Muhammad Waqas
Muhammad Waqas
Centre for Sustainable Cyber Security (CS2)
Verified email at
Cited by
Cited by
Security and Privacy in Device-to-Device (D2D) Communication: A Review
M Huss, M Waqas, A Ding, yi, Y Li, S Tarkoma, J Ott
IEEE Communication Surveys & tutorials, 2017
A Comprehensive Survey on Mobility-Aware Device-to-Device Communications: Principles, Practice and Challenges
M Waqas, Y Niu, Y Li, M Ahmed, D Jin, S Chen, Z Han
IEEE Communications Surveys & Tutorials 22 (3), 1863 - 1886, 2019
A Survey on Socially-Aware Device-to-Device Communications
M Ahmed, Y Li, M Waqas, M Sheraz, D Jin, Z Han
IEEE Communications Surveys & Tutorials 20 (3), 2169-2197, 2018
An effective genetic algorithm-based feature selection method for intrusion detection systems
Z Halim, NM Yousaf, M Waqas, M Sulaiman, G Abbas, M Hussain, ...
Computer & Security 2021 (110), 102448, 2021
Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack
S Tu, M Waqas, S Rehman, M Aamir, O Rehman, Z Jianbiao, CC Chang
IEEE Access 6, 74993-75001, 2019
The Role of Artificial Intelligence and Machine Learning in Wireless Networks Security: Principle, Practice and Challenges
M Waqas, S Tu, Z Halim, S Rehman, G Abbas, ZH Abbas
Artificial Intelligence Review, 2022
Social-Aware Secret Key Generation for Secure Device-to-Device Communication via Trusted and Non-Trusted Relays
M Waqas, M Ahmed, Y Li, D Jin, S Chen
IEEE Transactions on Wireless Communications (TWC) 17 (6), 3918-3930, 2018
Reinforcement Learning Assisted Impersonation Attack Detection in Device-to-Device Communications
S Tu, M Waqas, S Rehman, T Mir, G Abbas, ZH Abbas, Z Halim, I Ahmad
IEEE Transactions on Vehicular Technology 70 (2), 1474 - 1479, 2021
Mobility-Aware Fog Computing in Dynamic Environments: Understandings and Implementation
M Waqas, Y Niu, J He, M Ahmed, X Chen, Y Li, D Jin, ZH Han
IEEE Access 7, 38867 - 38879, 2018
Incentive Mechanism Design for Computation Offloading in Heterogeneous Fog Computing: A Contract-Based Approach
M zeng, Y Li, K Zhang, M Waqas, D Jin
2018 IEEE International Conference on Communications (ICC), 1-6, 2018
Socially-Aware Secrecy-Ensured Resource Allocation in D2D Underlay Communication: An Overlapping Coalitional Game Scheme
M Ahmed, H Shi, X Chen, Y Li, M Waqas, D Jin
IEEE Transactions on Wireless Communications 17 (6), 4118 - 4133, 2018
A novel binary chaotic genetic algorithm for feature selection and its utility in affective computing and healthcare
M Tahir, A Tubaishat, F Al-Obeidat, B Shah, Z Halim, M Waqas
Neural Computing and Applications, 11453–11474, 2020
A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing
S Tu, M Waqas, F Huang, G Abbas, ZH Abbas
Computer Networks 195 (2021), 108196, 2021
Unsupervised pre-trained filter learning approach for efficient convolution neural network
S Rehman, T S., M Waqas, Y Huang, O Rehman, B Ahmad, S Ahmad
Neurocomputing 365, 171--190, 2019
An Evolutionary Computing-Based Efficient Hybrid Task Scheduling Approach for Heterogeneous Computing Environment
M Sulaiman, Z Halim, M Lebbah, M Waqas, S Tu
J Grid Computing 19 (11), 2021
EEMDS: An Effective Emergency Message Dissemination Scheme for Urban VANETs
S Ullah, G Abbas, M Waqas, ZH Abbas, S Tu, AI Hameed
Sensors 21, 1588, 2021
Intrusion Detection Based on Bidirectional Long Short-Term Memory with Attention Mechanism
Y Yang, S Tu, HR Ali, H Alasmary, M Waqas, NM Amjad
Computers, Materials & Continua 74 (1), 801-815, 2022
S6AE: Securing 6LoWPAN Using Authenticated Encryption Scheme
M Tanveer, G Abbas, Z Abbas, Haq, M Waqas, F Muhammad, S Kim
Sensors 20 (9), 2707, 2020
Social Phenomena and Fog Computing Networks: A Novel Perspective for Future Networks
S Tu, M Waqas, S Rehman, T Mir, Z Halim, I Ahmad
IEEE Transactions on Computational Social Systems, 2021
RBO-EM: Reduced Broadcast Overhead Scheme for Emergency Message Dissemination in VANETs
S Ullah, G Abbas, ZH Abbas, M Waqas, M Ahmed
IEEE Access 8, 175205 - 175219, 2020
The system can't perform the operation now. Try again later.
Articles 1–20