default search action
Ali Hammad Akbar 0001
Person information
- affiliation: University of Engineering and Technology, Department of Computer Science and Engineering, Lahore, Pakistan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Bilal Imran, Ahsan Muhammad, Ali Hammad Akbar, Ghalib Asadullah Shah:
D4GW: DTLS for gateway multiplexed application to secure MQTT(SN)-based pub/sub architecture. Internet Things 26: 101172 (2024) - 2022
- [j16]Saima Zafar, K. M. Bhatti, M. Shabbir, Fabiha Hashmat, Ali Hammad Akbar:
Integration of blockchain and Internet of Things: challenges and solutions. Ann. des Télécommunications 77(1-2): 13-32 (2022)
2010 – 2019
- 2019
- [j15]Muhammad Farrukh Shafeeq, Ali Hammad Akbar, Saima Zafar:
SNAG: A Collaborative Routing Architecture for Sensor-Based Information at SMS Gateway in Cellular Networks. Int. J. Wirel. Inf. Networks 26(4): 367-384 (2019) - [j14]Amna Zafar, Ali Hammad Akbar, Beenish Ayesha Akram:
Inter-Process Correlation Model based Hybrid Framework for Fault Diagnosis in Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 13(2): 536-564 (2019) - [c21]Ahsan Muhammad, Bilal Afzal, Bilal Imran, Asim Tanwir, Ali Hammad Akbar, Ghalib A. Shah:
oneM2M Architecture Based Secure MQTT Binding in Mbed OS. EuroS&P Workshops 2019: 48-56 - [c20]Bilal Imran, Bilal Afzal, Ali Hammad Akbar, Ahsan Muhammad, Ghalib A. Shah:
MISA: Minimalist Implementation of oneM2M Security Architecture for Constrained IoT Devices. GLOBECOM 2019: 1-6 - 2018
- [j13]Beenish A. Akram, Ali Hammad Akbar, M. Omair Shafiq:
HybLoc: Hybrid Indoor Wi-Fi Localization Using Soft Clustering-Based Random Decision Forest Ensembles. IEEE Access 6: 38251-38272 (2018) - [j12]Beenish A. Akram, Ali Hammad Akbar, Ki-Hyung Kim:
CEnsLoc: Infrastructure-Less Indoor Localization Methodology Using GMM Clustering-Based Classification Ensembles. Mob. Inf. Syst. 2018: 3287810:1-3287810:11 (2018) - [j11]Saqib Ubaid, Muhammad Farrukh Shafeeq, Majid Hussain, Ali Hammad Akbar, Abdelrahman Abuarqoub, M. Sultan Zia, Beenish Abbas:
SCOUT: a sink camouflage and concealed data delivery paradigm for circumvention of sink-targeted cyber threats in wireless sensor networks. J. Supercomput. 74(10): 5022-5040 (2018) - 2016
- [j10]Majid Hussain, Ki-Hyung Kim, Ali Hammad Akbar, Shehzad Khalid, Seung-Jin Bang, Mohsin Javed, Madiha Amjad:
A Gateway Deployment Heuristic for Enhancing the Availability of Sensor Grids. Int. J. Distributed Sens. Networks 12(9): 7595038 (2016) - [j9]Majid Hussain, Muhammad Farrukh Shafeeq, Sana Jabbar, Ali Hammad Akbar, Shahzad Khalid:
CRAM: A Conditioned Reflex Action Inspired Adaptive Model for Context Addition in Wireless Sensor Networks. J. Sensors 2016: 6319830:1-6319830:24 (2016) - 2014
- [j8]Sana Jabbar, Ali Hammad Akbar, Saima Zafar, Muhammad Quddoos, Majid Hussain:
VISTA: achieving cumulative VIsion through energy efficient Silhouette recognition of mobile Targets through collAboration of visual sensor nodes. EURASIP J. Image Video Process. 2014: 32 (2014) - 2013
- [j7]Bilal Hasani, Saima Zafar, Ali Hammad Akbar, Babar Ali Magsi:
Collaborative routing and data delivery architecture for commercial wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2013: 54 (2013) - 2012
- [j6]Muhammad Rizwan Butt, Ali Hammad Akbar, Ki-Hyung Kim, Muhammad Mohsin Javed, Chae-Seong Lim, Quratulain Taj:
LABILE: link quAlity-based lexIcaL routing mEtric for reactive routing protocols in IEEE 802.15.4 networks. J. Supercomput. 62(1): 84-104 (2012) - 2011
- [j5]Maria Chaudhry, Ali Hammad Akbar, Qanita Ahmad, Imran Sarwar:
SOARware: Treading through the crossroads of RFID middleware and SOA paradigm. J. Netw. Comput. Appl. 34(3): 998-1014 (2011) - [c19]Sameer Farooq, Ali Hammad Akbar, Asif Raza, Abdul Waheed, Ki-Hyung Kim:
Application-oriented Re-Clustering and Cluster Head Re-Election scheme for Wireless Sensor Networks. IWCMC 2011: 1087-1092 - 2010
- [j4]Saima Zafar, Ali Hammad Akbar, Sana Jabbar, Noor M. Sheikh:
SET: Session Layer-Assisted Efficient TCP Management Architecture for 6LoWPAN with Multiple Gateways. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [c18]Sarah Salim, Mohsin Javed, Ali Hammad Akbar:
A Mobile Agent-Based Architecture for Fault Tolerance in Wireless Sensor Networks. CNSR 2010: 276-283 - [c17]Sarah Salim, Mohsin Javed, Ali Hammad Akbar:
Honey-bee dancing-inspired architecture for fault tolerance in wireless sensor networks. GECCO 2010: 79-80
2000 – 2009
- 2009
- [c16]Gargi Bag, S. M. Saif Shams, Ali Hammad Akbar, Muhammad Taqi Raza, Ki-Hyung Kim, Seung-Wha Yoo:
Network Assisted Mobility Support for 6LoWPAN. CCNC 2009: 1-5 - [c15]Anwar Alomar, Ali Hammad Akbar:
C?C: Carrefour Routing for Cluster-Based Wireless Sensor Network to Support Multiple Applications in Multiple Gateway Environments. MSN 2009: 70-77 - 2008
- [j3]Rabia Riaz, Ayesha Naureen, Attiya Akram, Ali Hammad Akbar, Ki-Hyung Kim, H. Farooq Ahmed:
A unified security framework with three key management schemes for wireless sensor networks. Comput. Commun. 31(18): 4269-4280 (2008) - [j2]Muhammad Taqi Raza, Zeeshan Hameed Mir, Ali Hammad Akbar, Seung-Wha Yoo, Ki-Hyung Kim:
Adaptive Yaw Rate Aware Sensor Wakeup Schemes Protocol (A-YAP) for Target Prediction and Tracking in Sensor Networks. IEICE Trans. Commun. 91-B(11): 3524-3533 (2008) - [c14]Ali Tufail, Mike Fraser, Ali Hammad Akbar, Ki-Hyung Kim, Seung-Wha Yoo:
An empirical study to analyze the feasibility of WIFI for VANETs. CSCWD 2008: 553-558 - [c13]Mustafa Hasan, Ali Hammad Akbar, Hamid Mukhtar, Ki-Hyung Kim, Dong-Wha Kim:
A scheme to support mobility for IP based sensor networks. Infoscale 2008: 5 - [c12]Hamid Mukhtar, Kang-Myo Kim, Shafique Ahmad Chaudhry, Ali Hammad Akbar, Ki-Hyung Kim, Seung-Wha Yoo:
LNMP- Management architecture for IPv6 based low-power wireless Personal Area Networks (6LoWPAN). NOMS 2008: 417-424 - 2007
- [j1]Shafique Ahmad Chaudhry, Ali Hammad Akbar, Ki-Hyung Kim:
On the Interplay of Service Proximity and Ubiquity. IEICE Trans. Commun. 90-B(12): 3470-3479 (2007) - 2006
- [c11]Shafique Ahmad Chaudhry, Faysal Adeem Siddiqui, Ali Hammad Akbar, Ki-Hyung Kim:
NETSAQ: Network State Adaptive QoS Provisioning for MANETs. APNOMS 2006: 170-179 - [c10]Shafique Ahmad Chaudhry, Ali Hammad Akbar, Ki-Hyung Kim, Suk-Kyo Hong, Won-Sik Yoon:
HYWINMARC: An Autonomic Management Architecture for Hybrid Wireless Networks. EUC Workshops 2006: 193-202 - [c9]Shafique Ahmad Chaudhry, Won-Do Jung, Chaudhary Sajjad Hussain, Ali Hammad Akbar, Ki-Hyung Kim:
A Proxy-Enabled Service Discovery Architecture to Find Proximity-Based Services in 6LoWPAN. EUC 2006: 956-965 - [c8]Shafique Ahmad Chaudhry, Ali Hammad Akbar, Faisal Siddiqui, Ki-Hyung Kim:
Autonomic Network Management for Wireless Mesh and MANETs. IWSOS/EuroNGI 2006: 259 - [c7]Ali Hammad Akbar, Ahmad Ali Iqbal, Ki-Hyung Kim:
Binding Multiple Applications on Wireless Sensor Networks. GPC 2006: 250-258 - [c6]Ali Hammad Akbar, Ki-Hyung Kim, Seung-Jin Bang, Waleed Mansoor, Won-Sik Yoon:
Availability Considerations for Wireless Sensor Grids. GPC 2006: 269-278 - [c5]Ki-Hyung Kim, Ali Hammad Akbar:
Are Low PANs a PAN or an Internet of PANs? GPC 2006: 527-536 - [c4]Shafique Ahmad Chaudhry, Won-Do Jung, Ali Hammad Akbar, Ki-Hyung Kim:
Proxy-Based Service Discovery and Network Selection in 6LoWPAN. HPCC 2006: 525-534 - [c3]Ali Hammad Akbar, Ki-Hyung Kim, Shaokai Yu, Won-Sik Yoon:
On the Effect of Heterogeneous Traffic Sources on the Network Availability for Wireless Sensor Grids. International Conference on Computational Science (2) 2006: 1073-1080 - [c2]Ali Hammad Akbar, Ki-Hyung Kim, Won-Do Jung, Ali Kashif Bashir, Seung-Wha Yoo:
GARPAN: Gateway-Assisted Inter-PAN Routing for 6LoWPANs. ICCSA (2) 2006: 186-194 - [c1]Shoaib Mukhtar, Ali Hammad Akbar, Shafique Ahmad Chaudhry, Won-Sik Yoon, Ki-Hyung Kim, Suk-Kyo Hong:
Mitigating Broadcast Storms in Stateless Address Auto-configuring MANETs. ICCSA (2) 2006: 847-855
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint