2020: 1-6 - [i9]Anirudh Paranjothi, Mohammad S. Khan, Sherali Zeadally:
Survey on Congestion Detection and Control in Connected Vehicles. CoRR abs/2007.14896 (2020) - [i8]Anirudh Paranjothi, Mohammed Atiquzzaman, Mohammad S. Khan:
Message Dissemination in Connected Vehicles. CoRR abs/2009.01634 (2020)
2010 – 2019
- 2019
- [j11]Thangamuthu Poongodi, Mohammed S. Khan, Rizwan Patan, Amir H. Gandomi, Balamurugan Balusamy:
Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks. IEEE Access 7: 18409-18419 (2019) - [j10]Kaushik Sekaran, Mohammed S. Khan, Rizwan Patan, Amir H. Gandomi, Parimala Venkata Krishna, Suresh Kallam:
Improving the Response Time of M-Learning and Cloud Computing Environments Using a Dominant Firefly Approach. IEEE Access 7: 30203-30212 (2019) - [j9]Wael Alenazy, Waleed Mugahed Al-Rahmi, Mohammad S. Khan:
Validation of TAM Model on Social Media Use for Collaborative Learning to Enhance Collaborative Authoring. IEEE Access 7: 71550-71562 (2019) - [j8]Anirudh Paranjothi, Urcun Tanik, Yuehua Wang, Mohammad S. Khan:
Hybrid-Vehfog: A robust approach for reliable dissemination of critical messages in connected vehicles. Trans. Emerg. Telecommun. Technol. 30(6) (2019) - [j7]Achyut Shankar, Natarajan Jaisankar, Mohammed S. Khan, Rizwan Patan, Balamurugan Balusamy:
Hybrid model for security-aware cluster head selection in wireless sensor networks. IET Wirel. Sens. Syst. 9(2): 68-76 (2019) - [j6]Trupti Mayee Behera, Sushanta Kumar Mohapatra, Umesh Chandra Samal, Mohammad S. Khan:
Hybrid heterogeneous routing scheme for improved network performance in WSNs for animal tracking. Internet Things 6 (2019) - [j5]Anirudh Paranjothi, Mohammad S. Khan, Sherali Zeadally, Ajinkya Pawar, David Hicks:
GSTR: Secure multi-hop message dissemination in connected vehicles using social trust model. Internet Things 7 (2019) - [j4]Trupti Mayee Behera, Sushanta Kumar Mohapatra, Umesh Chandra Samal, Mohammad S. Khan, Mahmoud Daneshmand, Amir H. Gandomi:
Residual Energy-Based Cluster-Head Selection in WSNs for IoT Application. IEEE Internet Things J. 6(3): 5132-5139 (2019) - [j3]Vijayakumar Singanamalla, Rizwan Patan, Mohammed S. Khan, Suresh Kallam:
Reliable and energy-efficient emergency transmission in wireless sensor networks. Internet Technol. Lett. 2(2) (2019) - [c10]Trupti Mayee Behera, Mohammad S. Khan, Sushanta Kumar Mohapatra, Umesh Chandra Samal, Md. Zakirul Alam Bhuiyan:
Energy-Efficient Routing for Greenhouse Monitoring Using Heterogeneous Sensor Networks. iThings/GreenCom/CPSCom/SmartData 2019: 953-958 - [i7]Trupti Mayee Behera, Sushanta Kumar Mohapatra, Umesh Chandra Samal, Mohammed S. Khan, Mahmoud Daneshmand, Amir H. Gandomi:
Residual Energy Based Cluster-head Selection in WSNs for IoT Application. CoRR abs/1902.01445 (2019) - [i6]Anirudh Paranjothi, Urcun Tanik, Yuehua Wang, Mohammad S. Khan:
Hybrid-Vehfog: A Robust Approach for Reliable Dissemination of Critical Messages in Connected Vehicles. CoRR abs/1902.08626 (2019) - [i5]Trupti Mayee Behera, Sushanta Kumar Mohapatra, Umesh Chandra Samal, Mohammad S. Khan:
Hybrid Heterogeneous Routing Scheme for Improved Network Performance in WSNs for Animal Tracking. CoRR abs/1903.03146 (2019) - [i4]David A. Schmidt, Mohammad S. Khan, Brian T. Bennett:
Spline Based Intrusion Detection in Vehicular Ad Hoc Networks (VANET). CoRR abs/1903.08018 (2019) - [i3]Anirudh Paranjothi, Mohammad S. Khan, Sherali Zeadally, Ajinkya Pawar, David Hicks:
GSTR: Secure Multi-hop Message Dissemination in Connected Vehicles using Social Trust Model. CoRR abs/1906.04219 (2019) - 2018
- [c9]Anirudh Paranjothi, Mohammad S. Khan, Mohammed Atiquzzaman:
Hybrid-Vehcloud: An Obstacle Shadowing Approach for VANETs in Urban Environment. VTC Fall 2018: 1-5 - [c8]Anirudh Paranjothi, Mohammad S. Khan, Mohammed Atiquzzaman:
DFCV: A Novel Approach for Message Dissemination in Connected Vehicles Using Dynamic Fog. WWIC 2018: 311-322 - [i2]Anirudh Paranjothi, Mohammad S. Khan, Mohammed Atiquzzaman:
DFCV: A Novel Approach for Message Dissemination in Connected Vehicles using Dynamic Fog. CoRR abs/1805.07662 (2018) - [i1]Anirudh Paranjothi, Mohammad S. Khan, Mohammed Atiquzzaman:
Hybrid-Vehcloud: An Obstacle Shadowing Approach for VANETs in Urban Environment. CoRR abs/1807.03362 (2018) - 2017
- [j2]Satya S. Karanki, Mohammad S. Khan:
SMMV: Secure multimedia delivery in vehicles using roadside infrastructure. Veh. Commun. 7: 40-50 (2017) - [c7]Mounika Kasaraneni, Mohammad S. Khan:
NTLV algorithm: Critical path analysis in connected vehicles using network tomography. CCWC 2017: 1-5 - [c6]Rohan N. Pradhan, Mohammad S. Khan, Mais Nijim, Rajab Challoo:
Network delay modeling in Mobile Wireless Mesh Networks using Network Tomography. CCWC 2017: 1-8 - 2016
- [c5]Anirudh Paranjothi, Mohammad S. Khan, Mais Nijim, Rajab Challoo:
MAvanet: Message authentication in VANET using social networks. UEMCON 2016: 1-8 - 2015
- [j1]Mohammad S. Khan, Anup Kumar, Bin Xie, Prasanna K. Sahoo:
Network tomography application in mobile ad-hoc network using stitching algorithm. J. Netw. Comput. Appl. 56: 77-87 (2015) - [c4]Mohammad S. Khan, Anup Kumar, Bin Xie:
An Inverse Problem in Wireless Mesh Network. CyberC 2015: 542-545
1990 – 1999
- 1995
- [c3]Mohammad S. Khan, Earl E. Swartzlander Jr.:
Rapid prototyping fault-tolerant heterogeneous digital signal processing systems. RSP 1995: 187-193 - 1994
- [c2]Mohammad S. Khan, Earl E. Swartzlander Jr.:
A Standardized Interface Control Unit for Heterogeneous Digital Signal Processors. ISCAS 1994: 97-100 - 1993
- [c1]Mohammad S. Khan, Earl E. Swartzlander Jr.:
Design and implementation of an interface control unit for rapid prototyping. RSP 1993: 141-148
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint