Follow
Haseeb Ahmad
Haseeb Ahmad
Verified email at bupt.edu.cn
Title
Cited by
Cited by
Year
Clustering by fast search and find of density peaks via heat diffusion
R Mehmood, G Zhang, R Bie, H Dawood, H Ahmad
Neurocomputing 208, 210-217, 2016
1732016
Sentiment analysis of extremism in social media from textual information
M Asif, A Ishtiaq, H Ahmad, H Aljuaid, J Shah
Telematics and Informatics 48, 101345, 2020
1262020
Fuzzy Clustering by Fast Search and Find of Density Peaks
R Mehmood, H Dawood, B Rongfang, H Ahmad
International Conference on Identification, Information, and Knowledge in …, 2015
125*2015
A robust mutual authentication scheme based on elliptic curve cryptography for telecare medical information systems
S Qiu, G Xu, H Ahmad, L Wang
IEEE access 6, 7452-7463, 2017
1032017
The trade-environment nexus in light of governance: a global potential
R Yasmeen, Y Li, M Hafeez, H Ahmad
Environmental Science and Pollution Research 25, 34360-34379, 2018
842018
Key-policy attribute-based encryption with equality test in cloud computing
H Zhu, L Wang, H Ahmad, X Niu
IEEE Access 5, 20428-20439, 2017
782017
Prediction of rising stars in the game of cricket
H Ahmad, A Daud, L Wang, H Hong, H Dawood, Y Yang
IEEE Access 5, 4104-4124, 2017
582017
Do environmental technology and banking sector development matter for green growth? Evidence from top-polluted economies
M Ahmed, M Hafeez, MA Kaium, S Ullah, H Ahmad
Environmental Science and Pollution Research 30 (6), 14760-14769, 2023
492023
A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography
G Xu, S Qiu, H Ahmad, G Xu, Y Guo, M Zhang, H Xu
Sensors 18 (7), 2394, 2018
452018
Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption
J Li, X Li, L Wang, D He, H Ahmad, X Niu
Soft Computing 22, 707-714, 2018
362018
Anonymous communication via anonymous identity-based encryption and its application in IoT
L Jiang, T Li, X Li, M Atiquzzaman, H Ahmad, X Wang
Wireless Communications and Mobile Computing 2018, 1-8, 2018
352018
A New Anti-Quantum Proxy Blind Signature for Blockchain-Enabled Internet of Things.
C Li, G Xu, Y Chen, H Ahmad, J Li
Computers, Materials & Continua 61 (2), 2019
342019
An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography
S Qiu, G Xu, H Ahmad, G Xu, X Qiu, H Xu
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS 13 (02), 2019
272019
Ligature based Urdu Nastaleeq sentence recognition using gated bidirectional long short term memory
I Ahmad, X Wang, YH Mao, G Liu, H Ahmad, R Ullah
Cluster Computing 21, 703-714, 2018
262018
Image and command hybrid model for vehicle control using Internet of Vehicles
KR Malik, M Ahmad, S Khalid, H Ahmad, F Al‐Turjman, S Jabbar
Transactions on Emerging Telecommunications Technologies 31 (5), e3774, 2020
252020
An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy
S Qiu, G Xu, H Ahmad, Y Guo
PloS one 13 (3), e0194072, 2018
252018
Construction of DNA codes by using algebraic number theory
Haibo Hong, Licheng Wang, Haseeb Ahmad, Jing Li, Yixian Yang, Changzhong Wu
Finite Fields and Their Applications 37, 328-343, 2016
162016
Challenges of fully homomorphic encryptions for the internet of things
L Wang, J Li, H Ahmad
IEICE TRANSACTIONS on Information and Systems 99 (8), 1982-1990, 2016
142016
Cost effective scheme for OLT in next generation passive optical access network based on noise free optical multi carrier
R Ullah, B Liu, Q Zhang, Q Tian, A Ali, Y Khan, F Tian, MA Zia, H Ahmad, ...
China Communications 13 (6), 76-87, 2016
132016
Evaluating the trustworthiness in sharing economy: a case study of DiDi Users in Shanxi, China
G Zhao, J Jahangir, MW Akbar, M Hafeez, H Ahmad
Proceedings of the Fourteenth International Conference on Management Science …, 2021
122021
The system can't perform the operation now. Try again later.
Articles 1–20