default search action
Rafiullah Khan
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Nayab Fatima, Shazia Riaz, Saqib Ali, Rafiullah Khan, Mohib Ullah, Daehan Kwak:
Sensors Faults Classification and Faulty Signals Reconstruction Using Deep Learning. IEEE Access 12: 100544-100558 (2024) - [c27]Tobias Dörr, Florian Schade, Jürgen Becker, Georgios Keramidas, Nikos Petrellis, Vasilios I. Kelefouras, Michail Mavropoulos, Konstantinos Antonopoulos, Christos P. Antonopoulos, Nikolaos S. Voros, Alexander Ahlbrecht, Wanja Zaeske, Vincent Janson, Phillip Nöldeke, Umut Durak, Christos Panagiotou, Dimitris Karadimas, Nico Adler, Clemens Reichmann, Andreas Sailer, Raphael Weber, Thomas Wilhelm, Wolfgang Gabler, Katrin Weiden, Xavier Anzuela Recasens, Sakir Sezer, Fahad Siddiqui, Rafiullah Khan, Kieran McLaughlin, Sena Yengec Tasdemir, Balmukund Sonigara, Henry Hui, Esther Soriano Viguer, Aridane Álvarez Suárez, Vicente Nicolau Gallego, Manuel Muñoz Alcobendas, Miguel Masmano Tello:
XANDAR: An X-by-Construction Framework for Safety, Security, and Real-Time Behavior of Embedded Software Systems. DATE 2024: 1-6 - 2023
- [j24]Sana Zahir, Rafiullah Khan, Mohib Ullah, Muhammad Ishaq, Naqqash Dilshad, Amin Ullah, Mi Young Lee:
Robust Counting in Overcrowded Scenes Using Batch-Free Normalized Deep ConvNet. Comput. Syst. Sci. Eng. 46(3): 2741-2754 (2023) - [c26]Alperen Bolat, Fahad Siddiqui, Sakir Sezer, Kasim Tasdemir, Rafiullah Khan:
Investigation of Communication Overhead of SoC Lookaside Accelerators. SOCC 2023: 1-6 - [c25]Kasim Tasdemir, Rafiullah Khan, Fahad Siddiqui, Sakir Sezer, Fatih Kurugollu, Alperen Bolat:
An Investigation of Machine Learning Algorithms for High-bandwidth SQL Injection Detection Utilising BlueField-3 DPU Technology. SOCC 2023: 1-6 - [c24]Fahad Siddiqui, Rafiullah Khan, Sena Yengec Tasdemir, Henry Hui, Balmukund Sonigara, Sakir Sezer, Kieran McLaughlin:
Cybersecurity Engineering: Bridging the Security Gaps in Advanced Automotive Systems and ISO/SAE 21434. VTC2023-Spring 2023: 1-6 - [i3]Kasim Tasdemir, Rafiullah Khan, Fahad Siddiqui, Sakir Sezer, Fatih Kurugollu, Sena Busra Yengec-Tasdemir, Alperen Bolat:
Advancing SQL Injection Detection for High-Speed Data Centers: A Novel Approach Using Cascaded NLP. CoRR abs/2312.13041 (2023) - 2022
- [j23]Imran Ihsan, Mohib Ullah, Rafiullah Khan, Muhammad Irfan Uddin, Abdullah Alharbi, Wael Alosaimi:
SEAL: Semantically Enriched Authoring in LATEX - A Model for Scientific Discourse. IEEE Access 10: 13525-13535 (2022) - [j22]Emran Al-Buraihy, Wang Dan, Rafiullah Khan, Mohib Ullah:
An Ml-based classification scheme for analyzing the social network reviews of yemeni people. Int. Arab J. Inf. Technol. 19(6): 904-914 (2022) - [j21]Mohib Ullah, Rafiullah Khan, Irfan Ullah Khan, Nida Aslam, Sumayh S. Aljameel, Muhammad Inam Ul Haq, Muhammad Arshad Islam:
Profile Aware ObScure Logging (PaOSLo): A Web Search Privacy-Preserving Protocol to Mitigate Digital Traces. Secur. Commun. Networks 2022: 2109024:1-2109024:13 (2022) - [c23]Leonard Masing, Tobias Dörr, Florian Schade, Jürgen Becker, Georgios Keramidas, Christos P. Antonopoulos, Michail Mavropoulos, Efstratios Tiganourias, Vasilios I. Kelefouras, Konstantinos Antonopoulos, Nikos S. Voros, Umut Durak, Alexander Ahlbrecht, Wanja Zaeske, Christos Panagiotou, Dimitris Karadimas, Nico Adler, Andreas Sailer, Raphael Weber, Thomas Wilhelm, Géza Németh, Fahad Siddiqui, Rafiullah Khan, Vahid Garousi, Sakir Sezer, Victor Morales:
XANDAR: Exploiting the X-by-Construction Paradigm in Model-based Development of Safety-critical Systems. DATE 2022: 1-5 - [c22]Fahad Siddiqui, Rafiullah Khan, Sakir Sezer, Kieran McLaughlin, Leonard Masing, Tobias Dörr, Florian Schade, Jürgen Becker, Alexander Ahlbrecht, Wanja Zaeske, Umut Durak, Nico Adler, Andreas Sailer, Raphael Weber, Thomas Wilhelm, Géza Németh, Victor Morales, Paco Gomez, Georgios Keramidas, Christos P. Antonopoulos, Michail Mavropoulos, Vasilios I. Kelefouras, Konstantinos Antonopoulos, Nikolaos S. Voros, Christos Panagiotou, Dimitris Karadimas:
XANDAR: A holistic Cybersecurity Engineering Process for Safety-critical and Cyber-physical Systems. VTC Spring 2022: 1-5 - 2021
- [j20]Mohib Ullah, Rafiullah Khan, Muhammad Inam Ul Haq, Atif Khan, Wael Alosaimi, Muhammad Irfan Uddin, Abdullah Alharbi:
Multi-Group ObScure Logging (MG-OSLo) A Privacy-Preserving Protocol for Private Web Search. IEEE Access 9: 79005-79020 (2021) - [j19]Irfan Ullah Khan, Nida Aslam, Talha Anwar, Sumayh S. Aljameel, Mohib Ullah, Rafiullah Khan, Abdul Rehman, Nadeem Akhtar:
Remote Diagnosis and Triaging Model for Skin Cancer Using EfficientNet and Extreme Gradient Boosting. Complex. 2021: 5591614:1-5591614:13 (2021) - [j18]Rafiullah Khan, Mohib Ullah, Atif Khan, Muhammad Irfan Uddin, Maha Al-Yahya:
NN-QuPiD Attack: Neural Network-Based Privacy Quantification Model for Private Information Retrieval Protocols. Complex. 2021: 6651662:1-6651662:8 (2021) - [j17]Maneela Shaheen, Rafiullah Khan, Rajesh Roshan Biswal, Mohib Ullah, Atif Khan, Muhammad Irfan Uddin, Mahdi Zareei, Abdul Waheed:
Acute Myeloid Leukemia (AML) Detection Using AlexNet Model. Complex. 2021: 6658192:1-6658192:8 (2021) - [j16]Umer Farooq, Mohib Ullah, Rafiullah Khan, Abdullah Alharbi, Muhammad Irfan Uddin, Muhammad Inam Ul Haq, Wael Alosaimi:
IDBR: Iot Enabled Depth Base Routing Method for Underwater Wireless Sensor Network. J. Sensors 2021: 1-8 (2021) - [j15]Rafi Ullah, Arbab Waseem Abbas, Mohib Ullah, Rafiullah Khan, Irfan Ullah Khan, Nida Aslam, Sumayh S. Aljameel:
EEWMP: An IoT-Based Energy-Efficient Water Management Platform for Smart Irrigation. Sci. Program. 2021: 5536884:1-5536884:9 (2021) - [c21]Fahad Siddiqui, Rafiullah Khan, Sakir Sezer:
Bird's-eye view on the Automotive Cybersecurity Landscape & Challenges in adopting AI/ML. FMEC 2021: 1-6 - [c20]Jürgen Becker, Leonard Masing, Tobias Dörr, Florian Schade, Georgios Keramidas, Christos P. Antonopoulos, Michail Mavropoulos, Efstratios Tiganourias, Vasilios I. Kelefouras, Konstantinos Antonopoulos, Nikolaos S. Voros, Umut Durak, Alexander Ahlbrecht, Wanja Zaeske, Christos Panagiotou, Dimitris Karadimas, Nico Adler, Andreas Sailer, Raphael Weber, Thomas Wilhelm, Florian Oszwald, Dominik Reinhardt, Mohamad Chamas, Adnan Bekan, Graham Smethurst, Fahad Siddiqui, Rafiullah Khan, Vahid Garousi, Sakir Sezer, Victor Morales:
XANDAR: X-by-Construction Design framework for Engineering Autonomous & Distributed Real-time Embedded Software Systems. FPL 2021: 382-383 - 2020
- [j14]Rafiullah Khan, Jingbo Yin, Faluk Shair Mustafa, Hailong Liu:
Risk Assessment and Decision Support for Sustainable Traffic Safety in Hong Kong Waters. IEEE Access 8: 72893-72909 (2020) - [j13]Nauman ul Haq, Mohib Ullah, Rafiullah Khan, Arshad Ahmad, Ahmad Almogren, Bashir Hayat, Bushra Shafi:
USAD: An Intelligent System for Slang and Abusive Text Detection in PERSO-Arabic-Scripted Urdu. Complex. 2020: 6684995:1-6684995:7 (2020) - [j12]Yasir Ahmad, Mohib Ullah, Rafiullah Khan, Bushra Shafi, Atif Khan, Mahdi Zareei, Abdallah Aldosary, Ehab Mahmoud Mohamed:
SiFSO: Fish Swarm Optimization-Based Technique for Efficient Community Detection in Complex Networks. Complex. 2020: 6695032:1-6695032:9 (2020) - [j11]Rafiullah Khan, Arshad Ahmad, Alhuseen Omar Alsayed, Muhammad Binsawad, Muhammad Arshad Islam, Mohib Ullah:
QuPiD Attack: Machine Learning-Based Privacy Quantification Mechanism for PIR Protocols in Health-Related Web Search. Sci. Program. 2020: 8868686:1-8868686:11 (2020) - [c19]Rafiullah Khan, Kieran McLaughlin, BooJoong Kang, David M. Laverty, Sakir Sezer:
A Seamless Cloud Migration Approach to Secure Distributed Legacy Industrial SCADA Systems. ISGT 2020: 1-5 - [c18]Rafiullah Khan, Kieran McLaughlin, BooJoong Kang, David M. Laverty, Sakir Sezer:
A Secure Cloud Migration, Monitoring and Analytics Framework for Industrial Internet of Things. WF-IoT 2020: 1-6
2010 – 2019
- 2019
- [j10]Mohib Ullah, Muhammad Arshad Islam, Rafiullah Khan, Muhammad Aleem, Muhammad Azhar Iqbal:
ObSecure Logging (OSLo): A Framework to Protect and Evaluate the Web Search Privacy in Health Care Domain. J. Medical Imaging Health Informatics 9(6): 1181-1190 (2019) - [j9]Rafiullah Khan, Muhammad Arshad Islam, Mohib Ullah, Muhammad Aleem, Muhammad Azhar Iqbal:
Privacy Exposure Measure: A Privacy-Preserving Technique for Health-Related Web Search. J. Medical Imaging Health Informatics 9(6): 1196-1204 (2019) - 2018
- [j8]Rafiullah Khan, Sarmad Ullah Khan:
Design and implementation of an automated network monitoring and reporting back system. J. Ind. Inf. Integr. 9: 24-34 (2018) - [c17]Rafiullah Khan, Kieran McLaughlin, John Hastings, David M. Laverty, Sakir Sezer:
Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid. PST 2018: 1-10 - 2017
- [j7]Rafiullah Khan, Kieran McLaughlin, David M. Laverty, Sakir Sezer:
Design and Implementation of Security Gateway for Synchrophasor Based Real-Time Control and Monitoring in Smart Grid. IEEE Access 5: 11626-11644 (2017) - [j6]Rafiullah Khan, Sarmad Ullah Khan:
Design and implementation of Ad-Hoc collaborative proxying scheme for reducing network energy waste. Digit. Commun. Networks 3(2): 118-128 (2017) - [j5]Rafiullah Khan, Sarmad Ullah Khan:
Design and implementation of UPnP-based energy gateway for demand side management in smart grid. J. Ind. Inf. Integr. 8: 8-21 (2017) - [j4]Raffaele Bolla, Maurizio Giribaldi, Rafiullah Khan, Matteo Repetto:
Network Connectivity Proxy: Architecture, Implementation, and Performance Analysis. IEEE Syst. J. 11(2): 588-599 (2017) - [j3]Rafiullah Khan, Sarmad Ullah Khan:
Energy saving through intelligent coordination among daily used fixed and mobile devices. Sustain. Comput. Informatics Syst. 14: 43-57 (2017) - [c16]Rafiullah Khan, Kieran McLaughlin, David M. Laverty, Sakir Sezer:
STRIDE-based threat modeling for cyber-physical systems. ISGT Europe 2017: 1-6 - 2016
- [j2]Raffaele Bolla, Rafiullah Khan, Matteo Repetto:
Assessing the Potential for Saving Energy by Impersonating Idle Networked Devices. IEEE J. Sel. Areas Commun. 34(5): 1676-1689 (2016) - [c15]Rafiullah Khan, Sarmad Ullah Khan:
Achieving Energy Saving through Proxying Applications on behalf of Idle Devices. ANT/SEIT 2016: 187-194 - [c14]Mohib Ullah, Rafiullah Khan, Muhammad Arshad Islam:
Poshida II, a Multi Group Distributed Peer to Peer Protocol for Private Web Search. FIT 2016: 75-80 - [c13]Rafiullah Khan, Kieran McLaughlin, David M. Laverty, Sakir Sezer:
IEEE C37.118-2 Synchrophasor Communication Framework - Overview, Cyber Vulnerabilities Analysis and Performance Evaluation. ICISSP 2016: 167-178 - [c12]Rafiullah Khan, Peter Maynard, Kieran McLaughlin, David M. Laverty, Sakir Sezer:
Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid. ICS-CSR 2016 - 2015
- [j1]Raffaele Bolla, Marco Chiappero, Rafiullah Khan, Matteo Repetto:
Saving energy by delegating network activity to home gateways. IEEE Trans. Consumer Electron. 61(4): 445-453 (2015) - [i2]Misbah Daud, Rafiullah Khan, Mohib Ullah, Aitazaz Daud:
Roman Urdu Opinion Mining System (RUOMiS). CoRR abs/1501.01386 (2015) - 2014
- [b1]Rafiullah Khan:
Energy-aware home area networking. Polytechnic University of Catalonia, Spain, 2014 - [c11]Rafiullah Khan, Sarmad Ullah Khan, Shahid Khan, Mohammad Usman Ali Khan:
Localization Performance Evaluation of Extended Kalman Filter in Wireless Sensors Network. ANT/SEIT 2014: 117-124 - [c10]Raffaele Bolla, Rafiullah Khan, Xavier Parra, Matteo Repetto:
Improving Smartphones Battery Life by Reducing Energy Waste of Background Applications. NGMAST 2014: 123-130 - [c9]Sarmad Ullah Khan, Rafiullah Khan:
A Secure Authentication and Key Management Scheme for Wireless Sensor Networks. S-CUBE 2014: 51-60 - [c8]Sarmad Ullah Khan, Rafiullah Khan, Inam Bari, Naveed Jan:
An Authentication and Key Management Scheme for Heterogeneous Sensor Networks. SecureComm (1) 2014: 123-131 - 2013
- [c7]Raffaele Bolla, Maurizio Giribaldi, Rafiullah Khan, Matteo Repetto:
Design and Implementation of Cooperative Network Connectivity Proxy Using Universal Plug and Play. Future Internet Assembly 2013: 323-335 - [c6]Raffaele Bolla, Maurizio Giribaldi, Rafiullah Khan, Matteo Repetto:
Smart proxying: An optimal strategy for improving battery life of mobile devices. IGCC 2013: 1-6 - [c5]Raffaele Bolla, Maurizio Giribaldi, Rafiullah Khan, Matteo Repetto:
Design of Home Energy Gateway boosting the development of Smart Grid applications at Home. ICEAC 2013: 103-108 - [c4]Sarmad Ullah Khan, Rafiullah Khan:
Content-location based key management scheme for content centric networks. SIN 2013: 376-379 - [i1]Rafiullah Khan, Shaukat Ali:
Conceptual Framework of Redundant Link Aggregation. CoRR abs/1305.2708 (2013) - 2012
- [c3]Rafiullah Khan, Sarmad Ullah Khan, Rifaqat Zaheer, Shahid Khan:
Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges. FIT 2012: 257-260 - [c2]Rafiullah Khan, Raffaele Bolla, Matteo Repetto:
Design of UPnP based cooperative network connectivity proxy. SustainIT 2012: 1-3 - [c1]Rafiullah Khan, Raffaele Bolla, Matteo Repetto, Roberto Bruschi, Maurizio Giribaldi:
Smart proxying for reducing network energy consumption. SPECTS 2012: 1-8
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint