Dr Muhammad Usman
Dr Muhammad Usman
University of South Wales, UK
Verified email at
Cited by
Cited by
Anomaly Detection in Automated Vehicles Using Multistage Attention-based Convolutional Neural Network
AR Javed, M Usman, S Rehman, M Khan, MS Haghighi
IEEE Transactions on Intelligent Transportation Systems, 2020
A provably secure and efficient authenticated key agreement scheme for Energy Internet based Vehicle-to-Grid technology framework
A Irshad, M Usman, SA Chaudhry, H Naqvi, M Shafiq
IEEE Transactions on Industry Applications, 2020
Security & Privacy in IoT Using Machine Learning & Blockchain: Threats & Countermeasures
N Waheed, X He, M Usman, M Usman
CoRR, 2020
Mobile agent-based cross-layer anomaly detection in smart home sensor networks using fuzzy logic
M Usman, V Muthukkumarasamy, XW Wu
IEEE Transactions on Consumer Electronics 61 (2), 197 - 205, 2015
Mobile agent based hierarchical intrusion detection system in wireless sensor networks
S Khanum, M Usman, A Alwabel
International Journal of Computer Science Issues (IJCSI) 9 (1), 101, 2012
Wireless smart home sensor networks: mobile agent based anomaly detection
M Usman, V Muthukkumarasamy, XW Wu, S Khanum
2012 9th International Conference on Ubiquitous Intelligence and Computing …, 2012
Securing mobile agent based wireless sensor network applications on middleware
M Usman, V Muthukkumarasamy, XW Wu, S Khanum
2012 International symposium on communications and information technologies …, 2012
An improved lightweight multi-server authentication scheme
A Irshad, S Ashraf Chaudhry, S Kumari, M Usman, K Mahmood, ...
International Journal of Communication Systems, 2017
Energy-efficient intrusion detection system for wireless sensor network based on MUSK architecture
S Khanum, M Usman, K Hussain, R Zafar, M Sher
High Performance Computing and Applications, 212-217, 2010
Trust Establishment and Estimation in Cloud Services: A Systematic Literature Review
KMM Usman
Journal of Network and Systems Management, 1-52, 2018
Multiple access control for cognitive radio-based IEEE 802.11 ah networks
M Shafiq, M Ahmad, A Irshad, M Gohar, M Usman, M Khalil Afzal, JG Choi, ...
Sensors 18 (7), 2043, 2018
An Energy Efficient Clique Based Clustering and Routing Mechanism in Wireless Sensor Networks
K Biswas, V Muthukkumarasamy, E Sithirasenan, M Usman
in proceedings of the 9th IEEE International Wireless Communications and …, 2013
Security Enhancement in MANET Authentication by checking the CRL Status of Servers
A Irshad, W Noshairwan, M Shafiq, S Khurram, E Irshad, M Usman
Int J Adv Sci Technol 1, 91-98, 2008
Fuzzy-in-the-Loop Driven Low Cost and Secure Biometric User Access to Server
A Irshad, M Usman, SA Chaudhry, AK Bashir, A Jolfaei, G Srivastav
IEEE Transactions on Reliability, 2020
A provable and secure mobile user authentication Scheme for Mobile Cloud Computing Services
A Irshad, SA Chaudhry, M Shafiq, M Usman, M Asif, A Ghani
International Journal of Communication Systems, 2019
A Human-in-the-Loop Probabilistic CNN-FuzzyLogic Framework for Accident Prediction inVehicular Networks
A Usman, M.: Carie, B Marapelli, HD Bedru, K Biswas
IEEE Sensors Journal, 2020
Group Mobility in Mobile Ad hoc Networks
E Irshad, W Noshairwain, M Usman, A Irshad, M Gilani
WWW/Internet, IADIS Germany 102, 2008
Performance Evaluation of Group Mobility in Mobile Ad hoc Networks
EI Ehtsham Irshad, WN Wajahat Noshairwan, MS Muhammad Shafiq, ...
International Journal of Future Generation Communication and Networking 4 (1 …, 2011
Cryptanalysis and improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee’s Scheme
" A. Irshad, H. Naqvi, S. Ashraf Chaudhary, M. Usman, M. Shafiq, O. Mir, and ...
Information Technology and Control 47 (3), 2018
Formal verification of mobile agent based anomaly detection in wireless sensor networks
M Usman, V Muthukkumarasamy, XW Wu
38th Annual IEEE Conference on Local Computer Networks-Workshops, 1001-1009, 2013
The system can't perform the operation now. Try again later.
Articles 1–20