Faculty of Engineering Sciences & Technology
Research Profile
2020
- Muhammad Asghar Khan and Insaf Ullah. An Efficient and Provably Secure Certificateless Blind Signature Scheme for Flying Ad-hoc Network Based on Multi-Access Edge Computing. Electronics 2020:(JCR IF: 2.412)
- Insaf Ullah, Noor-Ul-Amin, Muhammad Naem, and Hizbullah Khattak. 2019. A Novel Provable Secured Signcryption Scheme (𝒫𝒮𝒮𝒮): An Hyper Elliptic Curve Based Approach. Mathematics 2020, 7, 686:(JCR IF: 1.7)
- Muhammad Asghar Khan, Insaf Ullah. “An Efficient and Provably Secure Certificateless Key-Encapsulated Signcryption Scheme for Flying Ad-hoc Network,” in IEEE Access, vol. 8, pp. 36807-36828, 2020, doi: 10.1109/ACCESS.2020.2974381. :(JCR IF: 3.745)
- Hussain, Insaf Ullah and Muhammad Asghar Khan . “A Lightweight and Formally Secure Certificate Based Signcryption With Proxy Re-Encryption (CBSRE) for Internet of Things Enabled Smart Grid,” in IEEE Access, vol. 8, pp. 93230-93248, 2020:(JCR IF: 3.745)
- S. Sajid, Insaf Ullah and Muhammad Asghar Khan . “A Lightweight Identity-Based Signature Scheme for Mitigation of Content Poisoning Attack in Named Data Networking With Internet of Things,” in IEEE Access, vol. 8, pp. 98910-98928, 2020, doi: 10.1109/ACCESS.2020.2995080:(JCR IF: 3.745)
- Muhammad Asghar Khan and Insaf Ullah. An Efficient and Provably Secure Identity-based Generalized Signcryption Scheme for Flying Ad-hoc Networks with Multi-access Edge Computing Facility. Mobile Information Systems.2020:(JCR IF: 1.508)
- Zahid Ullah, Insaf Ullah. Certificateless Proxy Re-Encryption Scheme (CPRES) Based on Hyper Elliptic Curve for Access Control in Content Centric Network (CCN). Mobile Information Systems.2020:(JCR IF: 1.508)
- Insaf Ullah; Muhammad Asghar Khan. An Efficient and Provable Secure Certificate-Based Combined Signature, Encryption and Signcryption Scheme for Internet of Things (IoT) Based Mobile Health (M-Health) System. Accepted, Journal of Medical Systems(Springer).2020:(JCR IF: 17)
- Insaf Ullah; Muhammad Asghar Khan. A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT). Accepted, Journal of Information Security and Applications (Elswhere).2020:(JCR IF: 2.327)
- Manazara Rehman, Insaf Ullah. A Lightweight Nature Heterogeneous Generalized Signcryption (HGSC) Scheme for Named Data Networking Enabled Internet of Things. Accepted, Wireless Communications and Mobile Computing.2020:(JCR IF: 819)
- Insaf Ullah and Noor Ul Amin. A Lightweight and Provable Secure Proxy Signcryption Scheme for Resource Constraint Environment. Accepted, Transactions on Emerging Telecommunications Technologies, 2020:(JCR IF: 594)
- Hasan Raza, Ghalib Hussain & Noor M. Khan, Low Communication Parallel Distributed Adaptive Signal Processing (LC-PDASP) Architecture for Processing-Inefficient Platforms, Turkish Journal of Electrical Engineering and Computer Sciences, September 2020 (Accepted) :(JCR IF: 682 )
- Insaf Ullah; Muhammad Asghar Khan. A Lightweight and Secured Certificate Based Proxy Signcryption (CB-PS) Scheme for E-Prescription Systems. IEEE Access, Accepted 2020:(JCR IF: 745)
- Insaf Ullah; Muhammad Asghar Khan. An Anonymous Certificateless Signcryption Scheme for Secure and Efficient Deployment of Internet of Vehicles. Computers, Materials & Continua. Accepted 2020:(JCR IF: 4.89)
- Insaf Ullah; Muhammad Asghar Khan. An efficient Certificate-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things. Computers, Materials & Continua. Accepted 2020:(JCR IF:4.89 )
- Insaf Ullah; Muhammad Asghar Khan. An Efficient and Secure Multi-message and Multi-receiver Signcryption Scheme for Edge Enabled Internet of Vehicles, IEEE Internet of Things, To Appears (on miner revision) :(JCR IF:9.515 )
- Muhammad Asghar Khan and Insaf Ullah. An Efficient and Secure Certificate-Based Access Control and Key Agreement Scheme for Flying Ad hoc Networks. IEEE Transactions on Vehicular Technology. To Appears (on miner revision) :(JCR IF: 379)
- Insaf Ullah; Muhammad Asghar Khan. Lightweight and Provable Secure Cross-Domain Access Control Scheme for Internet of Things (IoT) based Wireless Body Area Networks (WBAN). Microprocessors and Microsystems. Accepted 2020:(JCR IF: 1.15)
- Muhammad Asghar Khan and Insaf Ullah. A Review on Communications Perspective of Flying 3 Ad-Hoc Networks: Key Enabling Wireless 4 Technologies, Applications, Challenges and Open 5 Research Topics. Drones, Accepted 2020. :( Indexed)
- Muhammad Asghar Khan and Insaf Ullah. An Online-Offline Certificateless Signature Scheme for Internet of Health Things. IEEE Access To Appears (on miner revision). 2020:(JCR IF: 745)
- Insaf Ullah; Muhammad Asghar Khan .A Formally Secure Certificateless Signature for Industrial 3 Internet of Things Network with Low Complexity. Complexity To Appears (on miner revision). 2020:(JCR IF: 2.45)
2019
- Asghar Khan; Qureshi, I.M. Low-cost, Rapid and Energy-efficient Hybrid Wireless Technology for Future Deployment of Flying-Ad-hoc Networks. Drones 2019,3(1),16
- Insaf Ullah, Noor-Ul-Amin, Muhammad Naem, and Hizbullah Khattak. 2019. A Novel Provable Secured Signcryption Scheme(𝒫𝒮𝒮𝒮): An Hyper Elliptic Curve Based Approach. Mathematics 2019, 7, 686
- Insafullah et al. A Lightweight and Provable Secure Proxy Signcryption Scheme Based on Hyper Elliptic Curve. information technology and control, 2019
- Insaf Ullah, Noor-Ul-Amin. A Light Weight and Provable Secured Certificate-Less Signcryption Approach for Crowdsourced IIOT Applications. Symetry. 2019
- Hasan Raza and Noor M. Khan. Tracking Performance of Robust RLS algorithm for MIMO Channel Estimation, Wireless Personal Communications, Springer, pp. 1-15, 2019.
- Musharif ahmed, ijaz mansoor qureshi, muhammad aamer saleem, muhammad zubair, saad zafar, “Between Host HIV model: stability analysis and solution using memetic computing”, July 2019, Turkish Journal of Electrical Engineering and Computer Sciences 27(4):2769-2783 DOI: 10.3906/elk-1812-57
- Insafullah, Asghar Khan. An Energy Efficient and Formally Secured Certificate-Based Signcryption for Wireless Body Area Networks with the Internet of Things. Electronics 2019, 8, 1171
- Asghar Khan et al. An Efficient and Provably Secure Certificateless Blind Signature
Scheme for Flying Ad-hoc Network Based on Multi-Access Edge Computing. Electronics 2019 - Asghar Khan; Qureshi, I.M. Low-cost, Rapid and Energy-efficient Hybrid Wireless Technology for Future Deployment of Flying-Ad-hoc Networks. Drones 2019,3(1),16.
- Asghar Khan; Dual-Radio Dual-Band Configuration for Flexible Communication in Flying Ad-hoc Networks (FANET). In International Conference on Communication Technologies (ComTech’2019), MCS, NUST, 2019.
- Insaf Ullah, Noor-Ul-Amin, Muhammad Naem, and Hizbullah Khattak. 2019. A Novel Provable Secured Signcryption Scheme(𝒫𝒮𝒮𝒮): An Hyper Elliptic Curve Based Approach. Mathematics 2019, 7, 686
- A Lightweight and Provable Secure Proxy Signcryption Scheme Based on Hyper Elliptic Curve. information technology and control, 2019
- Insaf Ullah, Noor-Ul-Amin. A Light Weight and Provable Secured Certificate-Less Signcryption Approach for Crowdsourced IIOT Applications. Symetry. 2019
- Muhammad Adnan Khan, Muhammad Umair, Muhammad Aamir Saleem, Ayesha Nasir, and Muhammad Nadeem Ali, “DE Using Improved Opposite based Swarm Optimization for MIMO Systems” Accepted for publication in Jrnl.of Intelligent and Fuzzy Systems. 2019.
2018
- Irshad, Mehreen; Sharif, Muhammad; Yasmin, Mussarat; Khan, Amjad. 2018. A Survey on Left Ventricle Segmentation Techniques in Cardiac Short Axis MRI. Current Medical Imaging Reviews, Volume 14, Number 2, pp. 223-237(15)
- Attique ur Rehman , Hasan Raza, and Israr Akhter,SECURITY ENHANCEMENT OF HILL CIPHER BY USING NON-SQUARE MATRIX APPROACH, 4 International Conference on Knowledge, and Innovations,Engineering , Science and Technology.2018
- Asghar Khan; Khan, I.U.; Safi, A.; Qureshi, I.M. Dynamic Routing in Flying Ad-Hoc Networks Using Topology-Based Routing Protocols. Drones 2018, 2, 27.
- Khan, I.U, Qureshi, I.M, Khan, M.A. Comparative Analysis and Route Optimization of State-of-the-Art Routing Protocols. EAI Endorsed Transactions on Mobile Networks and Applications, Vol 3, issue 13, March, 2018.
- Asghar Khan; Khan, I.U.; Qureshi, I.M.; Alam, M.K.; Shah, S.B.; Shafiq, M. Deployment of reliable,simple, and cost-effective medium access control protocols for multi-layer flying ad-hoc networks. In Proceedings of the 2nd International Conference on Future Networks and Distributed Systems (ICFNDS ’18), Amman, Jordan, 26–27 June 2018, 49.
- Khan, I.U, Qureshi, I.M, Khan, M.A. Ant Colony based Optimization techniques to mitigate Dynamic Routing Challenges in Packet based Networks. In Proceedings of the 2nd International Conference on Future Networks and Distributed Systems (ICFNDS ’18), Amman, Jordan, 26–27 June 2018.
- Asghar Khan; Khan, I.U.; Qureshi, I. M, Nasim, M. A; Javed, U; khan, M.W. On the Performance analysis of Flying Ad-Hoc Networks using Directional Antenna. In Proceeding of the 5th International Multi-Topic ICT Conference 2018 (IMTIC’18), April 25–27, 2018, Karachi, Pakistan.
- Asghar Khan; Alvi, Bilal; Khan, I.U.; Safi, A. Drones for Good in Smart Cities: A Review. International Conference on Electrical, Electronics, Computers, Communication, Mechanical and Computing (EECCMC). 28th & 29th January 2018, India.
- Insaf Ullah, and Sadaf. 2018. Secure and Light Weight Scheme for Electronic Payment System. (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 9, No. 4.
- Abid ur Rahman,and Insaf Ullah. 2018. A Lightweight Multi-Message and Multi-Receiver Heterogeneous Hybrid Signcryption Scheme based on Hyper Elliptic Curve. (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 9, No. 5.
- Hizbullah Khattak, Noor Ul Amin, Ikram ud Din, Insafullah, Jawaid Iqbal.2018. LeafPopDown: Leaf Popular Down Caching Strategy for Information-Centric Networking. (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 9, No. 2.
- Yasmeen, A., Javaid, N., Rehman, O. U., Iftikhar, H., Malik, M. F., & Muhammad, F. J. (2018, June). Efficient resource provisioning for smart buildings utilizing fog and cloud based environment. In 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)(pp. 811-816). IEEE.
- Yasmeen, A., Javaid, N., Zahoor, S., Iftikhar, H., Shafiq, S., & Khan, Z. A. (2018, March). Optimal Energy Management in Microgrids Using Meta-heuristic Technique. In International Conference on Emerging Internetworking, Data & Web Technologies (pp. 303-314). Springer, Cham.
- Yasmeen, A., Javaid, N., Fatima, I., Nadeem, Z., Khan, A., & Khan, Z. A. (2018, March). A Metaheuristic Scheduling of Home Energy Management System. In International Conference on Emerging Internetworking, Data & Web Technologies (pp. 214-224). Springer, Cham.
- Zahoor, S., Javaid, N., Khalid, A., Yasmeen, A., & Nadeem, Z. (2018, July). Fog Computing Based Energy Management System Model for Smart Buildings. In International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (pp. 719-727). Springer, Cham.
- Zahoor, S., Javaid, N., Zafar, A., Yasmeen, A., & Khan, Z. A. (2018, March). Exploiting Meta-heuristic Technique for Optimal Operation of Microgrid. In International Conference on Emerging Internetworking, Data & Web Technologies (pp. 281-291). Springer, Cham.
- Zahoor, S., Javaid, N., Yasmeen, A., Shafi, I., Khan, A., & Khan, Z. A. (2018, March). Optimized Energy Management Strategy for Home and Office. In International Conference on Emerging Internetworking, Data & Web Technologies (pp. 237-246). Springer, Cham.
- Javaid, N., Mohsin, S. M., Iqbal, A., Yasmeen, A., & Ali, I. (2018, July). A Hybrid Bat-Crow Search Algorithm Based Home Energy Management in Smart Grid. In Conference on Complex, Intelligent, and Software Intensive Systems (pp. 75-88). Springer, Cham.
- Umar Farooq, Waseem Ahmed, Sadia Mazhar, Fog computing and internet of things: Architecture, Aplliartions and challenges. In 3rd Global conference on Wireless and optical Communication,(GCWOC, 2018)
2017
- Latif S, Akraam S, and MAS (2017). Channel assignment using differential evolution algorithm in cognitive radio networks. International Journal of Advanced and Applied Sciences, 4(8): 160-166.
- Shahzad Latif, Suhail Akraam, and Muhammad Aamer Saleem (2017) “Joint Optimization of Interference and Cost in Cognitive Radio Heterogeneous Network Using Fuzzy Logic Powered Ants,” Wireless Communications and Mobile Computing, vol. 2017, Article ID 1075252, 11 pages. doi:10.1155/2017/1075252
- Raza H, Khan NM (2017). Low Complexity Linear Channel Estimation for MIMO Communication Systems. Wireless Personal Communications; 97(4):5031-44.
- Khan NM, Raza H (2017). Processing-Efficient Distributed Adaptive RLS Filtering for Computationally Constrained Platforms. Wireless Communications and Mobile Computing. Volume 2017, Article ID 1248796, 7 pages.
- Ehsan Elahi, Hasan Raza, and Saqib Ali (2017). A new 3D Playfair Secure Cipher Generation Model, International Conference on Emerging Technologies (ICET), 27-28 December, CUST Islamabad.
- Muhammad Adnan Khan, Muhammad Umair, Muhammad Aamir Saleem Choudhryand Muhammad Nadeem Ali (2017). Efficient MUD in OFDMA using Swarm Intelligence, December 30-31, 2017, ICICT IBA Karachi.
- Muhammad Asghar Khan, Ijaz Mansoor Qureshi, Alamgir Safi, Inam Ullah Khan (2017). Flying Ad-Hoc Networks (FANETs): A Review of Communication Architectures, and Routing Protocols, First International Conference on Latest trends in Electrical Engineering and Computing Technologies (INTELLECT) November 15–16, 2017, Karachi, Pakistan.
- InamUllah Khan, IjazMansoor Qureshi, Muhammad Asghar Khan (2017). Comparative Analysis and Route Optimization of State of the Art Routing Protocols, EAI International Conference on Future Intelligent Vehicular Technologies October 17-19, 2017, Islamabad Pakistan.
- Inam Ullah Khan, Professor Dr. Ijaz Mansoor Qureshi Qureshi, Engr. Muhammad Asghar Khanand Phd Scholar Syed Bilal Hussain Shah “Route Optimization & Comparative Analysis To Find An Efficient Routing Protocol” International Journal of Advanced Computer Science and Applications (IJACSA) February 2017 Edition (Volume 8 No 2).
- N.F. Awang Iskandar, A. Khan, P.C. Lim, Y.C. Wang. 2017. Automatic Segmentation Measuring Function for Cardiac MR-Left Ventricle (LV) Images. Journal of Telecommunication, Electronic and Computer Engineering (JTEC) Volume 9,Issue-10,Pages165-171.
- DNF Awang Iskandar, PC Lim, A Said, NH Mohd Amin, A Khan, H Ujir. 2017. Preliminary Experiment Results of Left Ventricular Remodelling Prediction Using Machine Learning Algorithms. Journal of Telecommunication, Electronic and Computer Engineering (JTEC). Volume 9, Issue 2-10,Pages 119-124
- Khan, A., Awang Iskandar, D. N. F., Ujir, H., & Chai, W. Y. (2017). Automatic Segmentation of CMRIs for LV Contour Detection. Lecture Notes in Electrical Engineering, 313–319. doi:10.1007/978-981-10-1721-6_34
- Raza H, Khan N M. 2017. Low Complexity Linear Channel Estimation for MIMO Communication Systems. Wireless Personal Communications. Dec 1;97(4):5031-44.
- Khan N M, Raza H. Processing-Efficient Distributed Adaptive RLS Filtering for Computationally Constrained Platforms. Wireless Communications and Mobile Computing. 2017;2017
- Elahi E, Raza H, Ali S. A new 3D playfair based secure cipher generation model. In2017 13th International Conference on Emerging Technologies (ICET) 2017 Dec 27 (pp. 1-4). IEEE.
- Khan, M.A.; Qureshi, I.M.; Safi, A.; Khan, I.U. Flying Ad-Hoc Networks (FANETs): A Review of Communication architectures, and Routing protocols. In Proceedings of the 2017 First International Conference on Latest Trends in Electrical Engineering and Computing Technologies (INTELLECT), Karachi, Pakistan, 15–16 November 2017; pp. 692–699.
- Khan, I.U, Qureshi, I.M, Khan, M.A. Comparative Analysis and Route Optimization of State-of-the-Art Routing Protocols. EAI International Conference on Future Intelligent Vehicular Technologies October 17–19, 2017, Islamabad, Pakistan.
- Asad Mehmood, Insaf Ullah, Noor-Ul-Amin, Arif Iqbal Umar, sultan Ullah.2017. Public Verifiable Generalized Authenticated Encryption (ℙℙ₢Ǣ) based on Hyper Elliptic Curve. J. Appl. Environ. Biol. Sci., 7(12)69-73.
- Anwar Sadat, Rashid Ahmad, Insaf Ullah, Hizbullah Khattak, Sultan Ullah.2017. Multi-Receiver Signcryption Based on Hyper Elliptic Curve Crypto System. J. Appl. Environ. Biol. Sci., 7(12)194-200.
- Ahmad, M., Khan, A., Nadeem, Z., Yasmeen, A., Fatima, I., Zahoor, S., & Javaid, N. (2017, November). A Hybrid Genetic Based on Harmony Search Method to Schedule Electric Tasks in Smart Home. In International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (pp. 154-166). Springer, Cham.
- Fatima, I., Khalid, A., Zahoor, S., Yasmeen, A., Arif, S., Zafar, U., & Javaid, N. (2017, November). Home Energy Management System Using Ant Colony Optimization Technique in Microgrid. In International Conference on Broadband and Wireless Computing, Communication and Applications (pp. 267-279). Springer, Cham.
- Saeed, M. S., Khalid, A., Nadeem, Z., Younas, M. A., Raza, S. Z., & Javaid, N. (2017, November). Power Management in Smart Grid for Residential Consumers. In International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (pp. 415-423). Springer, Cham
- Khalid, R., Abid, S., Zafar, A., Yasmeen, A., Khan, Z. A., Qasim, U., & Javaid, N. (2017, July). Fuzzy Energy Management Controller for Smart Homes. In International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (pp. 200-207). Springer, Cham.
2016
- Umair, M., Khan, M.A. and Choudhry, M.A.S., 2016. International Journal of Advanced and Applied Sciences.
- Umair, M., Khan, M.A. and Choudry, M.A.S., Latif S,. 2016. Fuzzy Approach based two Layered Block Coded Adaptive MC-CDMA system with FT/ST. Res. J. Recent Sci., 5(3), 50-57
- Khan, M.A., Umair, M., Choudhry, M.A.S. and Muhammad, K., 2016. Cooperative Co-evolutionary based MUD for SLT-MC-CDMA system. International Journal of Computer Science and Information Security, 14(8), p.334.
- Safi, A., Khan, I.U., Hassan, M.A. and Khan, M.A, 2016. Mobile Ad hoc networks in the Global system of Interconnected Computer Networks. IJSEAT, 4(9), pp.434-451.
- Hafeez,S.,Khan, M.A.,ur Rehman,I. and Asif, R.M.,Laser Bounce Listening System.
- Asif, R.M., Aziz, A., ur Rehman, I. and Khan, M.A., Few Decades Survey on Renewable Energy and Smart Grid Approach.
- Khan, M.A. and Asif, R.M., Review of Communication Protocols for FANETs (Flying Ad-Hoc Networks).
- Shah, A., Shahzad, M., Siddiqi, M.W.U. and Khan, M.A., Novel Architecture for Future Li-Fi Wireless Technology.
- U. Khan, W. Y. Chai, C. S. See and A. Khan, 2016″X-Ray Image Enhancement Using a Boundary Division Wiener Filter and Wavelet-Based Image Fusion Approach,” Journal of Information Processing Systems, vol. 12, no. 1, pp. 35~45,. DOI: 10.3745/JIPS.02.0029.
- Hafiz, S; Khan, M.A. Laser Bounce Listening System. 2nd International Conference on Emerging Trends in Engineering, Management and Sciences. December 28-30, 2016 (ICETEMS-2016) Peshawar, Pakistan.
- Raees , M. A; Adnan, A,; Inam. R, Khan, M.A. Few Decades Survey on Renewable Energy and Smart Grid Approach” 2nd International Conference on Emerging Trends in Engineering, Management and Scineces” December 28-30, 2016 (ICETEMS-2016) Peshawar, Pakistan.
- Hizbullah, K & Umar, Arif & , Insafullah. (2016). A Khattak Approach for Detection and Removal of Black and Gray Hole Attacks in Manet. Indian Journal of Science and Technology. 9. 1-4. 10.17485/ijst/2016/v9i4/77755.
- Shawar Gul, Noor Ul Amin, Faisal Bahadur, Insafullah, Muazzam Ali Khan. 2016. A Light Weight Secure Protocol For Data Transmission In Vanet. International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 7.
- Insaf Ullah, Rehan Ullah,& Noor ul Amin. 2016. A New Efficient two tire secure protocol. (IJCSIS) International Journal of Computer Science and Information Security, Vol. 14, No. 6.
- Hizbullah Khattak, Arif Iqbal Umar, Insaf Ullah. 2016. A Secure Protocol For Vanet Using Proxy Blind Signature Based On Elliptic Curve. International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 7.
- Insaf ullah, Muhammad suliman , Arif Iqbal Umar, Noor-Ul-Amind, Hizbullah Khattak. 2016. Deniable Authentication Protocol using Promised Signcrypion Based on Hyper Elliptic Curve. International Journal of Sciences: Basic and Applied Research (IJSBAR)(2016) Volume 25, No 2, pp 285-291
- Insaf Ullah, Noor –Ul-Amin, Hizbullah Khattak, Sultan Ullah, Asfandyar Khan. 2016. Multi Receiver Proxy Signcrypion Based on Hyper Elliptic Curve Cryptography. International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 12.
- Insaf Ullah , Noor Ul Amin, Arif Iqbal Umar , Hizbullah khattak. 2016. Proxy Promised Signcrypion Scheme Based on Elliptic Curve Crypto System. International Journal of Computer (IJC) (2016) Volume 20, No 1, pp 167-173.
- Anwar Sadat, Insaf Ullah, Hizbullah Khattakc, Sultan Ullah , Amjad-ur Rehman. 2016. Proxy Blind Signcrypion Based on Elliptic Curve. International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 3.
- Insaf Ullah, Inam Ul Haq, Noor Ul Amin, Arif Iqbal Umar , Hizbullah Khattak.2016. Proxy Signcrypion Scheme Based on Hyper Elliptic Curves. International Journal of Computer (IJC) (2016) Volume 20, No 1, pp 157-166.
- Zahid Ullah, Insaf Ullah, Haris Khan, Hizbullah Khattak, Sultan Ullah. 2016. Secure protocol for Mobile Agents Using Proxy Signcryption Scheme Based on Hyper Elliptic Curve. International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 12.
- Ullah, S., Junaid, M., Habib, F., Sana, Insafullah, & Hizbullah. (2016). A novel proxy blind signcryption scheme based on hyper elliptic curve. 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD).doi:10.1109/fskd.2016.7603481
- Farooqi, Muhammad Abdullah Adnan, Fahad Mumtaz Malik, Junaid Anwar, and Musayyab Ali. “Sampled Data Output Feedback Control Of Tri Rotor Unmanned Aerial Vehicle.” Science International 28, no. 1 (2016).
2015
- Khan, M.A., Umair, M. and Choudhry, M.A.S., 2015. GA based adaptive receiver for MC-CDMA system. Turkish Journal of Electrical Engineering & Computer Sciences, 23(Sup. 1), pp.2267-2277.
- Rashid, A., Tahir, S. and Choudhury, A.S., 2015. Detection of Brain Tumor in EEG Signals Using Independent Component Analysis. International Journal of Applied Mathematics, Electronics and Computers, 3(2), pp.78-82.
- Khan, M.A., Umair, M. and Choudry, M.A.S., 2015, December. Island differential evolution based adaptive receiver for MC-CDMA system. In Information and Communication Technologies (ICICT), 2015 International Conference on(pp. 1-6). IEEE.
- Umair, M., Khan, M.A. and Choudry, M.A.S., 2015, December. Island genetic algorithm based MUD for MC-CDMA system. In Information and Communication Technologies (ICICT), 2015 International Conference on(pp. 1-6). IEEE.
- GA Shah, A Khan, AA Shah, M Raza, M Sharif. 2015.A Review on Image Contrast Enhancement Techniques Using Histogram Equalization. Science International 27 (2)
- Sajid Muhammad, Hasan Raza, Zafar Iqbal, Muhammad Tayyab Ali, Mariam Akhtar Kayani, and M. Yaqoob Wani. “A Modified Adaptive Variable Step Size NLMS Adaptive Filtering Algorithm for Rayleigh Fading Environments.” International Journal of Advancements in Electronics and Electrical Engineering– IJAEEE, Vol. 4, no. 1, pp. 06-09, 2015.
- Khan, M.A, Raees, M,A. Shah, A. Review of communication Protocols for FANETs. 2nd International Conference on Engineering and Emerging Technologies March 26, 27, 2015, Lahore, Pakistan
- Shah,A; Khan ,M.A. Novel Architecture for Future Li-Fi Wireless Technology”.1st International Conference on Engineering and Emerging Technologies March 26, 27, 2015, Lahore, Pakistan.
- Ali, Musayyab, Muhammad Abdullah Adnan Farooqi, and Fahad Mumtaz Malik. 2015. H Infinity Control Of A Mechanical System With Backlash. Sci.Int.27(6),5059-5064.