​
Login / Signup
Muhammad Usman
ORCID
Publication Activity (10 Years)
Years Active: 2009-2022
Publications (10 Years): 13
Top Topics
Sensor Networks
Key Agreement
Lightweight
Authentication Scheme
Top Venues
Inf. Technol. Control.
J. Networks
Int. J. Commun. Syst.
CoRR
</>
Publications
</>
Khalid Hasan
,
Mohammad Jabed Morshed Chowdhury
,
Kamanashis Biswas
,
Khandakar Ahmed
,
Md. Saiful Islam
,
Muhammad Usman
A blockchain-based secure data-sharing framework for Software Defined Wireless Body Area Networks.
Comput. Networks
211 (2022)
Alireza Jolfaei
,
Muhammad Usman
,
Manuel Roveri
,
Michael Sheng
,
Marimuthu Palaniswami
,
Krishna Kant
Guest Editorial: Computational Intelligence for Human-in-the-Loop Cyber Physical Systems.
IEEE Trans. Emerg. Top. Comput. Intell.
6 (1) (2022)
Mohammad Jabed Morshed Chowdhury
,
Muhammad Usman
,
Md. Sadek Ferdous
,
Niaz Chowdhury
,
Anam Ibna Harun
,
Umme Sumaya Jannat
,
Kamanashis Biswas
A Cross-Layer Trust-Based Consensus Protocol for Peer-to-Peer Energy Trading Using Fuzzy Logic.
IEEE Internet Things J.
9 (16) (2022)
Nazar Waheed
,
Xiangjian He
,
Muhammad Ikram
,
Muhammad Usman
,
Saad Sajid Hashmi
,
Muhammad Usman
Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures.
ACM Comput. Surv.
53 (6) (2021)
Azeem Irshad
,
Muhammad Usman
,
Shehzad Ashraf Chaudhry
,
Ali Kashif Bashir
,
Alireza Jolfaei
,
Gautam Srivastava
Fuzzy-in-the-Loop-Driven Low-Cost and Secure Biometric User Access to Server.
IEEE Trans. Reliab.
70 (3) (2021)
Abdul Rehman Javed
,
Muhammad Usman
,
Saif Ur Rehman
,
Mohib Ullah Khan
,
Mohammad Sayad Haghighi
Anomaly Detection in Automated Vehicles Using Multistage Attention-Based Convolutional Neural Network.
IEEE Trans. Intell. Transp. Syst.
22 (7) (2021)
Nazar Waheed
,
Xiangjian He
,
Muhammad Usman
,
Muhammad Usman
Security & Privacy in IoT Using Machine Learning & Blockchain: Threats & Countermeasures.
CoRR
(2020)
Azeem Irshad
,
Shehzad Ashraf Chaudhry
,
Muhammad Shafiq
,
Muhammad Usman
,
Muhammad Asif
,
Anwar Ghani
A provable and secure mobile user authentication scheme for mobile cloud computing services.
Int. J. Commun. Syst.
32 (14) (2019)
Azeem Irshad
,
Shehzad Ashraf Chaudhry
,
Muhammad Shafiq
,
Muhammad Usman
,
Muhammad Asif
,
Saru Kumari
An Improved Biometric Multi-Server Authentication Scheme for Chang et al.'s Protocol.
Inf. Technol. Control.
48 (2) (2019)
Muhammad Shafiq
,
Maqbool Ahmad
,
Azeem Irshad
,
Moneeb Gohar
,
Muhammad Usman
,
Muhammad Khalil Afzal
,
Jin-Ghoo Choi
,
Heejung Yu
Multiple Access Control for Cognitive Radio-Based IEEE 802.11ah Networks.
Sensors
18 (7) (2018)
Azeem Irshad
,
Husnain Naqvi
,
Shehzad Ashraf Chaudhry
,
Muhammad Usman
,
Muhammad Shafiq
,
Omid Mir
,
Ambrina Kanwal
Cryptanalysis and improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee's Scheme.
Inf. Technol. Control.
47 (3) (2018)
Azeem Irshad
,
Husnain Naqvi
,
Shehzad Ashraf Chaudhry
,
Shouket Raheem
,
Saru Kumari
,
Ambrina Kanwal
,
Muhammad Usman
An efficient and secure design of multi-server authenticated key agreement protocol.
J. Supercomput.
74 (9) (2018)
Azeem Irshad
,
Shehzad Ashraf Chaudhry
,
Saru Kumari
,
Muhammad Usman
,
Khalid Mahmood
,
Muhammad Shahzad Faisal
An improved lightweight multiserver authentication scheme.
Int. J. Commun. Syst.
30 (17) (2017)
Muhammad Usman
,
Vallipuram Muthukkumarasamy
,
Xin-Wen Wu
Specification and Validation of Enhanced Mobile Agent-Enabled Anomaly Detection and Verification in Resource Constrained Networks.
J. Networks
10 (6) (2015)
Muhammad Usman
,
Vallipuram Muthukkumarasamy
,
Xin-Wen Wu
Mobile agent-based cross-layer anomaly detection in smart home sensor networks using fuzzy logic.
IEEE Trans. Consumer Electron.
61 (2) (2015)
Muhammad Usman
,
Vallipuram Muthukkumarasamy
,
Xin-Wen Wu
A Resource-Efficient System for Detection and Verification of Anomalies Using Mobile Agents in Wireless Sensor Networks.
J. Networks
9 (12) (2014)
Muhammad Usman
Agent-enabled anomaly detection in resource constrained wireless sensor networks.
WoWMoM
(2014)
Kamanashis Biswas
,
Vallipuram Muthukkumarasamy
,
Elankayer Sithirasenan
,
Muhammad Usman
An energy efficient clique based clustering and routing mechanism in wireless sensor networks.
IWCMC
(2013)
Muhammad Usman
,
Vallipuram Muthukkumarasamy
,
Xin-Wen Wu
Formal verification of mobile agent based anomaly detection in Wireless Sensor Networks.
LCN Workshops
(2013)
Muhammad Usman
,
Vallipuram Muthukkumarasamy
,
Xin-Wen Wu
,
Surraya Khanum
Wireless Smart Home Sensor Networks: Mobile Agent Based Anomaly Detection.
UIC/ATC
(2012)
Muhammad Usman
,
Vallipuram Muthukkumarasamy
,
Xin-Wen Wu
,
Surraya Khanum
Securing mobile agent based Wireless Sensor Network applications on middleware.
ISCIT
(2012)
Ehtsham Irshad
,
Wajahat Noshairwan
,
Muhammad Shafiq
,
Shahzada Khurram
,
Azeem Irshad
,
Muhammad Usman
Performance Evaluation Analysis of Group Mobility in Mobile Ad Hoc Networks.
SUComS
(2010)
Azeem Irshad
,
Wajahat Noshairwan
,
Muhammad Shafiq
,
Shahzada Khurram
,
Ehtsham Irshad
,
Muhammad Usman
Security Enhancement for Authentication of Nodes in MANET by Checking the CRL Status of Servers.
SUComS
(2010)
Muhammad Usman
,
Surraya Khanum
,
Wajahat Noshairwan
,
Ehtsham Irshad
,
Azeem Irshad
Performance Evaluation of Authentication Certificate Based Seamless Vertical Handoff in GPRS-WLAN.
HPCA (China)
(2009)
Surraya Khanum
,
Muhammad Usman
,
Khalid Hussain
,
Rehab Zafar
,
Muhammad Sher
Energy-Efficient Intrusion Detection System for Wireless Sensor Network Based on MUSK Architecture.
HPCA (China)
(2009)