default search action
Muhammad Fahad Khan
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Sajjad Shaukat Jamal, Mohammad Mazyad Hazzazi, Muhammad Fahad Khan, Zaid Bassfar, Amer Aljaedi, Zain Ul Islam:
Region of interest-based medical image encryption technique based on chaotic S-boxes. Expert Syst. Appl. 238(Part E): 122030 (2024) - 2023
- [j23]Adel R. Alharbi, Sajjad Shaukat Jamal, Muhammad Fahad Khan, Muhammad Asif Gondal, Aaqif Afzaal Abbasi:
Construction and Optimization of Dynamic S-Boxes Based on Gaussian Distribution. IEEE Access 11: 35818-35829 (2023) - [j22]Asad Ali, Farhan Aadil, Muhammad Fahad Khan, Muazzam Maqsood, Sangsoon Lim:
Harris Hawks Optimization-Based Clustering Algorithm for Vehicular Ad-Hoc Networks. IEEE Trans. Intell. Transp. Syst. 24(6): 5822-5841 (2023) - 2022
- [i11]Muhammad Fahad Khan, Khalid Saleem, Tariq Shah, Mohammad Mazyad Hazzazi, Ismail Bahkali, Piyush Kumar Shukla:
Block Ciphers Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knights Tour Chain. CoRR abs/2205.13593 (2022) - [i10]Muhammad Fahad Khan, Khalid Saleem, Mohammed Alotaibi, Mohammad Mazyad Hazzazi, Eid Rehman, Aaqif Afzaal Abbasi, Muhammad Asif Gondal:
Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms. CoRR abs/2206.09424 (2022) - [i9]Muhammad Fahad Khan, Khalid Saleem, Tariq Shah, Mohammad Mazyad Hazzazi, Ismail Bahkali, Piyush Kumar Shukla:
Block Cipher's Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight's Tour Chain. IACR Cryptol. ePrint Arch. 2022: 787 (2022) - 2021
- [j21]Rabiya Ghafoor, Danish Saleem, Sajjad Shaukat Jamal, Muhammad Ishtiaq, Sadaf Ejaz, Arif Jamal Malik, Muhammad Fahad Khan:
Survey on Reversible Watermarking Techniques of Echocardiography. Secur. Commun. Networks 2021: 8820082:1-8820082:19 (2021) - [j20]Muhammad Fahad Khan, Muqaddas Bibi, Farhan Aadil, Jong-Weon Lee:
Adaptive Node Clustering for Underwater Sensor Networks. Sensors 21(13): 4514 (2021) - 2020
- [j19]Ghazanfar Farooq Siddiqui, Muhammad Zafar Iqbal, Khalid Saleem, Zafar Saeed, Adeel Ahmed, Ibrahim A. Hameed, Muhammad Fahad Khan:
A Dynamic Three-Bit Image Steganography Algorithm for Medical and e-Healthcare Systems. IEEE Access 8: 181893-181903 (2020) - [j18]Ali Raza, Muhammad Fahad Khan, Muazzam Maqsood, Bilal Haider Bukhari, Farhan Aadil:
Adaptive k-means clustering for Flying Ad-hoc Networks. KSII Trans. Internet Inf. Syst. 14(6): 2670-2685 (2020) - [j17]Muhammad Fahad Khan, Kok-Lim Alvin Yau, Rafidah Md Noor, Muhammad Ali Imran:
Survey and taxonomy of clustering algorithms in 5G. J. Netw. Comput. Appl. 154: 102539 (2020) - [j16]Muhammad Fahad Khan, Kok-Lim Alvin Yau, Rafidah Md Noor, Muhammad Ali Imran:
Routing Schemes in FANETs: A Survey. Sensors 20(1): 38 (2020) - [c5]Muhammad Fahad Khan, Kok-Lim Alvin Yau:
Route Selection in 5G-based Flying Ad-hoc Networks using Reinforcement Learning. ICCSCE 2020: 23-28
2010 – 2019
- 2019
- [j15]Muhammad Fahad Khan, Farhan Aadil, Muazzam Maqsood, Syed Hashim Raza Bukhari, Maqbool Hussain, Yunyoung Nam:
Moth Flame Clustering Algorithm for Internet of Vehicle (MFCA-IoV). IEEE Access 7: 11613-11629 (2019) - [j14]Muhammad Fahad Khan, Adeel Ahmed, Khalid Saleem:
A Novel Cryptographic Substitution Box Design Using Gaussian Distribution. IEEE Access 7: 15999-16007 (2019) - [j13]Muhammad Fahad Khan, Adeel Ahmed, Khalid Saleem, Tariq Shah:
A Novel Design of Cryptographic SP-Network Based on Gold Sequences and Chaotic Logistic Tent System. IEEE Access 7: 84980-84991 (2019) - [j12]Sajjad Shaukat Jamal, Amir Anees, Musheer Ahmad, Muhammad Fahad Khan, Iqtadar Hussain:
Construction of Cryptographic S-Boxes Based on Mobius Transformation and Chaotic Tent-Sine System. IEEE Access 7: 173273-173285 (2019) - [j11]Zeshan Qureshi, Peer Azmat Shah, Najam Ul Hasan, Sadaf Yasmin, Farhan Aadil, Muhammad Fahad Khan, Yunyoung Nam, Sehar Shahzad Farooq:
Fuzzy Logic-based Efficient Interest Forwarding (FLEIF) in Named Data Networking. Trans. Emerg. Telecommun. Technol. 30(9) (2019) - [j10]Atif Ishtiaq, Sheeraz Ahmed, Muhammad Fahad Khan, Farhan Aadil, Muazzam Maqsood, Salabat Khan:
Intelligent clustering using moth flame optimizer for vehicular ad hoc networks. Int. J. Distributed Sens. Networks 15(1) (2019) - [j9]Fouzia Jabeen, Muazzam Maqsood, Mustansar Ali Ghazanfar, Farhan Aadil, Salabat Khan, Muhammad Fahad Khan, Irfan Mehmood:
An IoT based efficient hybrid recommender system for cardiovascular disease. Peer-to-Peer Netw. Appl. 12(5): 1263-1276 (2019) - [c4]Muhammad Fahad Khan, Maliha Atteeq, Adnan N. Qureshi:
Computer Aided Detection of Normal and Abnormal Heart Sound using PCG. ICBBT 2019: 94-99 - [c3]Maliha Atteeq, Muhammad Fahad Khan, Adnan N. Qureshi:
Fetus Heart Beat Extraction from Mother's PCG Using Blind Source Separation. ICBBT 2019: 100-104 - [i8]Adeel Ahmed, Muhammad Fahad Khan, Muhammad Usman, Khalid Saleem:
Analysis of Coauthorship Network in Political Science using Centrality Measures. CoRR abs/1902.06692 (2019) - 2018
- [j8]Yasir Ali Shah, Hafiz Adnan Habib, Farhan Aadil, Muhammad Fahad Khan, Muazzam Maqsood, Tabassam Nawaz:
CAMONET: Moth-Flame Optimization (MFO) Based Clustering Algorithm for VANETs. IEEE Access 6: 48611-48624 (2018) - [j7]Muhammad Fahad Khan, Farhan Aadil, Zahoor-Ur Rehman, Salabat Khan, Peer Azmat Shah, Khan Muhammad, Jaime Lloret, Haoxiang Wang, Jong Weon Lee, Irfan Mehmood:
Grey wolf optimization based clustering algorithm for vehicular ad-hoc networks. Comput. Electr. Eng. 70: 853-870 (2018) - [j6]Muhammad Fahad Khan, Farhan Aadil, Muazzam Maqsood, Salabat Khan, Bilal Haider Bukhari:
An Efficient Optimization Technique for Node Clustering in VANETs Using Gray Wolf Optimization. KSII Trans. Internet Inf. Syst. 12(9): 4228-4247 (2018) - [j5]Farhan Aadil, Ali Raza, Muhammad Fahad Khan, Muazzam Maqsood, Irfan Mehmood, Seungmin Rho:
Energy Aware Cluster-Based Routing in Flying Ad-Hoc Networks. Sensors 18(5): 1413 (2018) - [c2]Rehan Tariq, Farhan Aadil, Muhammad Faizan Malik, Sadia Ejaz Sheikh, Muhammad Umair Khan, Muhammad Fahad Khan:
Directed Acyclic Graph Based Task Scheduling Algorithm for Heterogeneous Systems. IntelliSys (2) 2018: 936-947 - 2017
- [c1]Muhammad Fahad Khan, Farhan Aadil, Salabat Khan:
Optimization of vehicular node clustering process using evolutionary algorithms. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-5 - 2016
- [j4]Farhan Aadil, Salabat Khan, Khalid Bashir Bajwa, Muhammad Fahad Khan, Asad Ali:
Intelligent Clustering in Vehicular ad hoc Networks. KSII Trans. Internet Inf. Syst. 10(8): 3512-3528 (2016) - [i7]Saira Beg, Muhammad Fahad Khan, Faisal Baig:
Compress Voice Transference over low Signal Strength in Satellite Communication. CoRR abs/1604.07593 (2016) - [i6]Saira Beg, Muhammad Fahad Khan, Faisal Baig:
Text writing in the air. CoRR abs/1604.08245 (2016) - [i5]Muhammad Fahad Khan, Faisal Baig, Saira Beg:
Steganography between Silence Intervals of Audio in Video Content Using Chaotic Maps. CoRR abs/1610.04346 (2016) - 2014
- [j3]Muhammad Fahad Khan, Faisal Baig, Saira Beg:
Steganography Between Silence Intervals of Audio in Video Content Using Chaotic Maps. Circuits Syst. Signal Process. 33(12): 3901-3919 (2014) - 2013
- [j2]Saira Beg, Muhammad Fahad Khan, Faisal Baig:
Transference and retrieval of compress voice message over low signal strength in satellite communication. Int. J. Syst. Syst. Eng. 4(2): 174-186 (2013) - 2012
- [j1]Muhammad Fahad Khan, Saira Beg:
Transference and retrieval of voice message over low signal strength in satellite communication. Innov. Syst. Softw. Eng. 8(4): 293-299 (2012) - [i4]Muhammad Fahad Khan, Saira Beg:
Stereo image Transference & Retrieval over SMS. CoRR abs/1201.1383 (2012) - [i3]Muhammad Fahad Khan, Saira Beg:
Transference & Retrieval of Pulse-code modulation Audio over Short Messaging Service. CoRR abs/1205.4361 (2012) - [i2]Faisal Baig, Saira Beg, Muhammad Fahad Khan:
Controlling Home Appliances Remotely through Voice Command. CoRR abs/1212.1790 (2012) - 2011
- [i1]Muhammad Fahad Khan, Saira Beg:
Transferring Voice using SMS over GSM Network. CoRR abs/1112.5679 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint