Clustering by fast search and find of density peaks via heat diffusion R Mehmood, G Zhang, R Bie, H Dawood, H Ahmad Neurocomputing 208, 210-217, 2016 | 179 | 2016 |
Sentiment analysis of extremism in social media from textual information M Asif, A Ishtiaq, H Ahmad, H Aljuaid, J Shah Telematics and Informatics 48, 101345, 2020 | 136 | 2020 |
Fuzzy Clustering by Fast Search and Find of Density Peaks R Mehmood, H Dawood, B Rongfang, H Ahmad International Conference on Identification, Information, and Knowledge in …, 2015 | 134* | 2015 |
A robust mutual authentication scheme based on elliptic curve cryptography for telecare medical information systems S Qiu, G Xu, H Ahmad, L Wang IEEE access 6, 7452-7463, 2017 | 108 | 2017 |
The trade-environment nexus in light of governance: a global potential R Yasmeen, Y Li, M Hafeez, H Ahmad Environmental Science and Pollution Research 25, 34360-34379, 2018 | 94 | 2018 |
Key-policy attribute-based encryption with equality test in cloud computing H Zhu, L Wang, H Ahmad, X Niu IEEE Access 5, 20428-20439, 2017 | 82 | 2017 |
Do environmental technology and banking sector development matter for green growth? Evidence from top-polluted economies M Ahmed, M Hafeez, MA Kaium, S Ullah, H Ahmad Environmental Science and Pollution Research 30 (6), 14760-14769, 2023 | 60 | 2023 |
Prediction of rising stars in the game of cricket H Ahmad, A Daud, L Wang, H Hong, H Dawood, Y Yang IEEE Access 5, 4104-4124, 2017 | 55 | 2017 |
A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography G Xu, S Qiu, H Ahmad, G Xu, Y Guo, M Zhang, H Xu Sensors 18 (7), 2394, 2018 | 46 | 2018 |
Anonymous Communication via Anonymous Identity‐Based Encryption and Its Application in IoT L Jiang, T Li, X Li, M Atiquzzaman, H Ahmad, X Wang Wireless Communications and Mobile Computing 2018 (1), 6809796, 2018 | 39 | 2018 |
Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption J Li, X Li, L Wang, D He, H Ahmad, X Niu Soft Computing 22, 707-714, 2018 | 36 | 2018 |
A New Anti-Quantum Proxy Blind Signature for Blockchain-Enabled Internet of Things. C Li, G Xu, Y Chen, H Ahmad, J Li Computers, Materials & Continua 61 (2), 2019 | 35 | 2019 |
An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography S Qiu, G Xu, H Ahmad, G Xu, X Qiu, H Xu KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS 13 (02), 2019 | 29 | 2019 |
Image and command hybrid model for vehicle control using Internet of Vehicles KR Malik, M Ahmad, S Khalid, H Ahmad, F Al‐Turjman, S Jabbar Transactions on Emerging Telecommunications Technologies 31 (5), e3774, 2020 | 28 | 2020 |
Ligature based Urdu Nastaleeq sentence recognition using gated bidirectional long short term memory I Ahmad, X Wang, YH Mao, G Liu, H Ahmad, R Ullah Cluster Computing 21, 703-714, 2018 | 27 | 2018 |
LoRaWAN: state of the art, challenges, protocols and research issues HU Rahman, M Ahmad, H Ahmad, MA Habib 2020 IEEE 23rd International Multitopic Conference (INMIC), 1-6, 2020 | 26 | 2020 |
An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy S Qiu, G Xu, H Ahmad, Y Guo PloS one 13 (3), e0194072, 2018 | 26 | 2018 |
Vehicular communication network enabled CAV data offloading: A review M Ahmed, MA Mirza, S Raza, H Ahmad, F Xu, WU Khan, Q Lin, Z Han IEEE Transactions on Intelligent Transportation Systems 24 (8), 7869-7897, 2023 | 22 | 2023 |
Construction of DNA codes by using algebraic number theory Haibo Hong, Licheng Wang, Haseeb Ahmad, Jing Li, Yixian Yang, Changzhong Wu Finite Fields and Their Applications 37, 328-343, 2016 | 17 | 2016 |
Challenges of fully homomorphic encryptions for the internet of things L Wang, J Li, H Ahmad IEICE TRANSACTIONS on Information and Systems 99 (8), 1982-1990, 2016 | 14 | 2016 |