A comprehensive review of computing paradigms, enabling computation offloading and task execution in vehicular networks A Waheed, MA Shah, SM Mohsin, A Khan, C Maple, S Aslam, ... IEEE Access 10, 3580-3600, 2022 | 44 | 2022 |
An energy efficient and balanced energy consumption cluster based routing protocol for underwater wireless sensor networks A Majid, I Azam, A Waheed, M Zain-ul-Abidin, T Hafeez, ZA Khan, ... 2016 IEEE 30th International Conference on Advanced Information Networking …, 2016 | 43 | 2016 |
VBPC: Velocity based pseudonym changing strategy to protect location privacy of vehicles in VANET I Ullah, A Wahid, MA Shah, A Waheed 2017 International conference on communication technologies (ComTech), 132-137, 2017 | 38 | 2017 |
An infrastructure-assisted job scheduling and task coordination in volunteer computing-based VANET A Waheed, MA Shah, A Khan, G Jeon Complex & Intelligent Systems 9 (4), 3613-3633, 2023 | 12 | 2023 |
Hybrid task coordination using multi-hop communication in volunteer computing-based VANETs A Waheed, MA Shah, A Khan, C Maple, I Ullah Sensors 21 (8), 2718, 2021 | 12 | 2021 |
Virtual pseudonym-changing and dynamic grouping policy for privacy preservation in vanets I Ullah, MA Shah, A Khan, C Maple, A Waheed Sensors 21 (9), 3077, 2021 | 11 | 2021 |
Volunteer computing in connected vehicles: opportunities and challenges A Waheed, MA Shah, A Khan, S ul Islam, S Khan, C Maple, MK Khan IEEE Network 34 (5), 212-218, 2020 | 11 | 2020 |
Laod: Link aware on demand routing in flying ad-hoc networks A Waheed, A Wahid, MA Shah 2019 IEEE International Conference on Communications Workshops (ICC …, 2019 | 10 | 2019 |
Provenance inference techniques: Taxonomy, comparative analysis and design challenges U Sheikh, A Khan, B Ahmed, A Waheed, A Hameed Journal of Network and Computer Applications 110, 11-26, 2018 | 8 | 2018 |
Secure login protocols: An analysis on modern attacks and solutions A Waheed, MA Shah, A Khan 2016 22nd International Conference on Automation and Computing (ICAC), 535-541, 2016 | 7 | 2016 |
A distributed mix-context-based method for location privacy in road networks I Ullah, MA Shah, A Khan, C Maple, A Waheed, G Jeon Sustainability 13 (22), 12513, 2021 | 4 | 2021 |
Empowering cloud of things with edge computing: A comparative analysis SM Mohsin, S Aslam, SMA Akber, A Iqbal, A Waheed, A Ikram 2020 International Conference on Information Science and Communication …, 2020 | 4 | 2020 |
Protection of enterprise resources: A novel security framework I Ullah, MA Shah, A Wahid, A Waheed 2017 International Conference on Communication Technologies (ComTech), 98-103, 2017 | 4 | 2017 |