![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Mohammad Nazeeruddin
Person information
- affiliation: Prince Mohammad Bin Fahd University, Khobar, Saudi Arabia
- affiliation (former): King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia
- affiliation (PhD 2007): University of Ulster, Coleraine, UK
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j31]Shubhani Aggarwal, Neeraj Kumar, Nazeeruddin Mohammad, Ahmed Barnawi:
Blockchain-Based Content Retrieval Mechanism in NDN-Enabled V2G Networks. IEEE Trans. Ind. Informatics 21(1): 118-127 (2025) - 2024
- [j30]Mohammed Gollapalli
, Atta Rahman
, Sheriff A. Kudos
, Mohammed S. Foula, Abdullah Mahmoud Alkhalifa, Hassan Mohammed Albisher, Mohammed Taha Al-Hariri
, Nazeeruddin Mohammad
:
Appendicitis Diagnosis: Ensemble Machine Learning and Explainable Artificial Intelligence-Based Comprehensive Approach. Big Data Cogn. Comput. 8(9): 108 (2024) - [j29]Rahul Mishra
, Dharavath Ramesh, Nazeeruddin Mohammad, Bhaskar Mondal:
Blockchain enabled secure pharmaceutical supply chain framework with traceability: an efficient searchable pharmachain approach. Clust. Comput. 27(10): 13621-13641 (2024) - [j28]Prabhat Kumar
, Randhir Kumar
, Alireza Jolfaei
, Nazeeruddin Mohammad
:
An Automated Threat Intelligence Framework for Vehicle-Road Cooperation Systems. IEEE Internet Things J. 11(22): 35964-35974 (2024) - [j27]Runna Alghazo, Ghazanfar Latif, Nazeeruddin Mohammad, Jaafar M. Alghazo, Maura A. E. Pilotti:
Deep Learning-based Arabic Sign Recognition System for Automated Communication with Hearing Impaired Individuals. KSII Trans. Internet Inf. Syst. 18(11): 3148-3164 (2024) - [j26]Mayez Al-Mouhamed, Lutfi A. Firdaus, Ayaz H. Khan
, Nazeeruddin Mohammad:
SpMV and BiCG-Stab sparse solver on Multi-GPUs for reservoir simulation. Multim. Tools Appl. 83(8): 23563-23597 (2024) - [j25]Randhir Kumar
, Prabhat Kumar
, Ahamed Aljuhani
, Alireza Jolfaei
, A. K. M. Najmul Islam
, Nazeeruddin Mohammad
:
Secure Data Dissemination Scheme for Digital Twin Empowered Vehicular Networks in Open RAN. IEEE Trans. Veh. Technol. 73(7): 9234-9246 (2024) - 2023
- [j24]Eman Shaikh
, Abdul-Rahman Al-Ali
, Shahabuddin Muhammad
, Nazeeruddin Mohammad
, Fadi A. Aloul:
Security Analysis of a Digital Twin Framework Using Probabilistic Model Checking. IEEE Access 11: 26358-26374 (2023) - [j23]Harini Narasimhan, Vinayakumar Ravi
, Nazeeruddin Mohammad
:
Unsupervised Deep Learning Approach for In-Vehicle Intrusion Detection System. IEEE Consumer Electron. Mag. 12(1): 103-108 (2023) - [j22]Erukala Suresh Babu
, Bhukya Padma
, Soumya Ranjan Nayak
, Nazeeruddin Mohammad, Uttam Ghosh
:
Cooperative IDS for Detecting Collaborative Attacks in RPL-AODV Protocol in Internet of Everything. J. Database Manag. 34(2): 1-33 (2023) - [j21]Ghazanfar Latif
, Abul Bashar, D. N. F. Awang Iskandar
, Nazeeruddin Mohammad, Ghassen Ben Brahim, Jaafar M. Alghazo
:
Multiclass tumor identification using combined texture and statistical features. Medical Biol. Eng. Comput. 61(1): 45-59 (2023) - [j20]Saman Shojae Chaeikar
, Alireza Jolfaei
, Nazeeruddin Mohammad
:
AI-Enabled Cryptographic Key Management Model for Secure Communications in the Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 24(4): 4589-4598 (2023) - [c22]Ghazanfar Latif
, Nazeeruddin Mohammad, Jaafar M. Alghazo
:
Plant Seedling Classification Using Preprocessed Deep CNN. ICCAE 2023: 244-248 - [i1]Iqbal H. Sarker, Helge Janicke, Nazeeruddin Mohammad, Paul A. Watters, Surya Nepal:
AI Potentiality and Awareness: A Position Paper from the Perspective of Human-AI Teaming in Cybersecurity. CoRR abs/2310.12162 (2023) - 2022
- [j19]Ghassen Ben Brahim, Nazeeruddin Mohammad, Wassim El-Hajj
, Gerard Parr, Bryan W. Scotney:
Performance evaluation and comparison study of adaptive MANET service location and discovery protocols for highly dynamic environments. EURASIP J. Wirel. Commun. Netw. 2022(1): 1-21 (2022) - [j18]Zubair A. Baig
, Naeem Syed
, Nazeeruddin Mohammad
:
Securing the Smart City Airspace: Drone Cyber Attack Detection through Machine Learning. Future Internet 14(7): 205 (2022) - [j17]Mohamed Abdel-Basset
, Hossam Hawash
, Nour Moustafa
, Nazeeruddin Mohammad
:
H2HI-Net: A Dual-Branch Network for Recognizing Human-to-Human Interactions From Channel-State Information. IEEE Internet Things J. 9(12): 10010-10021 (2022) - [j16]Majid Ali Khan
, Nazeeruddin Mohammad, Ghassen Ben Brahim, Abul Bashar, Ghazanfar Latif
:
Writer verification of partially damaged handwritten Arabic documents based on individual character shapes. PeerJ Comput. Sci. 8: e955 (2022) - [c21]Himanshu Sharma, Neeraj Kumar, Rajkumar Tekchandani, Nazeeruddin Mohammad:
Deep Learning enabled Channel Secrecy Codes for Physical Layer Security of UAVs in 5G and beyond Networks. ICC 2022: 1-6 - [c20]Naeem Syed
, Majid Ali Khan
, Nazeeruddin Mohammad, Ghassen Ben Brahim, Zubair A. Baig:
Unsupervised Machine Learning for Drone Forensics through Flight Path Analysis. ISDFS 2022: 1-6 - [c19]Arzoo Miglani, Neeraj Kumar, Avadh Kishor
, Nazeeruddin Mohammad:
UAV-enabled edge computing and blockchain based secure charging station selection for energy trading in V2G environment. DroneCom@MobiCom 2022: 103-108 - [c18]Rahul Mishra
, Dharavath Ramesh
, Nazeeruddin Mohammad:
RBDA: Redactable-Blockchain based Secure Data Aggregation Scheme for IoT enabled Cloud Paradigm. PerCom Workshops 2022: 409-414 - [c17]Dhruv Garg, Neeraj Kumar, Nazeeruddin Mohammad:
An Intelligent Machine Learning Approach for Smart Grid Theft Detection. WoWMoM 2022: 507-514 - 2021
- [j15]Majid Ali Khan, Mayez A. Al-Mouhamed, Nazeeruddin Mohammad:
Adaptive tiling for parallel N-body simulations on many core. Astron. Comput. 36: 100466 (2021) - [c16]Saman Shojae Chaeikar, Alireza Jolfaei
, Nazeeruddin Mohammad, Pouya Ostovari:
Security Principles and Challenges in Electronic Voting. EDOC Workshops 2021: 38-45 - [c15]Vasundhara Acharya, Vinayakumar Ravi, Nazeeruddin Mohammad:
EfficientNet-based Convolutional Neural Networks for Malware Classification. ICCCNT 2021: 1-6 - [c14]Rahaf Alkhadra, Joud Abuzaid, Mariam AlShammari, Nazeeruddin Mohammad:
Solar Winds Hack: In-Depth Analysis and Countermeasures. ICCCNT 2021: 1-7 - 2020
- [j14]Tariq Mumtaz
, Shahabuddin Muhammad
, Muhammad Imran Aslam
, Nazeeruddin Mohammad
:
Dual Connectivity-Based Mobility Management and Data Split Mechanism in 4G/5G Cellular Networks. IEEE Access 8: 86495-86509 (2020) - [j13]Mayez A. Al-Mouhamed, Ayaz H. Khan
, Nazeeruddin Mohammad
:
A review of CUDA optimization techniques and tools for structured grid computing. Computing 102(4): 977-1003 (2020) - [c13]Eman Shaikh, Abul Bashar, Nazeeruddin Mohammad:
Recent Applications of Computing and Mobility Technologies to Modern Manufacturing. ICCSPA 2020: 1-6 - [c12]Eman Shaikh, Nazeeruddin Mohammad, Shahabuddin Muhammad:
Model Checking Based Unmanned Aerial Vehicle (UAV) Security Analysis. ICCSPA 2020: 1-6 - [c11]Ghazanfar Latif
, Batool Alsalem, Wejdan Mubarky, Nazeeruddin Mohammad
, Jaafar M. Alghazo
:
Automatic Fruits Calories Estimation through Convolutional Neural Networks. ICCTA 2020: 17-21
2010 – 2019
- 2019
- [j12]Ghazanfar Latif
, D. N. F. Awang Iskandar
, Jaafar M. Alghazo
, Nazeeruddin Mohammad
:
Enhanced MR Image Classification Using Hybrid Statistical and Wavelets Features. IEEE Access 7: 9634-9644 (2019) - [j11]Nazeeruddin Mohammad
, Shahabuddin Muhammad
, Abul Bashar
, Majid Ali Khan
:
Formal Analysis of Human-Assisted Smart City Emergency Services. IEEE Access 7: 60376-60388 (2019) - [j10]Nazeeruddin Mohammad
:
A Multi-Tiered Defense Model for the Security Analysis of Critical Facilities in Smart Cities. IEEE Access 7: 152585-152598 (2019) - [j9]Shahabuddin Muhammad
, Nazeeruddin Mohammad
, Abul Bashar
, Majid Ali Khan
:
Designing Human Assisted Wireless Sensor and Robot Networks Using Probabilistic Model Checking. J. Intell. Robotic Syst. 94(3-4): 687-709 (2019) - [c10]Nazeeruddin Mohammad
, Shahabuddin Muhammad
, Eman Shaikh:
Analysis of In-vehicle Security System of Smart Vehicles. FNSS 2019: 198-211 - 2018
- [c9]Abul Bashar
, Nazeeruddin Mohammad
, Shahabuddin Muhammed:
Modeling and Evaluation of Pre-Copy Live VM Migration Using Probabilistic Model Checking. ICSPCS 2018: 1-7 - 2017
- [c8]Nazeeruddin Mohammad
, Shahabuddin Muhammad
, Abul Bashar
, Majid Ali Khan
:
Design and modeling of energy efficient WSN architecture for tactical applications. MilCIS 2017: 1-6 - 2016
- [j8]Majid Ali Khan
, Mohammad Nazeeruddin
, Shahabuddin Muhammad
, Asif Ali:
A mining-based approach for efficient enumeration of algebraic structures. Int. J. Data Sci. Anal. 1(2): 89-98 (2016) - [j7]Ayaz ul Hassan Khan
, Mayez Al-Mouhamed, Allam Fatayer, Nazeeruddin Mohammad
:
Optimizing the Matrix Multiplication Using Strassen and Winograd Algorithms with Limited Recursions on Many-Core. Int. J. Parallel Program. 44(4): 801-830 (2016) - [j6]Ayaz ul Hassan Khan, Mayez Al-Mouhamed, Allam Fatayer, Nazeeruddin Mohammad:
Erratum to: Optimizing the Matrix Multiplication Using Strassen and Winograd Algorithms with Limited Recursions on Many-Core. Int. J. Parallel Program. 44(4): 831 (2016) - 2015
- [c7]Majid Ali Khan
, Mohammad Nazeeruddin
, Shahabuddin Muhammad
, Asif Ali:
A mining based approach for efficient enumeration of algebraic structures. DSAA 2015: 1-6 - 2013
- [c6]Mohammad Nazeeruddin
, Shahabuddin Muhammad
, Mayez Al-Mouhamed:
Design and implementation of reliable auctioning algorithms for multi-robot systems. ICACCI 2013: 288-293 - 2012
- [c5]Mohammad Nazeeruddin
, Shahabuddin Muhammad
:
Modeling and Analyzing MAC Frame Aggregation Techniques in 802.11n Using Bi-dimensional Markovian Model. NDT (1) 2012: 408-419 - 2010
- [j5]Mohammad Nazeeruddin
, Gerard P. Parr
, Bryan W. Scotney:
An efficient and robust name resolution protocol for dynamic MANETs. Ad Hoc Networks 8(8): 842-856 (2010) - [j4]Mayez A. Al-Mouhamed, Mohammad Nazeeruddin, Syed M. S. Islam
:
Experimental Evaluation of Feedback Modalities for Five Teleoperation Tasks. IEEE Trans. Instrum. Meas. 59(2): 361-371 (2010)
2000 – 2009
- 2009
- [j3]Mayez A. Al-Mouhamed, Mohammad Nazeeruddin, Nesar Merah
:
Design and Instrumentation of Force Feedback in Telerobotics. IEEE Trans. Instrum. Meas. 58(6): 1949-1957 (2009) - 2006
- [j2]Mohammad Nazeeruddin
, Gerard Parr
, Bryan W. Scotney:
DHAPM: A New Host Auto-configuration Protocol for Highly Dynamic MANETs. J. Netw. Syst. Manag. 14(3): 441-475 (2006) - [c4]Petre Kulkarni, Mohammad Nazeeruddin
, Sally I. McClean
, Gerard P. Parr
, Michaela M. Black, Bryan W. Scotney, Petre Dini:
Deploying Lightweight Queue Management for improving performance of Mobile Ad-hoc Networks (MANETs). ICNS 2006: 102 - [c3]Mohammad Nazeeruddin
, Gerard Parr, Bryan W. Scotney:
An Efficient and Robust Service Discovery Protocol for Dynamic MANETs. MMNS 2006: 49-60 - [c2]Petre Kulkarni, Mohammad Nazeeruddin
, Sally I. McClean
:
Building a controlled delay assured forwarding class in differentiated services networks. INM@SIGCOMM 2006: 11-16 - 2004
- [c1]Mayez A. Al-Mouhamed, Onur Toker, Asif Iqbal, Mohammad Nazeeruddin:
A Distributed Framework for Relaying Stereo Vision for Telerobotics. ICPS 2004: 221-225 - 2002
- [j1]Hesham K. Alfares
, Mohammad Nazeeruddin:
Electric load forecasting: Literature survey and classification of methods. Int. J. Syst. Sci. 33(1): 23-34 (2002)
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-05 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint