default search action
Naveed Ahmad 0003
Person information
- affiliation: Prince Sultan University, Department of Computer Science, Riyadh, Saudi Arabia
- affiliation (former): University of Peshawar, Department of Computer Science, Pakistan
- affiliation (PhD 2013): University of Surrey, Institute of Communication System, UK
Other persons with the same name
- Naveed Ahmad — disambiguation page
- Naveed Ahmad 0001 — FAST NUCES, Islamabad, Pakistan (and 2 more)
- Naveed Ahmad 0002 — Institution of Business Administration, University Road, Karachi, Pakistan
- Naveed Ahmad 0004 — Northwestern Polytechnical University, School of Management, Xi'an, China
- Naveed Ahmad 0005 — University of Engineering and Technology, Industrial and Manufacturing Engineering Department, Lahore, Pakistan (and 1 more)
- Naveed Ahmed — disambiguation page
- Naveed Ahmed 0001 — University of Sharjah, Department of Computer Science, UAE (and 1 more)
- Naveed Ahmed 0002 — HITEC University Taxila Cantt, Department of Mathematics, Pakistan
- Naveed Ahmed 0004 — Gulf University for Science and Technology, Department of Math & Natural Science, Kuwait (and 4 more)
- Naveed Ahmed 0005 — Technical University of Denmark, Department of Informatics and Mathematical Modelling, Lyngby, Denmark
- Naveed Ahmed 0006 — Chinese Academy of Sciences, Institute of Mountain Hazards and Environment, Chengdu, China
- Naveed Ahmed 0007 — Universiti Teknology Malaysia, School of Computing, Faculty of Engineering, Malaysia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2013
- [b1]Naveed Ahmad:
Engineering privacy by design for delay tolerant networks. University of Surrey, Guildford, UK, 2013
Journal Articles
- 2025
- [j38]Hassan Jalil Hadi, Yue Cao, Sifan Li, Naveed Ahmad, Mohammed Ali Alshara:
FCG-MFD: Benchmark function call graph-based dataset for malware family detection. J. Netw. Comput. Appl. 233: 104050 (2025) - 2024
- [j37]Raheel Ahmad, Arshad Iqbal, Muhammad Mohsin Jadoon, Naveed Ahmed, Yasir Javed:
XEmoAccent: Embracing Diversity in Cross-Accent Emotion Recognition Using Deep Learning. IEEE Access 12: 41125-41142 (2024) - [j36]Novsheena Rasool, Javaid Iqbal Bhat, Niyaz Ahmad Wani, Naveed Ahmad, Mohammed Alshara:
TransResUNet: Revolutionizing Glioma Brain Tumor Segmentation Through Transformer-Enhanced Residual UNet. IEEE Access 12: 72105-72116 (2024) - [j35]Sifan Li, Yue Cao, Shuohan Liu, Yuping Lai, Yongdong Zhu, Naveed Ahmad:
HDA-IDS: A Hybrid DoS Attacks Intrusion Detection System for IoT by using semi-supervised CL-GAN. Expert Syst. Appl. 238(Part F): 122198 (2024) - [j34]Tajmir Khan, Umer Rashid, Abdur Rehman Khan, Naveed Ahmad, Mohammed Ali Alshara:
End-to-end vertical web search pseudo relevance feedback queries recommendation software. SoftwareX 27: 101872 (2024) - 2023
- [j33]Waqar Khalid, Naveed Ahmad, Suleman Khan, Najam U. Saquib, Muhammad Arshad, Duri Shahwar:
FAPMIC: Fake Packet and Selective Packet Drops Attacks Mitigation by Merkle Hash Tree in Intermittently Connected Networks. IEEE Access 11: 4549-4573 (2023) - [j32]Waqar Khalid, Naveed Ahmad, Suleman Khan, Zahid Ullah, Yasir Javed:
Simulative Survey of Flooding Attacks in Intermittently Connected Vehicular Delay Tolerant Networks. IEEE Access 11: 75628-75656 (2023) - [j31]Umer Rashid, Samra Naseer, Abdur Rehman Khan, Muazzam A. Khan, Gauhar Ali, Naveed Ahmad, Yasir Javed:
Sampling Fingerprints From Multimedia Content Resource Clusters. IEEE Access 11: 141640-141656 (2023) - [j30]Ziyi Hu, Yue Cao, Xinyu Li, Yongdong Zhu, Muhammad Khalid, Naveed Ahmad:
Autonomous valet parking optimization with two-step reservation and pricing strategy. J. Netw. Comput. Appl. 219: 103727 (2023) - [j29]Hongyu Zhang, Yunbo Rao, Jie Shao, Fanman Meng, Naveed Ahmad:
GAB-Net: A Robust Detector for Remote Sensing Object Detection Under Dramatic Scale Variation and Complex Backgrounds. IEEE Geosci. Remote. Sens. Lett. 20: 1-5 (2023) - [j28]Umer Rashid, Maha Saddal, Abdur Rehman Khan, Sadia Manzoor, Naveed Ahmad:
I-Cubid: a nonlinear cubic graph-based approach to visualize and in-depth browse Flickr image results. PeerJ Comput. Sci. 9: e1476 (2023) - [j27]Abdur Rehman Khan, Umer Rashid, Naveed Ahmad:
AMED: Aggregated multimedia exploratory and discovery search software. SoftwareX 21: 101312 (2023) - 2022
- [j26]Abdur Rehman Khan, Umer Rashid, Naveed Ahmed:
An Explanatory Study on User Behavior in Discovering Aggregated Multimedia Web Content. IEEE Access 10: 56316-56330 (2022) - 2021
- [j25]Sumaira Johar, Naveed Ahmad, A. Durrani, Gauhar Ali:
Proof of Pseudonym: Blockchain-Based Privacy Preserving Protocol for Intelligent Transport System. IEEE Access 9: 163625-163639 (2021) - [j24]Muhammad Khalid, Kezhi Wang, Nauman Aslam, Yue Cao, Naveed Ahmad, Muhammad Khurram Khan:
From smart parking towards autonomous valet parking: A survey, challenges and future Works. J. Netw. Comput. Appl. 175: 102935 (2021) - 2020
- [j23]Gauhar Ali, Naveed Ahmad, Yue Cao, Shahzad Khan, Haitham S. Cruickshank, Qazi Ejaz Ali, Azaz Ali:
xDBAuth: Blockchain Based Cross Domain Authentication and Authorization Framework for Internet of Things. IEEE Access 8: 58800-58816 (2020) - [j22]Xu Zhang, Yue Cao, Linyu Peng, Jichun Li, Naveed Ahmad, Shengping Yu:
Mobile Charging as a Service: A Reservation-Based Approach. IEEE Trans Autom. Sci. Eng. 17(4): 1976-1988 (2020) - [j21]Xu Zhang, Yue Cao, Linyu Peng, Naveed Ahmad, Lexi Xu:
Towards Efficient Battery Swapping Service Operation Under Battery Heterogeneity. IEEE Trans. Veh. Technol. 69(6): 6107-6118 (2020) - 2019
- [j20]Zahid Ullah, Imran Ahmed, Tamleek Ali, Naveed Ahmed, Fahim Niaz, Yue Cao:
Robust and Efficient Energy Harvested-Aware Routing Protocol With Clustering Approach in Body Area Networks. IEEE Access 7: 33906-33921 (2019) - [j19]Waqar Khalid, Naveed Ahmed, Muhammad Khalid, Aziz Ud Din, Aurangzeb Khan, Muhammad Arshad:
FRID: Flood Attack Mitigation Using Resources Efficient Intrusion Detection Techniques in Delay Tolerant Networks. IEEE Access 7: 83740-83760 (2019) - [j18]Gauhar Ali, Naveed Ahmad, Yue Cao, Muhammad Asif, Haitham S. Cruickshank, Qazi Ejaz Ali:
Blockchain based permission delegation and access control in Internet of Things (BACI). Comput. Secur. 86: 318-334 (2019) - [j17]Naveed Ahmad, Haitham S. Cruickshank, Yue Cao, Fakhri Alam Khan, Muhammad Asif, Awais Ahmad, Gwanggil Jeon:
Privacy by Architecture Pseudonym Framework for Delay Tolerant Network. Future Gener. Comput. Syst. 93: 979-992 (2019) - [j16]Muhammad Khalid, Farah Ahmad, Muhammad Arshad, Waqar Khalid, Naveed Ahmad, Yue Cao:
E2MR: energy-efficient multipath routing protocol for underwater wireless sensor networks. IET Networks 8(5): 321-328 (2019) - [j15]Yue Cao, Omprakash Kaiwartya, Sinem Coleri Ergen, Houbing Song, Jaime Lloret, Naveed Ahmad:
Guest Editorial Special Issue on Toward Securing Internet of Connected Vehicles (IoV) From Virtual Vehicle Hijacking. IEEE Internet Things J. 6(4): 5866-5869 (2019) - [j14]Gauhar Ali, Naveed Ahmad, Yue Cao, Qazi Ejaz Ali, Fazal Azim, Haitham S. Cruickshank:
BCON: Blockchain based access CONtrol across multiple conflict of interest domains. J. Netw. Comput. Appl. 147 (2019) - [j13]Zahid Ullah, Imran Ahmed, Kaleem Razzaq Malik, Muhammad Kashif Naseer, Naveed Ahmed:
DSCB: Dual sink approach using clustering in body area network. Peer-to-Peer Netw. Appl. 12(2): 357-370 (2019) - [j12]Yue Cao, Omprakash Kaiwartya, Yuan Zhuang, Naveed Ahmad, Yan Sun, Jaime Lloret:
A Decentralized Deadline-Driven Electric Vehicle Charging Recommendation. IEEE Syst. J. 13(3): 3410-3421 (2019) - 2018
- [j11]Qazi Ejaz Ali, Naveed Ahmad, Abdul Haseeb Malik, Gauhar Ali, Muhammad Asif, Muhammad Khalid, Yue Cao:
SPATA: Strong Pseudonym-Based AuthenTicAtion in Intelligent Transport System. IEEE Access 6: 79114-79128 (2018) - [j10]Waqar Khalid, Zahid Ullah, Naveed Ahmed, Yue Cao, Muhammad Khalid, Muhammad Arshad, Farhan Ahmad, Haitham S. Cruickshank:
A taxonomy on misbehaving nodes in delay tolerant networks. Comput. Secur. 77: 442-471 (2018) - [j9]Muhammad Arshad, Zahid Ullah, Naveed Ahmad, Muhammad Khalid, Haithiam Criuckshank, Yue Cao:
A survey of local/cooperative-based malicious information detection techniques in VANETs. EURASIP J. Wirel. Commun. Netw. 2018: 62 (2018) - [j8]Haleem Farman, Bilal Jan, Huma Javed, Naveed Ahmed, Javed Iqbal, Muhammad Arshad, Shaukat Ali:
Multi-criteria based zone head selection in Internet of Things based wireless sensor networks. Future Gener. Comput. Syst. 87: 364-371 (2018) - [j7]Muhammad Khalid, Yue Cao, Naveed Ahmad, Waqar Khalid, Piyush Dhawankar:
Radius-based multipath courier node routing protocol for acoustic communications. IET Wirel. Sens. Syst. 8(4): 183-189 (2018) - [j6]Yue Cao, Tong Wang, Omprakash Kaiwartya, Geyong Min, Naveed Ahmad, Abdul Hanan Abdullah:
An EV Charging Management System Concerning Drivers' Trip Duration and Mobility Uncertainty. IEEE Trans. Syst. Man Cybern. Syst. 48(4): 596-607 (2018) - [j5]Shahid Latif, Saeed Mahfooz, Bilal Jan, Naveed Ahmad, Yue Cao, Muhammad Asif:
A comparative study of scenario-driven multi-hop broadcast protocols for VANETs. Veh. Commun. 12: 88-109 (2018) - [j4]Shahid Latif, Saeed Mahfooz, Naveed Ahmad, Bilal Jan, Haleem Farman, Murad Khan, Kijun Han:
Industrial Internet of Things Based Efficient and Reliable Data Dissemination Solution for Vehicular Ad Hoc Networks. Wirel. Commun. Mob. Comput. 2018 (2018) - 2017
- [j3]Taimur Khan, Naveed Ahmad, Yue Cao, Syed Asim Jalal, Muhammad Asif, Sana-ul Haq, Haitham Cruichshank:
Certificate revocation in vehicular ad hoc networks techniques and protocols: a survey. Sci. China Inf. Sci. 60(10): 100301:1-100301:18 (2017) - [j2]Muhammad Khalid, Zahid Ullah, Naveed Ahmad, Muhammad Arshad, Bilal Jan, Yue Cao, Awais Adnan:
A Survey of Routing Issues and Associated Protocols in Underwater Wireless Sensor Networks. J. Sensors 2017: 7539751:1-7539751:17 (2017) - 2013
- [j1]Yue Cao, Zhili Sun, Ning Wang, Haitham S. Cruickshank, Naveed Ahmad:
A Reliable and Efficient Geographic Routing Scheme for Delay/Disruption Tolerant Networks. IEEE Wirel. Commun. Lett. 2(6): 603-606 (2013)
Conference and Workshop Papers
- 2024
- [c8]Waqar Khalid, Naveed Ahmed, Yasir Javed, Arshad Alam, Muhammad Arshad:
Cyber-Threat-Intelligence: Detection of Selective Packet Drops and Fake Packet Attacks in Opportunistic Networks (DOSFAN). ICISDM 2024: 50-56 - 2023
- [c7]Abdul Majid Jamil, Hassan Jalil Hadi, Sifan Li, Yue Cao, Naveed Ahmed, Faisal Bashir Hussain, Chakkaphong Suthaputchakun, Xinyuan Wang:
Detection of Targeted Attacks Using Medium-Interaction Honeypot for Unmanned Aerial Vehicle. ICDF2C (2) 2023: 164-185 - 2018
- [c6]Muhammad Khalid, Yue Cao, Xu Zhang, Chong Han, Linyu Peng, Nauman Aslam, Naveed Ahmad:
Towards autonomy: Cost-effective scheduling for long-range autonomous valet parking (LAVP). WCNC 2018: 1-6 - 2012
- [c5]Yue Cao, Zhili Sun, Naveed Ahmad, Haitham S. Cruickshank:
A mobility vector based routing algorithm for Delay Tolerant Networks using history geographic information. WCNC 2012: 2757-2762 - 2011
- [c4]Muhammad Asif, Zhili Sun, Haitham S. Cruickshank, Naveed Ahmad:
QoS assurance in MANETs using flow aware admission control - Multipath protocol. IPCCC 2011: 1-2 - [c3]Naveed Ahmad, Haitham S. Cruickshank, Zhili Sun, Muhammad Asif:
Pseudonymised communication in delay tolerant networks. PST 2011: 1-6 - [c2]Muhammad Asif, Zhili Sun, Haitham S. Cruickshank, Naveed Ahmad:
Flow Aware Admission Control-Multipath protocol with multiple constraints (FAAC-MM) for assurance of multiple QoS metrics in MANETs. SCVT 2011: 1-6 - 2010
- [c1]Naveed Ahmad, Haitham S. Cruickshank, Zhili Sun:
ID Based Cryptography and Anonymity in Delay/Disruption Tolerant Networks. PSATS 2010: 265-275
Parts in Books or Collections
- 2018
- [p1]Yue Cao, Naveed Ahmad, Omprakash Kaiwartya, Ghanim Putrus, Muhammad Khalid:
Intelligent Transportation Systems Enabled ICT Framework for Electric Vehicle Charging in Smart City. Handbook of Smart Cities, Software Services and Cyber Infrastructure 2018: 311-330
Data and Artifacts
- 2022
- [d1]Abdur Rehman Khan, Umer Rashid, Naveed Ahmed:
Multimedia Aggregated Information Discovery Data. IEEE DataPort, 2022
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint