Follow
Dr. Gauhar Ali
Dr. Gauhar Ali
Post Doctoral Fellowship, Prince Sultan University, Saudia Arabia
Verified email at psu.edu.sa
Title
Cited by
Cited by
Year
Blockchain based permission delegation and access control in Internet of Things (BACI)
G Ali, N Ahmad, Y Cao, M Asif, H Cruickshank, QE Ali
Computers & Security 86, 318-334, 2019
982019
xDBAuth: Blockchain based cross domain authentication and authorization framework for Internet of Things
G Ali, N Ahmad, Y Cao, S Khan, H Cruickshank, EA Qazi, A Ali
IEEE access 8, 58800-58816, 2020
822020
Issues, challenges, and research opportunities in intelligent transport system for security and privacy
QE Ali, N Ahmad, AH Malik, G Ali, WU Rehman
Applied Sciences 8 (10), 1964, 2018
552018
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
M Alam, X Zhang, K Khan, G Ali
Proceedings of the 16th ACM symposium on Access control models and …, 2011
482011
BCON: Blockchain based access CONtrol across multiple conflict of interest domains
G Ali, N Ahmad, Y Cao, QE Ali, F Azim, H Cruickshank
Journal of Network and Computer Applications 147, 102440, 2019
242019
A UAV-Swarm-Communication Model Using a Machine-Learning Approach for Search-and-Rescue Applications
MEA Hisham Khalil, Saeed Ur Rahman, Inam Ullah, Inayat Khan, Abdulaziz ...
Drones 6 (12), 372, 2022
212022
A comprehensive survey of Energy-Efficient Mac and Routing protocols for Underwater Wireless Sensor Networks.
JK Zahid Ullah Khan *, Qiao Gang, Aman Muhammad, Muhammad Muzzammil, Sajid ...
Electronics 11, 3015, 2022
162022
ASPA: Advanced strong pseudonym based authentication in intelligent transport system
QE Ali, N Ahmad, AH Malik, WU Rehman, AU Din, G Ali
PloS one 14 (8), e0221213, 2019
152019
An Efficient and Secure Energy Trading Approach with Machine Learning Technique and Consortium Blockchain
AM Tehreem Ashfaq, Muhammad Irfan Khalid, Gauhar Ali, Mohammad El Affendi ...
Sensors 22 (19), 7263, 2022
142022
Spata: Strong pseudonym-based authentication in intelligent transport system
QE Ali, N Ahmad, AH Malik, G Ali, M Asif, M Khalid, Y Cao
IEEE Access 6, 79114-79128, 2018
112018
Intrusion Detection in the Internet of Things Using Fusion of GRU-LSTM Deep Learning Model
MEA Mohammad S. Al-kahtani, Zahid Mehmood, Tariq Sadad, Islam Zada, Gauhar Ali
Intelligence Automation and Soft Computing 37 (2), 2279-2290, 2023
10*2023
Performance evaluation of routing protocols for underwater wireless sensor networks
T Rahman, I Ahmad, A Zeb, I Khan, G Ali, M ElAffendi
Journal of Marine Science and Engineering 11 (1), 38, 2022
72022
Proof of pseudonym: Blockchain-based privacy preserving protocol for intelligent transport system
S Johar, N Ahmad, A Durrani, G Ali
IEEE Access 9, 163625-163639, 2021
72021
BlockAuth: A blockchain-based framework for secure vehicle authentication and authorization
G Ali, M Elaffendi, N Ahmad
PLoS ONE, 2023
62023
An improved multiple manoeuver management protocol for platoon mobility in vehicular ad hoc networks
NA Fida, N Ahmad, Y Cao, MA Jan, G Ali
IET Intelligent Transport Systems 15 (7), 886-901, 2021
52021
Towards a formal framework for cross domain access control
Q Alam, M Alam, G Ali, F Azim, KH Khan, T Ali, M Ali, A Hayat
International Information Institute (Tokyo). Information 15 (10), 4303, 2012
52012
Digital information credibility: Towards a set of guidelines for quality assessment of grey literature in multivocal literature review
MF Abrar, MS Khan, I Khan, G Ali, S Shah
Applied Sciences 13 (7), 4483, 2023
42023
TILPDeep: A Lightweight Deep Learning Technique for Handwritten Transformed Invariant Pashto Text Recognition
M Shabir, Z Jan, N Islam, I Khan, G Ali, M ElAffendi
IEEE Access 11, 23393-23406, 2023
42023
Robust Benchmark for Propagandist Text Detection and Mining High-Quality Data
PN Ahmad, Y Liu, G Ali, MA Wani, M ElAffendi
Mathematics 11 (12), 2668, 2023
22023
Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)
M Hussain, NK Baloach, G Ali, M ElAffendi, IB Dhaou, SS Ullah, M Uddin
Micromachines 14 (4), 828, 2023
22023
The system can't perform the operation now. Try again later.
Articles 1–20