Prof. Dr. Muhammad Khurram Khan

Biography

FIET (UK), FBCS (UK), FFTRA (Korea), SMIEEE (USA)​

Editor-in-Chief, Telecommunication Systems (Springer)​

Center of Excellence in Information Assurance (CoEIA)

College of Computer & Information Sciences, Building 31

King Saud University, P.O. Box 92144, Riyadh 11653

Kingdom of Saudi Arabia​

Twitter: @khurramcyber


Prof. Muhammad Khurram Khan is a global thought leader and influencer in cybersecurity. He is a Professor of Cybersecurity at the Center of Excellence in Information Assurance (CoEIA), King Saud University, Kingdom of Saudi Arabia. He is one of the founding members of CoEIA and has served as Manager R&D from March 2009 until March 2012. He, along with his team, developed and successfully managed the cybersecurity research program at CoEIA, which turned it into one of the best centers of excellence in the region. He is the founder and CEO of the "Global Foundation for Cyber Studies and Research", an independent and non-partisan cybersecurity think-tank in Washington, D.C., USA. He has contributed to cyber policy work for the G20 (Saudi and Italian Presidencies) in shaping a safer cyberspace for children, protecting the masses and vulnerable populations in cyberspace, and empowering and enabling women in the cybersecurity profession. In 2019, he played an instrumental role as a cybersecurity subject expert for a USD 6 million series B investment in a South Korean startup, "SecuLetter," which has received a corporate valuation of over USD 100 million (2023).

He is the Editor-in-Chief of a well-reputed international journal ‘Telecommunication Systems', published by Springer-Nature for over 27 years, with a recent impact factor of 2.5 (JCR 2023). He is also the Editor-in-Chief of Cyber Insights Magazine.

Furthermore, he is the area editor (Network Security) of IEEE Communications Surveys & Tutorials, which has a 33.84 impact factor in JCR 2022. Moreover, he is on the editorial board of several journals, including, IEEE Transactions on Information Forensics and Security, IEEE Transactions on Intelligent Vehicles, IEEE Communications Magazine, IEEE Internet of Things Journal, IEEE Transactions on Consumer Electronics, Journal of Network & Computer Applications (Elsevier), IEEE Access, IEEE Consumer Electronics Magazine, PLOS ONE, Electronic Commerce Research, IET Wireless Sensor Systems, Journal of Information Hiding and Multimedia Signal Processing, and International Journal of Biometrics, etc.

He has also played role of the guest editor of several international ISI-indexed journals of Springer-Verlag and Elsevier Science, etc. Moreover, he is one of the organizing chairs of more than 5 dozen international conferences and member of technical committees of more than 10 dozen international conferences. In addition, he is an active reviewer of many international journals as well as research foundations of Switzerland, Italy, Saudi Arabia and Czech Republic.

Prof. Khurram is an honorary professor at IIIRC, Shenzhen Graduate School, China and an adjunct professor at Fujian University of Technology, China. He has secured an outstanding leadership award at the IEEE international conference on Networks and Systems Security 2009, Australia. He has been included in the Marquis Who’s Who in the World 2010 edition. In addition, at the AIT international Conference in Japan in June 2010, he received a certificate of appreciation for outstanding contributions in "Biometrics & Information Security Research".

He has been awarded a Gold Medal for the ‘Best Invention & Innovation Award’ at the 10th Malaysian Technology Expo 2011, Malaysia. Moreover, in April 2013, his invention got a Bronze Medal at the "41st International Exhibition of Inventions" in Geneva, Switzerland. In addition, he was awarded the best paper awards from the Journal of Network & Computer Applications (Elsevier) and IEEE Systems Journal.

He was the recipient of the King Saud University Award for Scientific Excellence (Research Productivity) in May 2015. He was also a recipient of the King Saud University Award for Scientific Excellence (Inventions, Innovations, and Technology Licensing) in May 2016.

Prof. Khurram has published over 450 research papers in the journals and conferences of international repute. In addition, he is an inventor of 10 US/PCT patents. He has edited 7 books/proceedings published by Springer-Verlag and IEEE. He has secured several national and international research grants in the domain of information security. His research areas of interest are Cybersecurity, Internet of Things security, digital authentication, biometrics, multimedia security, and technological innovation management. He has played a leading role in developing the "BS Cybersecurity Degree Program" and the "Higher Diploma in Cybersecurity" at King Saud University.

He is a fellow of the Institution of Engineering & Technology (UK), a fellow of the British Computer Society (UK), a fellow of the FTRA (Korea), a senior member of the IEEE (USA), a senior member of the IACSIT (Singapore), member of the IEEE Consumer Electronics Society, member of the IEEE Communications Society, member of the IEEE Computers Society, member of the IEEE Technical Committee on Security & Privacy, member of the IEEE IoT Community, member of the IEEE Smart Cities Community, and member of the IEEE Cybersecurity Community. He is also the Vice Chair of the IEEE Communications Society Saudi Chapter. He has been a distinguished lecturer of the IEEE (CTSoC) from 2019–2021. He is currently working as a chair of the task group (TG) of the International Telecommunication Union (ITU), a specialized agency of the United Nations on ICT, on child online protection in the Metaverse.

His Google Scholar can be visited at: https://scholar.google.com/citations?user=99LlvYUAAAAJ&hl=en


Interests

Prof Khurram conducts research in Cybersecurity, Digital Authentication, Biometrics, Multimedia Security, Cloud Computing Security, and Technological Innovation Management.
img01

Cyber Security

Awareness and Education Cybersecurity Ecosystem

img01

Digital Authentication

Identity Management Authentication Protocols Internet of Things

img01

Biometrics

Personal Identification Authentication Protocols Biometrics System Security

img01

Cloud Computing Security

Cloud Authentication
Cloud Data Security
Cloud Privacy

img01

Multimedia Security

Multimedia Forensics
Digital Quran Security
Digital Contents Security

img01

Technological Innovation Management

Open Innovation in GCC
Innovation Ecosystem

Publications

Prof. Khurram has rigorously published research papers in well-esteemed international journals and conferences. A complete list of his publications can be found in the section below:
img01

Patents

My Inventions & Innovations

Publications
img01

Books

My Books and Proceedings

Publications
img01

Editorials

My Editorials in Journals

Publications
img01

Research Papers

My Journal and Conference Papers

Publications

Patents


  1. Methods and Systems for Facilitating Cyber Inspection of Connected and Autonomous Electrical Vehicles using Smart Charging Stations, US Patent Number 11874752, 2024
  2. Systems and Methods for Facilitating Biometric Recognition, US Patent Number 11762969, 2023
  3. Methods and Systems for Implementing Secure Biometrics Recognition, US Patent Number 11501580, 2022
  4. Device for Facilitating Managing Cyber Security Health of a Connected and Autonomous Vehicle (CAV), US Patent Number 11271971, 2022
  5. Systems and Methods Improving Cryptosystems with Biometrics, US Patent Number 9825761, 2017
  6. Face Recognition using Multiresolution Discriminant Analysis, US Patent Number 9355303, 2016
  7. System and Method for Currency Validation, US Patent Number 8931688, 2015
  8. Passive Continuous Authentication Method, US Patent Number 8660322, 2014
  9. One-Time Password Authentication with Infinite Nested Hash Claims, US Patent Number 8683564, 2014
  10. Systems and Methods for Three-Factor Authentication, US Patent Number 8862888, 2014
  11. One-Time Password Authentication with Infinite Nested Hash Chains, PCT Patent No.: PCT/US10/57125, 2010
  12. A Method to Collect Data of Audience Exposure of Smart TV through Smart Phone's App, IPO Application No. 12/2016, 2016
  13. Internet of Things based Reliable Monitoring System for Oil and Gas Operations, Saudi Patent Office Application No. 116370689, 2016

Books/Edited Proceedings

  1. Muhammad Khurram Khan, M.B Khan (Eds.), “Research, Innovation and Entrepreneurship in Saudi Arabia: Vision 2030”, Routledge, Taylor & Francis, 1st Edition, ISBN: 978-1138488533, April 2020
  2. Y. Tian, T. Ma, Muhammad Khurram Khan, "Big Data and Security", Communications in Computer and Information Science, ISBN: 978-981-15-7529-7, Springer, 2020
  3. J.J.H. Park, H. Jin, Y.S. Jeong, Muhammad Khurram Khan (Eds.), "Advanced Multimedia andUbiquitous Engineering", ISBN 978-981-10-1535-9, July 2016
  4. T.H Kim, A. Stoica, W.C Fang, T. Vasilakos, J.G Villalba, K.P. Arnett, Muhammad Khurram Khan, B. H Kang, "Computer Applications for Security, Control and System Engineering", Communications in Computer and Information Science, ISBN: 978-3-642-35263-8, Springer-Verlag, Dec. 2012
  5. Muhammad Khurram Khan, A. Mirza, K. Alghathbar, "Proceedings of National Workshop on Information Assurance Research" (WIAR), ISBN: 978-3-8007-3432-0, VDE Verlag Germany, April 2012
  6. T.H Kim, H. Adeli, W.C Fang, J.G Villalba, K. P. Arnet, Muhammad Khurram Khan, "Security Technology", Communications in Computer and Information Science, ISBN 978-3-642-27188-5, Springer-Verlag, 2011
  7. T.H Kim, W.C Fang, Muhammad Khurram Khan, K.P. Arnett, H.J Kang, D. Slezak, "Security Technology, Disaster Recovery and Business Continuity", Communications in Computer and Information Science, ISBN: 978-3-642-17609-8, Springer-Verlag, Germany, 2010
  8. T.H Kim, H.K Kim, Muhammad Khurram Khan, A. Kiumi, W.C Fang, D. Slezak, "Advances in Software Engineering", Communications in Computer and Information Science, ISBN: 978-3-642-17577-0, Springer-Verlag, Germany, 2010
  9. C.C Chang, T. Vasilakos, P. Das, T. H. Kim, B.H. Kang, Muhammad Khurram Khan, "Advanced Communication and Networking", Communications in Computer and Information Science, Springer-Verlag, ISBN 978-3-642-13404-3, Germany, June 2010
  10. M. Khalid Anis, Muhammad Khurram Khan, S. Jamal H. Zaidi, Proceedings of 12th IEEE International Multitopic Conference, ISBN: 978-1-4244-2823-6, 2008

Editorials

  1. I. Razzak, G. Xu, Muhammad Khurram Khan, “Privacy-Preserving Federated Machine Learning Solutions for Enhanced Security of Critical Energy Infrastructures”, IEEE Transactions on Industrial Informatics, vol. 18, issue 5, May 2022
  2. Muhammad Khurram Khan, “Technology and Telecommunications: A Panacea in the COVID-19 Crisis”, Telecommunication Systems, Springer-Nature, Jan. 2022
  3. Muhammad Khurram Khan, "Importance of Telecommunications in the Times of COVID‑19", Telecommunication Systems, Springer-Nature, Jan. 2021
  4. Z. Liu, K.K.R Choo, W. Liu, Muhammad Khurram Khan, "Guest Editorial: Introduction to the Special Section on Cyber Security Threats and Defense Advance", IEEE Transactions on Emerging Topics in Computing, vol 8, Issue 2, pp. 264-266, April-June 2020
  5. Muhammad Khurram Khan, “Technological Advancements and 2020”, Telecommunication Systems, Springer, Jan. 2020
  6. S. Horng, Y. Pan, H. Shen, Muhammad Khurram Khan, “Parallel Computations and Applications”, International Journal of Computational Science and Engineering, vol. 20, no. 2, 2019
  7. Muhammad Khurram Khan, “A New Journey in the New Year”, Telecommunication Systems, Springer, Jan. 2019
  8. Muhammad Khurram Khan, “New Strides Towards Success”, Telecommunication Systems, Springer, vol. 67, issue 1, Jan. 2018
  9. L. Kong, K. Ren, Muhammad Khurram Khan, Q. Li, A. Rayes, M. Debbah, Y. Nakamura, "Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 2", IEEE Communications Magazine, Vol. 55, Issue 6, June 2017
  10. L. Kong, K. Ren, Muhammad Khurram Khan, Q. Li, A. Rayes, M. Debbah, Y. Nakamura, "Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 1", IEEE Communications Magazine, Vol. 55, Issue 3, March 2017
  11. Muhammad Khurram Khan, "Laying the Foundation for a Productive New Year", Telecommunication Systems, Springer, vol. 64, issue 1, Jan. 2017
  12. JF. Wan, Muhammad Khurram Khan, M.K. Qiu, D.Q. Zhang, "Cloud-assisted Industrial Systems and Applications", Mobile Networks and Applications, vol. 21, issue 5, pp. 822-824, Oct. 2016
  13. Muhammad Khurram Khan, "Continuous Improvement: A Goal of New Year", Telecommunication Systems, vol. 61, Issue 1, Jan. 2016
  14. J.J. Park, N. Zhang, N.Y. Yen,Muhammad Khurram Khan, "Advanced Communication Models and Services for Smart World", Modelling and Simulation in Engineering, vol. 2015, Article ID 284394, 2015
  15. Muhammad Khurram Khan, “New Year, New Challenges, New Opportunities, Telecommunication Systems, Springer, vol. 58, issue 1, Jan. 2015
  16. Muhammad Khurram Khan, N. Kumar, S Horng, International Journal Ad Hoc and Ubiquitous Computing, vol. 18, Nos. 1/2, 2015
  17. Muhammad Khurram Khan, Y. Xiang, S.J. Horng, H.H Chen, "Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks", International Journal of Distributed Sensor Networks, vol. 2015, Article ID 958190, 2015
  18. Muhammad Khurram Khan, T. Al-Saud, H. Alkhathlan, H. Derham, "New Reforms of Research, Innovation and Entrepreneurship in the GCC Countries", Innovation: Management, Policy & Practice, 16(2), pp. 174-176, 2014
  19. F. Yu, C.C Chang, Muhammad Khurram Khan,T. Cao, M. Ivanovic, "Recent Advances in Information Security", The Scientific World Journal, Article ID 562492, 2014
  20. Muhammad Khurram Khan, “Message from the New Editor-in-Chief”, Telecommunication Systems, vol. 56, issue 4, pp. 427-427, 2014
  21. Muhammad Khurram Khan, Y. Xiang, S.J Horng, H.H Chen, "Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks", International Journal of Distributed Sensor Networks, vol. 2013, Article ID 956736, 2013
  22. Muhammad Khurram Khan, "High Performance Biometrics Recognition Algorithms and Systems", Future Generation Computer Systems, Elsevier Science, vol. 28, pp. 210-2011, 2012
  23. Muhammad Khurram Khan, "Chaotic Cryptography and Its Applications in Telecommunication Systems", Telecommunication Systems, Springer-Verlag, DOI: 10.1007/s11235-011-9456-x, June 2011
  24. Muhammad Khurram Khan, "Guest Editorial for Special Issue on Biometric Systems and Applications", Telecommunication Systems, Springer-Verlag, Volume 47, Issue 3, pp. 183-184, June 2011
  25. Muhammad Khurram Khan, "Research Advances in Data Hiding for Multimedia Security", Multimedia Tools & Applications, Springer-Verlag, vol. 52, numbers 2-3, pp. 257-261, April 2011
  26. Muhammad Khurram Khan, Mohamed Kamel, Xudong Jiang, "Special issue on: Recent advances and future directions in biometrics personal identification", Journal of Network & Computer Applications, Elsevier Science, vol. 33, issue 3, pp. 205-206, May 2010
  27. Muhammad Khurram Khan, Khaled Alghathbar, "Special Issue- Information Assurance and Security Engineering", IETE Technical Review, vol. 27, issue 3, pp, 201-202, May-June 2010

Research Papers


Journal Publications


  1. M. Adil, H. Song, M. A Jan, Muhammad Khurram Khan, X. He, A. Farouk, “UAV-Assisted IoT Applications, QoS Requirements and Challenges with Future Research Directions”, In Press, ACM Computing Surveys, April 2024 [SCI-E]
  2. X. Meng, W. Liang, Z. Xu, X. Kui. K. Li, Muhammad Khurram Khan, “An Anonymous Authenticated Group Key Agreement Scheme for Transfer Learning Edge Services Systems”, In Press, ACM Transactions on Sensor Networks, March 2024 [SCI-E]
  3. T. Wu, H. Wu, F. Kong, S. Kumari, Muhammad Khurram Khan, C. Chen, “Comments on “V2G-Auth: Lightweight Authentication and Key Agreement Protocol for V2G Environment leveraging Physically Unclonable Functions”, In Press, IEEE Transactions on Industrial Cyber-Physical Systems, March 2024
  4. G. Singh. S. Rana. D. Mishra, Muhammad Khurram Khan, “Blockchain-based Access Control Architecture for Enhancing Authorized E-Healthcare Data Sharing Services in Industry 5.0”, In Press, IEEE Transactions on Consumer Electronics, Feb. 2024 [SCI-E]
  5. R. Elhabob, M. Taha, H. Xiong, S. Kumari, Muhammad Khurram Khan, P. Chaudhary, “Pairing-Free Certificateless Public Key Encryption with Equality Test for Internet of Vehicles”, In Press, Computers and Electrical Engineering, Elsevier, Feb. 2024 [SCI-E]
  6. L. Xiao, D. Han, K. Li, Muhammad Khurram Khan, “UETOPSIS: A Data-Driven Intelligence Approach to Security Decisions for Edge Computing in Smart Cities”, In Press, ACM Transactions on Sensor Networks, Feb. 2024 [SCI-E]
  7. M. Adil. H. Song, Muhammad Khurram Khan, S. Mastorakis. A. Farouk, Z. Jin, “Metaverse in Healthcare: Security Challenges and Pathway for the Future Research”, IEEE Systems, Man, and Cybernetics Magazine, Feb. 2024 [SCI-E]
  8. H. Kibriya, A. Siddiqa, W. Khan, Muhammad Khurram Khan, “Towards Safer Online Communities: Deep Learning and Explainable AI for Hate Speech Detection and Classification”, In Press, Computers and Electrical Engineering, Elsevier, Feb. 2024 [SCI-E]
  9. Y. Li, Y. Xiao, W. Liang, J. Cai, R. Zhang, K. Li, Muhammad Khurram Khan, “The Security and Privacy Challenges Toward Cybersecurity of 6G Networks: A Comprehensive Review”, In Press, Computer Science and Information Systems, Feb. 2024 [SCI-E]
  10. M. Adil, Muhammad Khurram Khan, N. Kumar, M. Attique, A. Farouk, M. Guizani, Z. Jin, “Healthcare Internet of Things: Security Threats, Challenges and Future Research Directions”, In Press, IEEE Internet of Things Journal, Jan. 2024 [SCI-E]
  11. C.M Chen, Q. Miao, S. Kumari, Muhammad Khurram Khan, J. Rodrigues, “A Privacy-Preserving Authentication Protocol for Electric Vehicle Battery Swapping based on Intelligent Blockchain”, In Press, IEEE Internet of Things Journal, Jan. 2024 [SCI-E]
  12. M. Adil. H. Song, Muhammad Khurram Khan, Ah. Farouk, Z. Jin, “5G/6G-Enabled Metaverse Technologies: Taxonomy, Applications, and Open Security Challenges with Future Research Directions”, In Press, Journal of Network and Computer Applications, Elsevier, Jan. 2024 [SCI-E]
  13. J. He, L. Yao, X. Li, Muhammad Khurram Khan, W. Niu, X. Zhang, F. Li, “Model-agnostic Generation-enhanced Technology for Few-shot Intrusion Detection”, In Press, Applied Intelligence, Springer-Nature, Jan. 2024 [SCI-E]
  14. S.K Dwivdei, M. Abdussami, R. Amin, Muhammad Khurram Khan, "D3APTS: Design of ECC Based Authentication Protocol and Data Storage for Tactile Internet enabled IoD System With Blockchain", In Press, IEEE Transactions on Consumer Electronics, Dec 2023 [SCI-E]
  15. S. Chakkaravarthy, D. Priya, T. Reddi, M.S.T Reddy, Muhammad Khurram Khan, “A Comprehensive Examination of Email Spoofing: Issues and Prospects for Email Security”, In Press, Computers & Security, Elsevier, Nov. 2023 [SCI-E]
  16. S.N Karam, K. Bilal, J. Shuja, L. Khan, M. Bilal, Muhammad Khurram Khan, “Intelligent IoT and UAV-Assisted Architecture for Pipeline Monitoring in OGI”, In Press, IEEE IT Professional, Nov. 2023 [SCI-E]
  17. H. Qin, D. He, Q. Feng, Muhammad Khurram Khan, M. Luo, K.K.R Choo, “Cryptographic Primitives in Privacy-Preserving Machine Learning: A Survey”, In Press, IEEE Transactions on Knowledge and Data Engineering, Oct. 2023 [SCI-E]
  18. M. Cheng, D. Li, N. Zhou, H. Tang, G. Wang, S. Li, U.A Bhatti, Muhammad Khurram Khan, “Vision-Motion Codesign for Low-Level Trajectory Generation in Visual Servoing Systems”, In Press, IEEE Transactions on Instrumentation and Measurement, Oct. 2023 [SCI-E]
  19. R. Wang, J. Lai, X. Li, D. He, Muhammad Khurram Khan, “RPIFL: Reliable and Privacy-Preserving Federated Learning for the Internet of Things”, In Press, Journal of Network and Computer Applications, Oct. 2023 [SCI-E]
  20. X. Chen, H. Liu, Q. Huang, D. Zhang, H. Zhou, C. Wu, X. Liu, Muhammad Khurram Khan, “Stalker Attacks: Imperceptibly Dropping Sketch Measurement Accuracy on Programmable Switches”, In Press, IEEE Transactions on Information Forensics and Security, Sept. 2023 [SCI-E]
  21. S.C Sethuraman, D. Priya, Muhammad Khurram Khan, “Container Security: Precaution levels, Mitigation Strategies, and Research Perspectives”, In Press, Computers & Security, Elsevier, Sept. 2023 [SCI-E]
  22. G. Varone, W. Boulila, M. Driss, S. Kumari, Muhammad Khurram Khan, T.R Gadekallu, A. Hussain, ““Finger Pinching and Imagination Classification: A Fusion of CNN Architectures for IoMT-enabled BCI Applications”, In Press, Information Fusion, Elsevier, Sept. 2023 [SCI-E]
  23. W. Yu, Z. Wenfang. X. Xiaomin, Muhammad Khurram Khan, P. Fan, “A Lightweight and Secure Authentication Key Agreement Scheme for Space-Ground Integrated Railway Networks", In Press, IEEE Transactions on Intelligent Transportation Systems, August 2023 [SCI-E]
  24. K. Mahmood, S. Shamshad, M.F Ayub, Z. Ghaffar, Muhammad Khurram Khan, A.K Das, “Design of Provably Secure Authentication Protocol for Edge-Centric Maritime Transportation System”, In Press, IEEE Transactions on Intelligent Transportation Systems, July 2023 [SCI-E]
  25. J. Cai, W. Liang, X. Li, K. Li, Z. Gui, Muhammad Khurram Khan, "GTxChain: A Secure IoT Smart Blockchain Architecture Based on Graph Neural Network", In Press, IEEE Internet of Things Journal, July 2023 [SCI-E]
  26. U. Chatterjee, S. Ray, S. Adhikari, Muhammad Khurram Khan, M. Dasgupta, "An improved authentication and key management scheme in context of IoT-based wireless sensor network using ECC", Computer Communications, Elsevier, Vol. 209, pp. 47-62, Sept. 2023 [SCI-E]
  27. X. Chen, X. Liu, C. Wu, Q. Huang, D. Zhang, H. Zhou, Q. Yang, Muhammad Khurram Khan, “Empowering Network Security with Programmable Switches: A Comprehensive Survey”, In Press, IEEE Communications Surveys and Tutorials, April 2023 [SCI-E]
  28. S.K Dwivedi, R. Amin, S. Vollala, Muhammad Khurram Khan, “B-HAS: Blockchain-Assisted Efficient Handover Authentication and Secure Communication Protocol in VANETs”, In Press, IEEE Transactions on Network Science and Engineering, March 2023 [SCI-E]
  29. Q. Arshad, WZ Khan, F. Azam, Muhammad Kurram Khan, H. Yu, Y. Zikria, “Blockchain-based Decentralized Trust Management in IoT: Systems, Requirements and Challenges”, In Press, Complex & Intelligent Systems, Springer-Nature, March 2023 [SCI-E]
  30. N. Khan. R. Salleh, A. Koubaa, Z. Khan, I. Ali, Muhammad Khurram Khan, “Data Plane Failure and Its Recovery Techniques in SDN: A Systematic Literature Review”, In Press, Journal of King Saud University - Computer and Information Sciences, Feb. 2023 [SCI-E]
  31. X. Chen, D. He, Muhammad Khurram Khan, M. Luo, C. Peng, “A Secure Certificateless Signcryption Scheme without Pairing for Internet of Medical Things”, In Press, IEEE Internet of Things Journal, Dec. 2022 [SCI-E]
  32. J. Huang, L. Kong, J. Wang, G. Chen, J. Gao, G. Huang, Muhammad Khurram Khan, “Secure Data Sharing over Vehicular Networks Based on Multi-Sharding Blockchain”, In Press, ACM Transactions on Sensor Networks, Dec. 2022 [SCI-E]
  33. M. Adil, M.A. Jan, Muhammad Khurram Khan, A. Anwar, A. Farouk, Z. Jin, “AI-Driven EEC for Healthcare IoT: Security Challenges and Future Research Directions”, In Press, IEEE Consumer Electronics Magazine, Nov. 2022 [SCI-E]
  34. Q. Arshad, W.Z Khan, F. Azam, Muhammad Khurram Khan, “Deep Learning Based COVID-19 Detection: Challenges and Future Directions”, In Press, IEEE Transactions on Artificial Intelligence, Nov. 2022 [SCI-E]
  35. W. Zhang, H. Jia, Z. Yan, X. Wang, Muhammad Khurram Khan, "Security Analysis and Improvement of a Public Auditing Scheme for Secure Data Storage in Fog-to-cloud Computing", In Press, Computers & Security, Elsevier, Nov. 2022 [SCI-E]
  36. W. Tengfei, L. Leng, Muhammad Khurram Khan, "A Multi-spectral Palmprint Fuzzy Commitment Based on Deep Hashing Code with Discriminative Bit Selection", In Press, Artificial Intelligence Review, Springer-Nature, Nov. 2022 [SCI-E]
  37. Y. Liu, D. He, Z. Bao, H. Wang, Muhammad Khurram Khan, K.K.R Choo, “An Efficient Multilayered Linkable Ring Signature Scheme with Logarithmic Size for Anonymous Payment in Vehicle-to-Grid Networks”, In Press, IEEE Transactions on Intelligent Vehicles, Oct. 2022 [SCI-E]
  38. Y. Wang, X. Jia, Y. Xia, Muhammad Khurram Khan, D. He, “A Blockchain-Based Conditional Privacy-Preserving Authentication Scheme for Edge Computing Services”, Journal of Information Security and Applications, Elsevier, Vol. 70, Nov. 2022 [SCI-E]
  39. U. Chatterjee, S. Ray, S. Adhikari, Muhammad Khurram Khan, M. Dasgupta, “Efficient and Secure e-voting Scheme using Elliptic Curve Cryptography”, In Press, Security and Privacy, Wiley, Oct 2022 [SCI-E]
  40. X. Zhou, D. He, Muhammad Khurram Khan, W. Wu, K.K. R Choo, “An Efficient Blockchain-based Conditional Privacy-Preserving Authentication Protocol for VANETs”, In Press, IEEE Transactions on Vehicular Technology, Sept. 2022 [SCI-E]
  41. Z. Bao, D. He, Muhammad Khurram Khan, M. Luo, Q. Xie, “PBIDM: Privacy-preserving Blockchain-based Identity Management System for Industrial Internet of Things”, In Press, IEEE Transactions on Industrial Informatics, Sept. 2022 [SCI-E]
  42. Z. Ghaffar, S. Shamshad, K. Mahmood, M.S. Obaidat, S. Kumari, Muhammad Khurram Khan, “A Lightweight and Efficient Remote Data Authentication Protocol Over Cloud Storage Environment”, In Press, IEEE Transactions on Network Science and Engineering, Sept. 2022 [SCI-E]
  43. S. Bojjagani, Y.C.A.P Reddy, T. Anuradha, P.V.V Rao, R. Reddy, Muhammad Khurram Khan, “Secure Authentication and Key Management Protocol for Deployment of Internet of Vehicles (IoV) Concerning Intelligent Transport Systems”, In Press, IEEE Transactions on Intelligent Transportation Systems, Sept. 2022 [SCI-E]
  44. A. Singh, A. Gutub, A. Nayyar, Muhammad Khurram Khan, “Redefining Food Safety Traceability System Through Blockchain: Findings, Challenges and Open Issues”, In Press, Multimedia Tools and Applications, Springer-Nature, Sept. 2022 [SCI-E]
  45. L. Kong, J. Tan, J. Huang, G. Chen, S. Wang, X. Jin, P. Zeng, Muhammad Khurram Khan, S.K Das, “Edge-Computing-Driven Internet of Things: A Survey”, In Press, ACM Computing Surveys, Aug. 2022 [SCI-E]
  46. J. Huang, D. He, Y. Chen, Muhammad Khurram Khan, M. Luo, “A Blockchain-based Self-tallying Voting Protocol with Maximum Voter Privacy”, In Press, IEEE Transactions on Network Science and Engineering, July 2022 [SCI-E]
  47. D. Xingbo, Muhammad Khurram Khan, L. Leng, A. Teoh, “Co-Learning to Hash Palm Biometrics for Flexible IoT Deployment”, In Press, IEEE Internet of Things Journal, July 2022 [SCI-E]
  48. A. Sardar, S. Umer, R.K Rout, Muhammad Khurram Khan, “A Secure and Efficient Biometric Template Protection Scheme for Palmprint Recognition System”, In Press, IEEE Transactions on Artificial Intelligence, June 2022 [SCI-E]
  49. Y. Duan, J. Huang, J. Lei, L. Kong, G. Chen, Muhammad Khurram Khan, “AISChain: Blockchain-based AIS Data Platform with Dynamic Bloom Filter Tree”, In Press, IEEE Transactions on Intelligent Transportation Systems, June 2022 [SCI-E]
  50. B.K Meher, R. Amin, A.K Das, Muhammad Khurram Khan, “KL-RAP: An Efficient Key-less RFID Authentication Protocol Based on ECDLP for Consumer Warehouse Management System”, In Press, IEEE Transactions on Network Science and Engineering, May 2022 [SCI-E]
  51. M. Wazid, J. Singh, A.K Das, S. Shetty, Muhammad Khurram Khan, J. Rodrigues, “ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things”, In Press, IEEE Access, May 2022 [SCI-E]
  52. W. Shahid, B. Jamshidi, S. Hakak, H. Isah, W.Z Khan, Muhammad Khurram Khan, K.K.R Choo, "Detecting and Mitigating the Dissemination of Fake News: Challenges and Future Research Opportunities", In Press, IEEE Transactions on Computational Social Systems, May 2022 [SCI-E]
  53. D. Mishra, Muhammad Khurram Khan, C. Chakraborty, “Privacy-Enabling Framework for Cloud-Assisted Digital Healthcare Industry”, In Press, IEEE Transactions on Industrial Informatics, April 2022 [SCI-E]
  54. Z. Siddiqui, J. Cao, Muhammad Khurram Khan, “An Improved Lightweight PUF-PKI Digital Certificate Authentication Scheme for the Internet of Things”, In Press, IEEE Internet of Things Journal, April 2022 [SCI-E]
  55. J. Lei, J. Huang, L. Kong, G. Chen, Muhammad Khurram Khan, S. Arnon, “DeFLoc: Deep Learning Assisted Indoor Vehicle Localization atop FM Fingerprint Map”, In Press, IEEE Transactions on Intelligent Transportation Systems, March 2022 [SCI-E]
  56. M. Adil, Muhammad Khurram Khan, M.M Jadoon, M. Attique, H. Song, A. Farouk, "An AI-enabled Hybrid lightweight Authentication Scheme for Intelligent IoMT based Cyber-Physical Systems", In Press, IEEE Transactions on Network Science and Engineering, March 2022 [SCI-E]
  57. A.K Biswas, M. Dasgupta, S. Ray, Muhammad Khurram Khan, “A Probable Cheating-free (t, n) Threshold Secret Sharing scheme with Enhanced Blockchain”, In Press, Computers and Electrical Engineering, Elsevier, March 2022 [SCI-E]
  58. S. Goudarzi, S.A Soleymani, M.H Anisi, M.A Azgomi, Z. Movahedi, N. Kama, H.M Rusli, Muhammad Khurram Khan, “A Privacy-Preserving Authentication Scheme based on Elliptic Curve Cryptography and using Quotient Filter in VANET”, Ad Hoc Networks, Elsevier, Feb. 2022 [SCI-E]
  59. U. Chatterjee, S. Ray, Muhammad Khurram Khan, M. Dasgupta, C.M Chen, “An ECC-based Lightweight Remote User Authentication and Key Management Scheme for IoT Communication in Context of Fog Computing”, In Press, Computing, Springer, Feb. 2022 [SCI-E]
  60. A. Ghosh, S. Umer, Muhammad Khurram Khan, R.K Rout, B.C Dhara, “Smart Sentiment Analysis System for Pain Detection using Cutting Edge Techniques in A Smart Healthcare Framework”, In Press, Cluster Computing, Springer-Nature, Jan. 2022 [SCI-E]
  61. X. Li, S. Liu, R. Lu, Muhammad Khurram Khan, K. Gu, X. Zhang, “An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-based Medical Storage System”, In Press, IEEE Journal of Biomedical and Health Informatics, Dec. 2021 [SCI-E]
  62. R. Chatterjee, A. Chatterjee, SKH Islam, Muhammad Khurram Khan “An Object Detection-based Few-shot Learning Approach for Multimedia Quality Assessment”, In Press, Multimedia Systems, Springer, Dec. 2021 [SCI-E]
  63. S. Shamshad, M. Rana, K. Mahmood, Muhammad Khurram Khan, M.S. Obaidat, “On the Security of ‘A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing’”, In Press, Wireless Personal Communications, Springer, Nov. 2021 [SCI-E]
  64. W.Z Khan, Muhammad Khurram Khan, Q. Arshad, “Cybersecurity Digital Labels for Connected and Autonomous Vehicles”, In Press, IEEE Consumer Electronics Magazine, Sept. 2021 [SCI-E]
  65. C. Beaman, A. Barkworth, T.D Akandea, S. Hakak, Muhammad Khurram Khan, “Ransomware: Recent Advances, Analysis, Challenges and Future Research Directions”, In Press, Computers and Security, Elsevier, Sept. 2021[SCI-E]
  66. M. Adil, Muhammad Khurram Khan, M. Jamjoom, A. Farouk, “MHADBOR: AI-enabled Administrative Distance based Opportunistic Load Balancing Scheme for an Agriculture Internet of Things Network”, In Press, IEEE Micro, Sept. 2021 [SCI-E]
  67. T. Wu, L. Leng, Muhammad Khurram Khan, F.A Khan, “Palmprint-Palmvein Fusion Recognition Based on Deep Hashing Network”, In Press, IEEE Access, Sept. 2021 [SCI-E]
  68. Y. Wang, W. Zhang, X. Wang, Muhammad Khurram Khan, P. Fan, “Efficient Privacy-Preserving Authentication Scheme with Fine-grained Error Location for Cloud-based VANET”, In Press, IEEE Transactions on Vehicular Technology, Aug. 2021 [SCI-E]
  69. M. Adil, Muhammad Khurram Khan, “Emerging IoT Applications in Sustainable Smart Cities for COVID-19: Network Security and Data Preservation Challenges with Future Directions”, In Press, Sustainable Cities and Society, Elsevier, Aug. 2021[SCI-E]
  70. B. Bera, A. Vangala, A.K Das, P Lorenz, Muhammad Khurram Khan. "Private Blockchain-envisioned Drones-assisted Authentication Scheme in IoT-enabled Agricultural Environment", In Press, Computer Standards & Interfaces, Elsevier, Aug. 2021 [SCI-E]
  71. A. Aftab. F.A Khan, Muhammad Khurram Khan, H. Abbas, W. Iqbal, F. Riaz, "Hand-based Multibiometric Systems: State-of-the-art and Future Challenges", In Press, PeerJ Computer Science, Aug. 2021 [SCI-E]
  72. S. Hussain, K. Mahmood, Muhammad Khurram Khan, C.M Chen, S.A Chaudhry, “Designing Secure and Lightweight User Access to Drone for Smart City Surveillance”, In Press, Computer Standards & Interfaces, Elsevier, Aug. 2021 [SCI-E]
  73. M.U Younus, Muhammad Khurram Khan, A.R Bhatti, "Improving the Software Defined Wireless Sensor Networks Routing Performance using Reinforcement Learning", In Press, IEEE Internet of Things Journal, July 2021 [SCI-E]
  74. S. Khan, Muhammad Khurram Khan, R. Khan, "Harnessing Intelligent Technologies to Curb COVID-19 Pandemic: Taxonomy and Open Challenges", In Press, Computing, Springer-Nature, July 2021 [SCI-E]
  75. A. Derhab, M. Beloued, I. Mohiuddin, F. Kurniawan, Muhammad Khurram Khan, “Histogram-based Intrusion Detection and FilteringFramework for Secure and Safe In-vehicle Networks”, In Press, IEEE Transactions on Intelligent Transportation Systems, June 2021 [SCI-E]
  76. R. M.A Haseeb-ur-rehman, M. Liaqat, A.H.M Aman, S.H.A Hamid, R.L Ali, J. Shuja, Muhammad Khurram Khan, “Sensor Cloud Frameworks: State-of-the-Art, Taxonomy, and Research Issues”, In Press, IEEE Sensors Journal, June 2021 [SCI-E]
  77. C. Peng, M. Luo, H. Wang, Muhammad Khurram Khan, D. He, “An Efficient Privacy-Preserving Aggregation Scheme for Multi-dimensional Data in IoT”, In Press, IEEE Internet of Things Journal, May 2021 [SCI-E]
  78. C. Xenofontos, I. Zografopoulos, C. Konstantinou, A. Jolfaei, Muhammad Khurram Khan, KKR Choo, “Consumer, Commercial and Industrial IoT (In)Security: Attack Taxonomy and Case Studies”, In Press, IEEE Internet of Things Journal, May 2021 [SCI-E]
  79. S. Bojjagani, V. N. Sastry, C.M Chen, S. Kumari, Muhammad Khurram Khan, “Systematic Survey of Mobile Payments, Protocols, and Security Infrastructure”, In Press, Journal of Ambient Intelligence and Humanized Computing, Springer-Nature, May 2021 [SCI-E]
  80. S. Kumar, S. Velliangiri, Karthikeyan, S. Kumari, S. Kumar, Muhammad Khurram Khan, “A Survey on the Blockchain Techniques for the Internet of Vehicles Security”, In Press, Transactions on Emerging Telecommunications Technologies, Wiley, May 2021 [SCI-E]
  81. M.A Saleem, Z. Ghaffar, K. Mahmood, A.K Das, J. Rodrigues, Muhammad Khurram Khan, “Provably Secure Authentication Protocol for Mobile Clients in IoT Environment using Puncturable Pseudorandom Function”, Accepted for Publication, IEEE Internet of Things Journal, April 2021 [SCI-E]
  82. M.S.M Bhutta, A.A Khwaja, A. Nadeem, H.F Ahmad, Muhammad Khurram Khan, M. Hanif, H. Song, M. Alshamari, Y. Cao, “A Survey on Blockchain Technology: Evolution, Architecture and Security”, In Press, IEEE Access, March 2021 [SCI-E]
  83. J. Shuja, M.A Humayun, W. Alasmary, H. Sinky, E. Alanazi, Muhammad Khurram Khan, “Resource Efficient Geo-Textual Hierarchical Clustering Framework for Social IoT Applications”, In Press, IEEE Sensors Journal, Feb. 2021 [SCI-E]
  84. S. Hussain, S.A Chaudhry, O.A Alomari, M.H Alsharif, Muhammad Khurram Khan, N. Kumar, “Amassing the Security: An ECC based Authentication Scheme for Internet of Drones”, In Press, IEEE Systems Journal, Jan. 2021 [SCI-E]
  85. S.M Karunarathne, N. Saxena, Muhammad Khurram Khan, “Security and Privacy in IoT Smart Healthcare”, In Press, IEEE Internet Computing, Jan. 2021 [SCI-E]
  86. S. Banerjee, B. Bera, A.K Das, S. Chattopadhyay, Muhammad Khurram Khan, JPC Rodrigues, “Private Blockchain-envisioned Multi-authority CP-ABE-based User Access control Scheme in IIoT”, In Press, Computer Communications, Elsevier, Jan. 2021 [SCI-E]
  87. S. Kumar, J. Pradhan, A.K. Pal, SKH Islam, Muhammad Khurram Khan, “Radiological Image Retrieval Technique using Multi-resolution Texture and Shape Features”, In Press, Multimedia Tools and Applications, Springer, Dec. 2020 [SCI-E]
  88. M. Majhi, A.K Pal, J. Pradhan, SKH Islam, Muhammad Khurram Khan, “Computational Intelligence based Secure Three-Party CBIR Scheme for Medical Data for Cloud-Assisted Healthcare Applications”, In Press, Multimedia Tools and Applications, Springer, Dec. 2020 [SCI-E]
  89. D. Rangwani, D. Sadhukhan, S. Ray, Muhammad Khurram Khan, M. Dasgupta, “An Improved Privacy Preserving Remote User Authentication Scheme for Agricultural Wireless Sensor Network”, In Press, Transactions on Emerging Telecommunications Technology, Wiley, Dec. 2020 [SCI-E]
  90. J. Wang, L. Wu, S. Zeadally, Muhammad Khurram Khan, D. He, “Privacy-preserving Data Aggregation Against Malicious Data Mining Attack for IoT-enabled Smart Grid”, In Press, ACM Transactions on Sensor Networks, Dec. 2020 [SCI-E]
  91. Z. Xu, M. Luo, Muhammad Khurram Khan, K.K.R. Choo, D. He, "Analysis and Improvement of a Certificateless Signature Scheme for Resource-Constrained Scenarios", In Press, IEEE Communications Letters, Dec. 2020 [SCI-E]
  92. W.Z. Khan, Q. Arshad, S. Hakak, Muhammad Khurram Khan, S. Rehman, “Trust Management in Social Internet of Things: Architectures, Recent Advancements and Future Challenges”, In Press, IEEE Internet of Things Journal, Nov. 2020 [SCI-E]
  93. M. Khalid, K. Wang, N. Aslam, Y. Cao, N. Ahmed, Muhammad Khurram Khan, "From Smart Parking Towards Autonomous Valet Parking in Smart Cities: A Survey, Challenges and Future Works", In Press, Journal of Network and Computer Applications, Elsevier, Nov. 2020 [SCI-E]
  94. P. Nerurkar, S. Bhirud, D. Patel, Y. Busnel, R. Ludinard, S. Kumari, Muhammad Khurram Khan, "Dissecting Bitcoin Blockchain: Empirical Analysis of Bitcoin Network (2009-2020)", In Press, Journal of Network and Computer Applications, Elsevier, Nov. 2020 [SCI-E]
  95. Y. Wang, W. Zhang, X. Wang, W. Guo, Muhammad Khurram Khan, P. Fan, “Improving the Security of LTE-R for High-Speed Railway: From the Access Authentication View”, In Press, IEEE Transactions on Intelligent Transportation Systems, Oct. 2020 [SCI-E]
  96. I. Bibi, A. Akhunzada, J. Malik, Muhammad Khurram Khan, M. Dawood, “Secure Distributed Mobile Volunteer Computing with Android”, In Press, ACM Transactions on Internet Technology, October 2020 [SCI-E]
  97. K. Mahmood, S. Shamshad, S. Kumari, Muhammad Khurram Khan, M.S Obaidat, "Comment on Lightweight Secure Message Broadcasting Protocol for Vehicle-to-Vehicle Communication", In Press, IEEE Systems Journal, October 2020 [SCI-E]
  98. Muhammad Khurram Khan, A. Quadri, "Augmenting Cybersecurity in Autonomous Vehicles: Innovative Recommendations for Aspiring Entrepreneurs, In Press, IEEE Consumer Electronics Magazine, Sept. 2020 [SCI-E]
  99. J. Srinivas, A.K Das, X. Li, Muhammad Khurram Khan, M. Jo, “On the Design of an Anonymous Signature-Based Authenticated Key Exchange Scheme for IoT-Enabled Smart Grid Systems”, Accepted for Publication, IEEE Transactions on Industrial Informatics, July 2020 [SCI-E]
  100. S. Majumder, S. Ray, D. Sadhukhan, Muhammad Khurram Khan, M. Dasgupta, "ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things", In Press, Wireless Personal Communications, Springer-Nature, Sept. 2020 [SCI-E]
  101. S. Shia, D. He, L. Lia, N. Kumar, Muhammad Khurram Khan, K.K.R. Choo, “Applications of Blockchain in Ensuring the Security and Privacy of Electronic Health Record Systems: A Survey”, In Press, Computers & Security, Elsevier, July 2020 [SCIE]
  102. W.A. Al-Khater, S.A Deed, A.A. Ahmed, A.S. Sadiq, Muhammad Khurram Khan, “Comprehensive Review of Cybercrime Detection Techniques”, IEEE Access, July 2020 [SCI-E]
  103. A. Waheed, M.A. Shah, A. Khan, S. Islam, S. Khan, C. Maple, Muhammad Khurram Khan, “Volunteer Computing in Connected Vehicles: Opportunities and Challenges”, In Press, IEEE Network, June 2020 [SCI-E]
  104. Y. Liu, D. He, M.S. Obaidat, N. Kumar, Muhammad Khurram Khan, K.K.R Choo, “Blockchain-Based Identity Management Systems: A Review”, In Press, Journal of Network and Computer Applications, Elsevier, May 2020 [SCI-E]
  105. C.Peng, D. He, J. Chen. N. Kumar, Muhammad Khurram Khan, "EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme for eHealth System", In Press, ACM Transactions on Internet Technology, April 2020 [SCI-E]
  106. S. Shamshad, K. Mahmood, S. Kumari, Muhammad Khurram Khan, “Comment on “Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC””, In Press, IEEE Systems Journal, March 2020 [SCI-E]
  107. C. Lin, D. He, X. Huang, Muhammad Khurram Khan, K. K. R Choo, “DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain”, In Press, IEEE Transactions on Information Forensics & Security, Jan. 2020 [SCI-E]
  108. E. K. Wang, R.P. Sun, Z. Liang, C.M. Chen, S. Kumari, Muhammad Khurram Khan, “Proof of X-Repute Blockchain Consensus Protocol for IoT Systems”, In Press, Computers & Security, Elsevier, May 2020 [SCI-E]
  109. D. Sadhukhan, S. Ray, G. P. Biswas, Muhammad Khurram Khan, M. Dasgupta, “A lightweight Remote User Authentication Scheme for IoT Communication using Elliptic Curve Cryptography”, In Press, Journal of Supercomputing, Springer, May 2020 [SCI-E]
  110. M. Majhi, A. K Pal, SK.H Islam, Muhammad Khurram Khan, “Secure Content-Based Image Retrieval using Modified Euclidean Distance for Encrypted Features”, In Press, Transactions on Emerging Telecommunications Technologies, Springer, May 2020 [SCI-E]
  111. S.A. Soleymani, M.H. Anisi, S. Goudarzi, Muhammad Khurram Khan, M.N. Kama, A.H. Abdullah, “An Authentication and Plausibility Model for Big Data Analytic under LOS and NLOS conditions in 5G-VANET”, In Press, Science China Information Sciences, March 2020 [SCI-E]
  112. E.K. Wang, C.M. Chen, F. Wang, Muhammad Khurram Khan, S. Kumari, “Joint-Learning Segmentation in Internet of Drones (IoD)-Based Monitor Systems”, In Press, Computer Communications, Elsevier, Jan. 2020 [SCI-E]
  113. Q. Mei, H. Xiong, J. Chen, M. Yang, S. Kumari, Muhammad Khurram Khan, “Efficient Certificateless Aggregate Signature with Conditional Privacy-preserving in IoV”, In Press, IEEE Systems Journal, Jan. 2020 [SCI-E]
  114. I. Altaf, M. A. Akram, K. Mahmood, S. Kumari, H. Xiong, Muhammad Khurram Khan, “A Novel Authentication and Key-Agreement Scheme for Satellite Communication Network”, In Press, Transactions on Emerging Telecommunications Technologies, Wiley, Jan. 2020 [SCI-E]
  115. M. Binjubier, A.A. Ahmed, M.A.B Ismail. A.S Sadiq, Muhammad Khurram Khan, “Comprehensive Survey on Big Data Privacy Protection, In Press, IEEE Access, Dec. 2019 [SCI-E]
  116. M. Lim, A. Abdullah, N.Z. Jhanjhi, M. Supramaniam, Muhammad Khurram Khan, ”A Deep Reinforcement Learning Data Fusion model for Time-evolving Criminal Network Link Prediction”, In Press, IEEE Access, Dec. 2019 [SCI-E]
  117. M. Lim, A. Abdullah, N.Z. Jhanjhi, M. Supramaniam, Muhammad Khurram Khan, "Link Prediction in Time-Evolving Criminal Network with Deep Reinforcement Learning Technique", In Press, IEEE Access, Nov. 2019 [SCI-E]
  118. V. Kumar, M. Ahmad, D. Mishra, S. Kumari, Muhammad Khurram Khan, "RSEAP: RFID based Secure and Efficient Authentication Protocol for Vehicular Cloud Computing", In Press, Vehicular Communications, Elsevier, Nov 2019 [SCI-E]
  119. M. Zhang, G. Zhou, Muhammad Khurram Khan, S. Kumari, X. Hu, W. Liu, “SPSR-FSPG: A Fast Simulative Password Set Generation Algorithm”, IEEE Access, Oct. 2019 [SCI-E]
  120. E.K. Wang, Z. Liang, C.M. Chen, S. Kumari, Muhammad Khurram Khan, “PoRX: A Reputation Incentive Scheme for Blockchain Consensus of IIoT”, In Press, Future Generation Computer Systems, Elsevier, August 2019 [SCI-E]
  121. W. Shahjehan, A. Riaz, I. han. A.S. Sadiq, S. Khan, Muhammad Khurram Khan, “BAT Algorithm based Beamforming for mmWave Massive MIMO Systems”, In Press, International Journal of Communication Systems, Wiley, Aug. 2019 [SCI-E]
  122. A.I.A Ahmed, S.H Ab Hamid, A. Gani, Muhammad Khurram Khan, "Trust and Reputation for Internet of Things: Fundamentals, Taxonomy, and Open Research Challenges", In Press, Journal of Network & Computer Applications, Elsevier, July 2019 [SCI-E]
  123. Y. Zhao, Y. Hou, L. Wang, S. Kumari, Muhammad Khurram Khan, H. Xiong, “An Efficient Certificateless Aggregate Signature Scheme for Internet of Vehicles”, In Press, Transactions on Emerging Telecommunications Technologies, June 2019 [SCI-E]
  124. V. Kumar, M. Ahmad, A. Kumari, S. Kumari, Muhammad Khurram Khan, “SEBAP: A secure and Efficient Biometric-assisted Authentication Protocol Using ECC for Vehicular Cloud Computing”, In Press, International Journal of Communication Systems, Wiley, June 2019 [SCI-E]
  125. A. Manzoor, M.A. Shah, H.A. Khattak, I.U. Din, Muhammad Khurram Khan, “Multi-Tier Authentication Schemes for Fog Computing: Architecture, Security Perspective, and Challenges”, In Press, International Journal of Communication Systems, Wiley, May 2019 [SCI-E]
  126. S. Kumari, P. Chaudhary, C.M. Chen, Muhammad Khurram Khan, “Questioning Key Compromise Attack on Ostad-Sharif et al.’s Authentication and Session Key Generation Scheme for Healthcare Applications”, In Press, IEEE Access, March 2019 [SCI-E]
  127. X. Li, J. Peng, M. Obaidat, F. Wu, Muhammad Khurram Khan, C. Chen, ”A Secure Three-factor User Authentication Protocol with Forward Secrecy for Wireless Medical Sensor Network Systems”, In Press, IEEE Systems Journal, Feb. 2019 [SCI-E]
  128. C. Meshram, C.C. Lee, S.G. Meshram, Muhammad Khurram Khan, “An Identity-based Encryption Technique using Subtree for Fuzzy User Data Sharing under Cloud Computing Environment”, in Press, Soft Computing, Elsevier, Feb. 2019 [SCI-E]
  129. M.A. Khan, I. Uddin, S.U. Jadoon, Muhammad Khurram Khan, M. Guizani, “g-RAT | A Novel Graphical Randomized Authentication Technique for Consumer Smart Devices”, Accepted for Publication, IEEE Transactions on Consumer Electronics, Jan. 2019 [SCI-E]
  130. A. Ghani, H. Naqvi, M. U. Ilyas, Muhammad Khurram Khan, A. Hussain, “Energy Efficiency in Multipath Rayleigh Faded Wireless Sensor Networks using Collaborative Communication", In Press, IEEE Access, Jan. 2019 [SCI-E]
  131. H.A Khattak, Z. Ameer, I. Uddin, Muhammad Khurram Khan, "Cross-layer Design and Optimization Techniques in Wireless Multimedia Sensor Networks for Smart Cities", Computer Science and Information Systems, vol. 16, issue 1, pp. 1-17, 2019 [SCI-E]
  132. I. Uddin, M. Guizani, S. Hassan, B.S Kim, Muhammad Khurram Khan, M. Atiquzzaman, S.H. Ahmed, “The Internet of Things: A Review of Enabled Technologies and Future Challenges”, In Press, IEEE Access, Dec. 2018 [SCI-E]
  133. K. Salah, E. Damiani, A. Al-Fuqaha, T. Martin, K. Taha, Muhammad Khurram Khan, "Open Execution - The Blockchain Model", IEEE Blockchain Newsletter, Dec. 2018
  134. W.Z. Khan, M. Aalsalem, Muhammad Khurram Khan, "Communal Acts of IoT Consumers: A Potential Threat to Security & Privacy", Accepted for Publication, IEEE Transactions on Consumer Electronics, Nov. 2018 [SCI-E]
  135. I. Uddin, M. Guizani, B.S Kim, S. Hassan, Muhammad Khurram Khan, “Trust Management Techniques for the Internet of Things: A Survey”, In Press, IEEE Access, Nov. 2018 [SCI-E]
  136. Q. Feng, D. He, S. Zeadly, Muhammad Khurram Khan, N. Kumar, “A Survey on Privacy Protection in Blockchain Systems”, Accepted for Publication, Journal of Network and Computer Applications, Elsevier, Oct. 2018 [SCI-E]
  137. T. Khan, M. Alam, A. Akhunzada, A. Hur, M. Asif, Muhammad Khurram Khan, “Towards Augmented Proactive Cyber Threat Intelligence”, Accepted for Publication, Journal of Parallel and Distributed Computing, Elsevier, Oct. 2018 [SCI-E]
  138. S. Khatoon, T. Chen, C. C Lee, Muhammad Khurram Khan, “Provable Secure Certificate-based Signature Scheme from Bilinear Pairing”, Accepted for Publication, Applied and Computational Mathematics, September 2018 [SCI-E]
  139. S.M Anwar, M. Majid, A. Qayyum, M. Awais, M. Alnowami, Muhammad Khurram Khan, “Medical Image Analysis using Convolutional Neural Networks: A Review”, Accepted for Publication, Journal of Medical Systems, Springer, September 2018 [SCI-E]
  140. H. J. Syed, A. Gani, F. Nasaruddin, A. Naveed, A.I.A Ahmed, Muhammad Khurram Khan, “CloudProcMon: A Non-Intrusive Cloud Monitoring Framework”, In Press, IEEE Access, August 2018 [SCI-E]
  141. J. Li, K.K. R Choo, W. Zhang, S. Kumari, J. Rodrigues, Muhammad Khurram Khan, D. Hogrefe, "EPA-CPPA: An Efficient, Provably-Secure and Anonymous Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks", In Press, Vehicular Communications, Elsevier, July 2018 [SCI-E]
  142. X. Duan, H. Song, C. Qin, Muhammad Khurram Khan, "Coverless Steganography for Digital Images Based on a Generative Model", CMC-Computers Materials & Continua, Tech Science Press, pp. 483-493, vol. 44, issue 3, June 2018 [SCI-E]
  143. C. Lin, D. He, X. Huang, Muhammad Khurram Khan, K.K.R Choo, “A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-based Identity Management Systems”, In Press, IEEE Access, May 2018 [SCI-E]
  144. Z. Siddiqui, O. Tayan, Muhammad Khurram Khan, "Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols", In Press, IEEE Access, May 2018 [SCI-E]
  145. G. Ahmed, S.I Islam, M. Shahid, A. Akhunzada, S. Jabbar, Muhammad Khurram Khan, M. Riaz, K. Han, “Rigorous Analysis and Evaluation of Specific Absorption Rate (SAR) for Mobile Multimedia Healthcare”, In Press, IEEE Access, May 2018 [SCI-E]
  146. M. Aalsalem, W.Z. Khan, W. Gharibi, Muhammad Khurram Khan, Q. Arshad, “Wireless Sensor Networks in Oil and Gas Industry: Recent Advances, Taxonomy, Requirements, and Open Challenges”, In Press, Journal of Network and Computer Applications, Elsevier, April 2018 [SCI-E]
  147. M. Zeeshan, M. Majid, I.F. Nizami, S.M. Anwar, I.U. Din, Muhammad Khurram Khan, "A Newly Developed Ground Truth Dataset for Visual Saliency in Videos", In Press, IEEE Access, April 2018 [SCI-E]
  148. A. Saleem, A. Khan, F. Shahid, M. Alam, Muhammad Khurram Khan, "Recent Advancements in Garbled Computing: How Far Have We Come Towards Achieving Secure, Efficient and Reusable Garbled Circuits", In Press, Journal of Network and Computer Applications, Elsevier, Feb. 2018 [SCI-E]
  149. I. Din, S. Hassan, Muhammad Khurram Khan, M. Guizani, O. Ghazali, A. Habbal, ”Caching in Information-Centric Networking: Strategies, Challenges, and Future Research Directions”, In Press, IEEE Communication Surveys and Tutorials, Dec. 2017 [SCI-E]
  150. A.S. Abiodun, M.H. Anisi, Muhammad Khurram Khan, “Review on Data Management Methods in Cloud-based Wireless Body Area Networks”, Accepted for Publication, IEEE Consumer Electronics Magazine, Nov. 2017 [SCI-E]
  151. Q. Zheng, X. Wang, Muhammad Khurram Khan, W. Zhang, B. B. Gupta, W. Guo, "A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service", In Press, IEEE Access, Nov. 2017 [SCI-E]
  152. S. Zahra, M. Alam, Q. Javaid, A. Wahid, N. Javed, S.U.R. Malik, Muhammad Khurram Khan, "Fog Computing Over IoT: A Secure Deployment and Formal Verification”, In Press, IEEE Access, Oct. 2017 [SCI-E]
  153. S. Li, N. Zhang, S. Lin, L. Kong, A. Katangur, Muhammad Khurram Khan, M. Ni, G. Zhu, "Joint Admission Control and Resource Allocation in Edge Computing for Internet of Things", Accepted for Publication, IEEE Network, Oct. 2017 [SCI-E]
  154. A.K Das, M. Wazid, N. Kumar, Muhammad Khurram Khan, K.W.R Choo, Y.H Park, "Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment", Accepted for Publication, IEEE Journal of Biomedical and Health Informatics, Sept. 2017 [SCI-E]
  155. S.A. Soleymani, A.H Abdullah, M.H. Anisi, Muhammad Khurram Khan, S. Goudarzi, T. Khodadadi, A. Altameem, "A Secure Trust Model based on Fuzzy Logic in Vehicular Ad Hoc Networks with Fog Computing", Accepted for Publication, IEEE Access, July 2017 [SCI-E]
  156. S. Lin, L. Kong, Q. Gao, Muhammad Khurram Khan, Z. Zhong, X. Jin, P. Zeng, "Advanced Dynamic Channel Access Strategy in Spectrum Sharing 5G System", Accepted for Publication, IEEE Wireless Communications, July 2017 [SCI-E]
  157. S.S Anjum, R. M Noor, M. H Anisi, O. Ismail, A. Fazidah, Muhammad Khurram Khan, "Energy Management in RFID-Sensor Networks: Taxonomy and Challenges", Accepted for Publication, IEEE Internet of Things Journal, July 2017 [SCI-E]
  158. S. Challa, M. Wazid, A.K. Das, Muhammad Khurram Khan, "Authentication Protocols for Implantable Medical Devices: Taxonomy, Analysis and Future Directions", In Press, IEEE Consumer Electronics Magazine, June 2017 [SCI-E]
  159. S. Khan, A. Gani, A.W.A Wahab, M. Guizani, Muhammad Khurram Khan, "Topology Discovery in Software Defined Networks: Threats, Taxonomy, and State-of-the-Art", IEEE Communications Surveys and Tutorials, pp. 303-324, vol .19, issue 1, Feb 2017 [SCI-E]
  160. Z. Liu, X. Huang, Z. Hu, Muhammad Khurram Khan, H. Seo, L. Zhou, "On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age", IEEE Transactions on Dependable and Secure Computing, pp. 237-248, vol. 14, issue 3, May/June 2017 [SCI-E]
  161. M. Wazid, A.K Das, Muhammad Khurram Khan, A. Alghaiheb, N. Kumar, A.V. Vasilakos, Secure Authentication Scheme for Medicine Anti-counterfeiting System in IoT Environment, Accepted for Publication, IEEE Internet of Things Journal, May 2017 [SCI-E]
  162. J. Shuja, S.A Madani, S. Mustafaa, R.W Ahmad, A. Gani, Muhammad Khurram Khan, "Analysis of Vector Code Offloading Framework in Heterogeneous Cloud and Edge Architectures", Accepted for Publication, IEEE Access, May 2017 [SCI-E]
  163. S.F Tzeng, S.J Horng, T. Li, X. Wang, P.H. Huang, Muhmmad Khurram Khan, "Enhancing Security and Privacy for Identity-based Batch Verification Scheme in VANET", IEEE Transactions on Vehicular Technology, vol 66, no. 4, pp. 3235-3248, April 2017 [SCI-E]
  164. W.Z Khan, M.Y. Alsalem, Muhammad Khurram Khan, Q. Arshad, "Antecedents Affecting Consumer Trust Towards Adopting Internet of Things Enabled Products", Accepted for Publication, IEEE Consumer Electronics Magazine, April 2017 [SCI-E]
  165. R. Amin, S. Sherratt, D. Giri, SKH Islam, Muhammad Khurram Khan, "A Software Agent Enabled Biometric Security Algorithm for Secure File Access in Consumer Storage Devices", Accepted for Publication, IEEE Transactions on Consumer Electronics, Feb. 2017 [SCI-E]
  166. A. Akhunzada, Muhammad Khurram Khan, "Towards Secure Software Defined Vehicular Networks: Taxonomy, Requirements, and Open Issues", Accepted for Publication, IEEE Communications Magazine, Feb. 2017 [SCI-E]
  167. M. Sookhak, F. Yu, Muhammad Khurram Khan, N. Kumar, "Fog Vehicular Computing: Augmentation of Fog Computing Using Vehicular Cloud Computing", Accepted for Publication, IEEE Vehicular Technology Magazine, Feb. 2017 [SCI-E]
  168. V. Odelu, AK Das, Muhammad Khurram Khan, K.K.R Choo, M. Jo, "Expressive CP-ABE Scheme for Mobile Devices in IoT satisfying Constant-size Keys and Ciphertexts", Accepted for Publication, IEEE Access, Feb. 2017 [SCI-E]
  169. A.S. Abiodun, M.H. Anisi, I. Ali, A. Akhunzada, Muhammad Khurram Khan, "A Novel Data Segregation and Classification Technique to Reduce Power Consumption in Wireless Body Area Networks", Accepted for Publication, IEEE Consumer Electronics Magazine, Feb. 2017 [SCI-E]
  170. L. Kong, Muhammad Khurram Khan, F. Wu, G. Chen, P. Zeng, "Millimeter-Wave Wireless Communications for IoT-Cloud Supported Autonomous Vehicles: Overview, Design, and Challenges", IEEE Communications Magazine, vol. 55, issue 1, pp. 62-68 Jan. 2017 [SCI-E]
  171. D. He, N. Kumar, Muhammad Khurram Khan, L. Wang, J. Shen, Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services, In Press, IEEE Systems Journal, Nov. 2016 [ISI SCI-E]
  172. S. Khan, A. Gani, A.W.A Wahab, A. Abdelaziz, K. Ko, Muhammad Khurram Khan, M. Guizani, "Software Defined Network Forensics: Motivation, Potential Locations, Requirements, and Challenges", IEEE Network, pp. 6-13, vol. 30, Issue 6, November-December 2016 [ISI SCI-E]
  173. M. Zareei, E.M. Mohamed, M.H. Anisi, CV. Rosales, K. Tsukamoto, Muhammad Khurram Khan "On-demand Hybrid Routing for Cognitive Radio Ad-Hoc Network", IEEE Access, pp. 8294-8302, vol. 4, Dec. 2016 [ISI SCI-E]
  174. S. Khan, A. Gani, A.W.A Wahab, S.Iqbal, A. Abdelaziz, O.A. Mahdi, A.I.A. Ahmed, M. Shiraz, Y. Al-Mayouf, Z. Khan, K. Ko, Muhammad Khurram Khan, V. Chang, "Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis", IEEE Access, Nov. 2016 [ISI SCI-E]
  175. N. Emmanuel, A. Khan, M. Alam, T. Khan, Muhammad Khurram Khan, “Structures and Data Preserving Homomorphic Signatures”, Accepted for Publication, Journal of Network and Computer Applications, Elsevier, Nov. 2017 [ISI SCI-E]
  176. M. Alam, S. Malik, Q. Javed. A. Khan, S.B Khan, A. Anjum, N. Javed, A. Akhunzada, Muhammad Khurram Khan, “Formal Modeling and Verification of Security Controls for Multimedia Systems in the Cloud”, Multimedia Tools and Applications, Springer, pp. 22845-22870, Vol. 76, Issue 21, Nov. 2017 [SCI-E]
  177. S. Aslam, S. Islam, A. Khan, M. Ahmed, A. Akhundzada, Muhammad Khurram Khan, "Information Collection Centric Techniques for Cloud Resource Management: Taxonomy, Analysis and Challenges", In Press, Journal of Network and Computer Applications, Elsevier, Oct. 2017 [ISI SCI-E]
  178. S. Khan, M. Shiraz, L. Boroumand, A. Gani, Muhammad Khurram Khan "Towards Port-Knocking Authentication Methods for Mobile Cloud Computing", In Press, Journal of Network and Computer Applications, Elsevier, August 2017 [ISI SCI-E]
  179. H. J Syed, A. Gani, R. W Ahmed, Muhammad Khurram Khan, A. I. A Ahmed, "Cloud Monitoring: A Review, Taxonomy, and Open Research Issues", Accepted for Publication, Journal of Network and Computer Applications, Elsevier, August 2017 [ISI SCI-E]
  180. X. Li, F. Fu, Muhammad Khurram Khan, L. Xu, J. Shen, M. Jo, "A Secure Chaotic Map-based Remote Authentication Scheme for Telecare Medicine Information Systems", Accepted for Publication, Future Generation Computer Systems, Elsevier, August 2017 [ISI SCI-E]
  181. M. Tahir, A. Khan, A. Hameed, M. Alam, Muhammad Khurram Khan, F. Jabeen, "Towards a Set Aggregation-based Data Integrity Scheme for Smart Grids", In Press, Annals of Telecommunications, Springer, August 2017 [ISI SCI-E]
  182. S. Goudarzi, W.H. Hassan, M.H. Anisi, Muhammad Khurram Khan, S.A. Soleymani, "Intelligent Technique for Seamless Vertical Handover in Vehicular Networks", Accepted for Publication, Mobile Networks and Applications, Springer, August 2017 [ISI SCI-E]
  183. S. Challa, A.K. Das, V. Odelu, N. Kumar, S. Kumari, Muhammad Khurram Khan, A.V. Vasilakos, "An Efficient ECC-based Provably Secure Three-factor User Authentication and Key Agreement Protocol for Wireless Healthcare Sensor Networks", Accepted for Publication, Computers and Electrical Engineering, Elsevier, July 2017 [ISI SCI-E]
  184. R. Amin, S.K.H Islam, P. Vijaykumar, Muhammad Khurram Khan, V. Chang, "A Robust and Efficient Bilinear Pairing based Mutual Authentication and Session Key Verification over Insecure Communication", In Press, Multimedia Tools and Applications, Springer, July 2017
  185. M. Sookhak, F.R Yu, Muhammad Khurram Khan, Y, Xiang, R. Buyya, "Attribute-Based Data Access Control in Mobile Cloud Computing: Taxonomy and Open Issues", Future Generation Computer Systems, Elsevier, vol. 72, Pages 273-287, July 2017 [ISI SCI-E]
  186. S. Anwar, Z. Inayat, M.F. Zolkipli, J.M. Zain, A. Gani, N.B.l Anuar, Muhammad Khurram Khan, V. Chang, "Cross-VM Cache-based Side Channel Attacks and Proposed Prevention Mechanisms: A Survey", In Press, Journal of Network and Computer Applications, Elsevier, June 2017 [ISI SCI-E]
  187. M. Ma, D. He, Muhammad Khurram Khan, J. Chen, "Certificateless Searchable Public Key Encryption Scheme for Mobilehealthcare System", In Press, Computers & Electrical Engineering, Elsevier, May 2017 [ISI SCI-E]
  188. Z. Xu, L. Wu, Muhammad Khurram Khan, K.K.R Choo, D. He, "A Secure and Efficient Public Auditing Scheme using RSA Algorithm for Cloud Storage", Accepted for Publication, Supercomputing, Springer, May 2017 [ISI SCI-E]
  189. A.A. Osman, A.T. Fong, A. Gani, S. Khan, Muhammad Khurram Khan, "On Software Defined Wireless Network (SDWN) Network Virtualization: Challenges and Open Issues", The Computer Journal, Oxford University Press, May 2017 [ISI-SCI-E]
  190. R. Amin, SKH Islam, Muhammad Khurram Khan, A. Karati, D. Giri, S. Kumari, "A Two-factor RSA-based Robust Authentication System for Multi-Server Environments", Accepted for Publication, Security and Communication Networks, May 2017 [ISI SCI-E]
  191. Muhammad Khurram Khan, M. Zakariah, H. Malik, KKR Choo, "A Novel Audio Forensic Dataset for Digital Multimedia Forensics", Accepted for Publication, Australian Journal of Forensic Sciences, Feb. 2017 [ISI SCI-E]
  192. M. Luo, Y. Zhang, Muhammad Khurram Khan, D. He, "Secure and Efficient Identity-based Mutual Authentication Scheme with Smart Card Using Elliptic Curve Cryptography, Accepted for Publication, International Journal of Communication Systems, Wiley, April 2017 [ISI SCI-E]
  193. J. Shuja, A. Ghani, K. Ko, K. So, S. Mustafa, S.A. Madani, Muhammad Khurram Khan, "SIMDOM: A Framework for SIMD Instruction Translation and Offloading in Heterogeneous MCC Architectures", Accepted for Publication, Transactions on Emerging Telecommunications Technologies, Wiley, Feb. 2017 [ISI SCI-E]
  194. Z. Xu, L. Wu, D. He, Muhammad Khurram Khan, "Security Analysis of a Publicly Verifiable Data Possession Scheme for Remote Storage", Accepted for Publication, Supercomputing, Springer, April 2017 [ISI SCI-E]
  195. S.A Chaudhry, H. Naqvi, Muhammad Khurram Khan, "An Enhanced Lightweight Anonymous Biometric based Authentication Scheme for TMIS", In Press, Multimedia Tools and Applications, Springer, Feb. 2017 [ISI SCI-E]
  196. R. Amin, P. Mohit, A. Karati, G.P. Biswas, Muhammad Khurram Khan, "A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System", Accpted for Publication, Journal of Medical Systems, Springer, Feb. 2017 [ISI SCI-E]
  197. S. Kumari, A.K Das, X. Li, F. Wu, Muhammad Khurram Khan, Q. Jiang, S.K.H Islam, "A Provably Secure Biometrics-based Authenticated Key Agreement Scheme for Multi-server Environments", In Press, Multimedia Tools and Applications, Springer, Feb. 2017 [ISI SCI-E]
  198. A. Nazir, M. Alam. S.U.R Malik, A. Akhunzada, M.N Cheema, Muhammad Khurram Khan, Y. Xiang, "A High-Level Domain-specific Language for SIEM:Design, Development and Formal Verification", Accepted for Publication, Cluster Computing, Springer, Feb. 2017 [ISI SCI-E]
  199. Z. Inayat, A. Gani, N.B. Anuar, S. Anwar, Muhammad Khurram Khan, "Cloud-Based Intrusion Detection and Response System: Open Research Issues, and Solutions", In Press, Arabian Journal for Science and Engineering, Springer, Jan. 2017 [ISI SCI-E]
  200. M. Luo, Y. Zhang, Muhammad Khurram Khan, D. He, "An Efficient Chaos-based Two-party Key Agreement Protocol with Provable Security", Accepted for Publication, International Journal of Communication Systems, Wiley, Jan. 2017 [ISI SCI-E]
  201. L. Wu, J. Wang, D. He, Muhammad Khurram Khan, "Cryptanalysis of An Identity-based Public Auditing Protocolfor Cloud Storage", Accepted for Publication, Journal of Zhejiang University-Science A, Springer, Jan. 2017 [ISI SCI-E]
  202. M. Zakariah, Muhammad Khurram Khan, O. Tayan, K. Salah, "Digital Quran Computing: Review, Classification, and Trend Analysis", Accepted for Publication, Arabian Journal for Science and Engineering, Springer, Jan. 2017 [ISI SCI-E]
  203. M. Zakariah, Muhammad Khurram Khan, H. Malik, "Digital Multimedia Audio Forensics: Past, Present and Future", Accepted for Publication, Multimedia Tools and Applications, Springer, Dec. 2016 [ISI-SCI-E]
  204. M.H Rehman, L.C Sun, T.Y Wah, Muhammad Khurram Khan, "Towards Next-generation Heterogeneous Mobile Data Stream Mining Applications: Opportunities, Challenges, and Future Research Directions", Accepted for Publication, Journal of Network and Computer Applications, Elsevier, Nov. 2016 [ISI SCI-E]
  205. WZ Khan, MY Aalsalem, Muhammad Khurram Khan, Q. Arshad, "When Social Objects Collaborate: Concepts, Processing Elements, Attacks and Challenges", In Press, Computers and Electrical Engineering, Elsevier, Nov. 2016 [ISI SCI-E]
  206. D. He, H. Wang, Muhammad Khurram Khan, L. Wang, "Lightweight Anonymous Key Distribution Scheme for Smart Grid Using Elliptic Curve Cryptography" IET Communications, vol. 10, issue 14, pp. 1795-1802, 2016 [ISI SCI-E]
  207. X. Li, A.K Sangaiah, S. Kumari, F. Wu, J. Shen, Muhammad Khurram Khan, "An Efficient Authentication and Key Agreement Scheme with User Anonymity for Roaming Service in Smart City", Accepted for Publication, Personal and Ubiquitous Computing, Springer, Nov. 2016 [ISI SCI-E]
  208. F. Wu, L. Xu, S. Kumari, X. Li, Muhammad Khurram Khan, "An Enhanced Mutual Authentication and Key Agreement Scheme for Mobile User Roaming Service in Global Mobility Networks", Accepted for Publication, Annals of Telecommunications, Springer, Oct. 2016 [ISI SCI-E]
  209. T. Maitra, SKH Islam, R. Amin, D. Giri, Muhammad Khurram Khan, N. Kumar, "An Enhanced Multi-server Authentication Protocol using Password and Smart-card: Cryptanalysis and Design", Accepted for Publication, Security and Communication Networks, Sept. 2016 [ISI SCI-E]
  210. I. Khan, S.A Chaudhry, M. Sher, J.I Khan, Muhammad Khurram Khan, "An Anonymous and Provably Secure Biometric based Authentication Scheme Using Chaotic Maps for Accessing Medical Drop Box Data", Accepted for Publication, Journal of Supercomputing, Springer, Sept. 2016 [ISI SCI-E]
  211. S.A Chaudhry, M.T. Khan, Muhammad Khurram Khan, T. Shon, "A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography", Journal of Medical Systems, Springer, vol. 40, Nov. 2016 [ISI SCI-E]
  212. S.A. Chaudhry, I. Khan, A. Irshad, M.U. Ashraf, Muhammad Khurram Khan, H.F Ahmed, "A Provably Secure Anonymous Authentication Scheme for Session Initiation Protocol", Accepted for Publication, Security and Communication Networks, Sept. 2016 [ISI SCI-E]
  213. M. Karuppiah, S. Kumari, X. Li, F. Wu, A.K Das, Muhammad Khurram Khan, R. Saravanan, S. Basu, "A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks", Accepted for Publication, Wireless Personal Communications, Springer, Sept. 2016 [ISI SCI-E]
  214. J. Shuja, A. Gani, MH Rehman, RW Ahmad, E. Ahmed, SA Madani, Muhammad Khurram Khan, "Towards Native Code Offloading based MCC Frameworks for Multimedia Applications: A Survey", Accepted for Publication, Journal of Network and Computer Applications, Elsevier, August 2016 [ISI SCI-E]
  215. R. Amin, SKH Islam, G.P. Biswas, D. Giri, Muhammad Khurram Khan, N. Kumar, "A More Secure and Privacy-aware Anonymous User Authentication Scheme for Distributed Mobile Cloud Computing Environments", Accepted for Publication, Security and Communication Networks, August 2016 [ISI SCI-E]
  216. M. Khattak, MA Ihsan, S. Farooq, JAK Manzoor, M. Alam, Q. Javaid, A. Akhunzada, Muhammad Khurram Khan, "Optimizing SIEM Throughput on the Cloud Using Parallelization", Accepted for Publication, PLOS ONE, August 2016 [ISI SCI-E]
  217. S. Iqbal, MLM Kiah, NB Anuar, S. Khan, Muhammad Khurram Khan, KKR Choo, "On Cloud Security Attacks: A Taxonomy and Intrusion Detection and Prevention as a Service", Accepted for Publication, Journal of Network and Computer Applications, Elsevier, August 2016 [ISI SCI-E]
  218. S. Goudarzi, W.H Hassan, M.H. Anisi, A. Soleymani, M. Sookhak, Muhammad Khurram Khan, "ABC-PSO for Vertical Handover in Heterogeneous Wireless Networks", Accepted for Publication, Neurocomputing, Elsevier, Aug. 2016 [ISI SCI-E]
  219. S. Kumari, A.K Das, M. Wazid, X. Li, F. Wu, K.K.R Choo, Muhammad Khurram Khan, "On the Design of a Secure User Authentication and Key Agreement Scheme for Wireless Sensor Networks", Concurrency and Computation: Practice and Experience, Wiley, July 2016 [ISI SCI-E]
  220. S.A Chaudhry, H. Naqvi, K. Mahmood, H.F. Ahmad Muhammad Khurram Khan, "An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography", Accepted for Publication, Wireless Personal Communications, Springer, July 2016 [ISI SCI-E]
  221. M. Liaqat, A. Gani, M.H Anisi, S.H.A Hamid, A. Akhunzada, Muhammad Khurram Khan, R.A Ali, "Distance-based and Low Energy Adaptive Clustering Protocol for Wireless Sensor Networks, In Press, PLOS ONE, August 2016 [ISI SCI-E]
  222. M. Wazid, A.K Das, S. Kumari, Muhammad Khurram Khan, "Design of Sinkhole Node Detection Mechanism for Hierarchical Wireless Sensor Networks", Accepted for Publication, Security & Communication Networks, August 2016 [ISI SCI-E]
  223. S. Kumari, L. Xiong, F. Wu, A.K. Das, O Vanga, Muhammad Khurram Khan, "A User Anonymous Mutual Authentication Protocol", Accepted for Publication, KSII Transactions on Internet and Information Systems, July 2016 [ISI SCI-E]
  224. M.Y. Aalsalem, W.Z. Khan, N.M. Saad, M.S. Hossain, M. Atiquzzaman, Muhammad Khurram Khan, A New Random Walk for Replica Detection in WSNs, Accepted for Publication, PLOS ONE, June 2016 [ISI SCI-E]
  225. R. Amin, SKH Islam, G.P. Biswas, Muhammad Khurram Khan, N. Kumar, "A Robust and Anonymous Patient Monitoring System using Wireless Medical Sensor Networks", Accepted for Publication, Future Generation Computer Systems, Elsevier, May 2016 [ISI SCI-E]
  226. H. Shen, D. He, Muhammad Khurram Khan, J.H Lee "Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things", Accepted for Publication, Wireless Personal Communications, Springer, May 2016 [ISI SCI-E]
  227. V. Odelu, A.K. Das, Y. S Rao, S. Kumari, Muhammad Khurram Khan, K.K.R Choo, "Pairing-based CP-ABE with Constant-size Ciphertexts and Secret Keys for Cloud Environment", Accepted for Publication, Computer Standards & Interfaces, Elsevier, May 2016 [ISI SCI-E]
  228. M.S. Farash, S.A. Chaudhry, K. Mahmood, Muhammad Khurram Khan, "A Provably Secure RFID Authentication Protocols Based on Elliptic Curve for Healthcare Environments", Accepted for Publication, Journal of Medical Systems, Springer, May 2016 [ISI SCI-E]
  229. S. Kumari, X. Li, F. Wu, A.K. Das, H. Arshad, Muhammad Khurram Khan, "User Friendly Mutual Authentication and Key Agreement Scheme for Wireless Sensor Networks using Chaotic Maps", In Press, Future Generation Computer Systems, Elsevier, April 2016 [ISI SCI-E]
  230. F. Wu, L. Xu, S. Kumari, X. Li, A.K. Das, Muhammad Khurram Khan, M. Karuppiah, R. Baliyani, "A Novel and Provable Authentication and Key Agreement Scheme with User Anonymity for Global Mobility Networks", Accepted for Publication, Security and Communication Networks, Wiley, April 2016 [ISI SCI-E]
  231. X. Li, J. Niu, S. Kumari, SKH Islam, F. Wu, Muhammad Khurram Khan, AK Das, "A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security", In Press, Wireless Personal Communications, Springer, April 2016 [ISI SCI-E]
  232. A. Karim, R. Salleh, Muhammad Khurram Khan, A. Siddiqa, K.K.R Choo, "On the Analysis and Detection of Mobile Botnet Applications", Accepted for Publication, Journal of Universal Computer Science, April 2016 [ISI SCI-E]
  233. A. Yousafzai, A. Ghani, R.M Noor, M. Sookhak, R. W Ahmad, M. Shiraz, Muhammad Khurram Khan, "Cloud Resource Allocation Schemes: Review, Taxonomy, and Opportunities", Accepted for Publication, Knowledge and Information Systems, Springer, March 2016 [ISI SCI-E]
  234. SKH Islam, G.P Biswas, M.S Obaidat, Muhammad Khurram Khan, R. Amin, "Provably Secure Pairing-free Identity-based Partially Blind Signature Scheme and its Application in Online e-cash System", Accepted for Publication, The Arabian Journal for Science and Engineering, March 2016 [ISI SCI-E]
  235. Z. Inayat, A. Gani, NB Anuar, Muhammad Khurram Khan, S. Anwar, "Intrusion Response Systems: Foundations, Design, and Challenges", Journal of Network and Computer Applications, Elsevier, pp. 53-74, vol. 62, Feb. 2016 [ISI SCI-E]
  236. SKH Islam, AK Das, Muhammad Khurram Khan, "Design of a Provably Secure Identity-based Digital Multi-signature Scheme using Biometrics and Fuzzy Extractor", Accepted for Publication, Security and Communication Networks, Wiley, Feb. 2016 [ISI SCI-E]
  237. A. Karim, R. Saleh, Muhammad Khurram Khan, "SMARTbot: A Behavioral Analysis Framework Augmented with Machine Learning to Identify Mobile Botnet Applications", Accepted for Publication, PLOS ONE, Feb. 2016 [ISI SCI-E]
  238. S. Kumari, Muhammad Khurram Khan, X. Li, F. Wu, "Design of a User Anonymous Password Authentication Scheme without Smart Cards", International Journal of Communication Systems, Wiley, pp. 441-458, vol. 29, issue 3, Feb. 2016 [ISI SC-E]
  239. M. Jahanirada, N.B. Anuara, A. W. A Wahaba, R.M. Noora, M. Sookhak, F.R. YU, J. Abawajy, Muhammad Khurram Khan, "A Cooperative Co-evolutionary Immune System Detection Mechanism (CoCo-ISDM)", Accepted for Publication, Journal of Computer and System Sciences, Elsevier, Feb. 2016 [ISI SCI-E]
  240. Q. Jiang, Muhammad Khurram Khan, X. Lu, J. Ma, D. He, "A Privacy Preserving Three-factor Authentication Protocol for e-Health Clouds", In Press, The Journal of Supercomputing, Jan. 2016 [ISI SCI-E]
  241. R. Amin, SKH Islam, G.P. Biswas, Muhammad Khurram Khan, L. Leng, N. Kumar, "Design of Anonymity Preserving Three-Factor Authenticated Key Exchange Protocol for Wireless Sensor Network", In Press, Computer Networks, Elsevier, Jan. 2016 [ISI SCI-E]
  242. W.Z Khan, Muhammad Khurram Khan, F.B Muhaya , M.Y Aalsalem, H.C Chao, A Comprehensive Study of Email Spam Botnet Detection, IEEE Communications Surveys and Tutorials, vol. 17, issue 4, pp. 2271-2295, Nov. 2015 [ISI SCI-E]
  243. A. Akhanzada, E. Ahmed, A. Gani, Muhammad Khurram Khan, M. Imran, S. Guizani, "Securing the Software Defined Networks: Taxonomy, Requirements, and Open Issues", IEEE Communications Magazine, pp. 36-44, vol. 53, issue 4, April 2015 [ISI SCI-E]
  244. P.W Tsai, Muhammad Khurram Khan, J.S Pan, B.Y Liao, "Interactive Artificial Bee Colony Supported Passive Continuous Authentication System", IEEE Systems Journal, vol. 8, no. 2, pp. 395-405, 2014 [ISI SCI-E]
  245. S.J Horng, S.F Tzeng, Y. Pan, P. Fan, X. Wang, T. Li, Muhammad Khurram Khan, "b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET", IEEE Transactions on Information Forensics and Security, vol. 8, issue 11, pp. 1860-1875, Nov. 2013 [ISI SCI-E]
  246. D. He, N. Kumar, Muhammad Khurram Khan, J. H Lee, "Anonymous Two-factor Authentication for Consumer Roaming Service in Global Mobility Networks", IEEE Transactions on Consumer Electronics, vol. 59, no. 4, pp. 811-817, Nov. 2013 [ISI SCI-E]
  247. A. Akhunzadaa, A. Gani, N.B. Anuar, A. Aziz, Muhammad Khurram Khan, A. Hayat, S.U. Khan,"Secure and Dependable Software Defined Networks", In Press, Journal of Network and Computer Applications, Elsevier Science, Dec. 2015 [ISI SCI-E]
  248. R. Amin, SKH Islam , G. P. Biswas, Muhammad Khurram Khan, MS. Obaidat, "Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System", Journal of Medical Systems, Springer, vol. 39, Issue 11, Nov 2015 [ISI SCI-E]
  249. SKH Islam, AK Das, Muhammad Khurram Khan, "A Novel Biometric-based Password Authentication Scheme for Client-server Environment using ECC and Fuzzy Extractor", Accepted for Publication, International Journal of Adhoc and Ubiquitous Computing, Nov. 2015 [ISI SCI-E]
  250. SA Chaudhry, K. Mahmood, H. Naqvi, Muhammad Khurram Khan, "An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems based on Elliptic Curve Cryptography", Journal of Medical Systems, Springer, vol. 39, issue 11, Nov. 2015 [ISI SCI-E]
  251. R. Amin, SK Hafizul Islam, G. P. Biswas, M. K. Khan, X. Li, "Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems", Journal of Medical Systems, Springer, vol. 39, issue 11, Nov. 2015 [ISI SCI-E]
  252. S.J Horng, S.F Tzeng, PH Huang, X. Wang, T. Li, Muhammad Khurram Khan, "An Efficient Certificateless Aggregate Signature with Conditional Privacy-Preserving for Vehicular Sensor Networks", vol. 317, issue 1, pp. 48-66, Information Sciences, Elsevier, Oct. 2015 [ISI SCI-E]
  253. M. Alizadeh, M. Zamani, S. Baharun, A. AbdulManaf, K.Sakurai, H. Anada, H. Keshavarz, S. A Chaudhry, Muhammad Khurram Khan, "Cryptanalysis and Improvement of 'A Secure Password Authentication Mechanism for Seamless Handover in ProxyMobile IPv6 Networks", Accepted for Publication, PLOS ONE, Oct. 2015 [ISI SCI-E]
  254. S. Kumari, F. Wu, X. Li, MS Farash, Qi Jiang, Muhammad Khurram Khan, A.K Das, "Single Round-trip SIP Authentication Scheme with Provable Security for Voice over Internet Protocol using Smart Card, Multimedia Tools and Applications, Springer, vol. 75, Issue 24, pp 17215-17245, December 2016 [ISI SC-IE]
  255. R. Amin, SKH Islam, G. P. Biswas, Muhammad Khurram Khan, N. Kumar, "An Efficient and Practical Smart Card Based Anonymity Preserving UserAuthentication Scheme for TMIS using Elliptic Curve Cryptography", Accepted for Publication, Journal of Medical Systems, Springer, Sept. 2015 [ISI SCI-E]
  256. S. Kumari, L. Xiong, F. Wu, SA. Chaudary, Muhammad Khurram Khan, "An improved smart card based authentication scheme for session initiation protocol", Accepted for Publication, Peer-to-Peer Networking and Applications, Springer, August 2015 [ISI SCI-E]
  257. SKH Islam, MS Farash, G. P. Biswas, Muhammad Khurram Khan, MS Obaidat, "A Pairing-free Certificateless Digital Multisignature Scheme using Elliptic Curve Cryptography", Accepted for Publication, International Journal of Computer Mathematics, Taylor & Francis, August 2015 [ISI SCI-E]
  258. S.K.H Islam, Muhammad Khurram Khan, X. Li, "Security Analysis and Improvement of `A More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System'", PLOS ONE, August 2015 [ISI SCI-E]
  259. M.S Farash, S.A Chaudhry, M. Hyderi, M.S. Sadough, S. Kumari, Muhammad Khurram Khan, "A Lightweight Anonymous Authentication Scheme for Consumer Roaming in Ubiquitous Networks with Provable Security", Accepted for Publication, International Journal of Communication Systems, Wiley, June 2015 [ISI SCI-E]
  260. S. A Chaudhry, M.S Farash, H. Naqvi, S. Kumari, Muhammad Khurram Khan, "An Enhanced Privacy Preserving Remote User Authentication Scheme with Provable Security", Accepted for Publication, Security and Communication Networks, June 2015 [ISI SCI-E]
  261. Muhammad Khurram Khan, A. Chaturvedi, D. Mishra, Saru Kumari, On the Security Enhancement of Integrated Electronic Patient Records Information Systems, Computer Science and Information Systems, vol. 12, issue 2, June 2015 [ISI SCI-E]
  262. J. Dongli, D. Xintao, Muhammad Khurram Khan, "Modified Artificial Bee Colony Optimization with Block Perturbation Strategy", Engineering Optimization, Taylor & Francis, vol. 47, issue 5, pp. 642-655, May 2015 [ISI SCI-E]
  263. S. Kumari, Muhammad Khurram Khan, M. Atiquzzaman, "User Authentication Schemes for Wireless Sensor Networks: A Review", Ad Hoc Networks, Elsevier, vol. 27, pp.159-194, April 2015 [ISI SCI-E]
  264. Z. Siddiqui, A. Hanan, Muhammad Khurram Khan, A. Alghamdi, "Cryptanalysis and Improvement of 'A Secure Authentication Scheme for Telecare Medical Information System' with Nonce Verification", In Press, Peer-to-Peer Networking and Applications, Springer, April 2015 [ISI SCI-E]
  265. W. Zhang, X. Wang, Muhammad Khurram Khan, "A Virtual Bridge Certificate Authority-based Cross-domain Authentication Mechanism for Distributed Collaborative Manufacturing Systems", Security & Communication Networks, Wiley, pp. 937-951, vol. 8, issue 6, April 2015 [ISI SCI-E]
  266. W. Halboob, H. Abbas, Muhammad Khurram Khan, F.A Khan, M. Pasha, "A Framework to Address Inconstant User Requirements in Cloud SLAs Management", Cluster Computing, Springer, vol. 18, Issue 1, pp. 123-133, March 2015 [ISI SCI-E]
  267. E. Ahmed, A. Gani, Muhammad Khurram Khan, R. Buyya, SU Khan, "Seamless Application Execution in Mobile Cloud Computing: Motivation, Taxonomy, and Open Challenges", Journal of Network & Computer Applications, Elsevier, March 2015 [ISI SCI-E]
  268. SKH Islam, Muhammad Khurram Khan, MS. Obaidat, Fahad Muhaya, "Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks using Extended Chaotic Maps", In Press, Wireless Personal Communications, Springer, March 2015 [ISI SCI-E]
  269. X. Li, J. Liao, S. Kumari, W. Liang, F. Wu, Muhammad Khurram Khan, "A New Dynamic ID based User Authentication Scheme using Mobile Device: Cryptanalysis, the Principles and Design", In Press, Wireless Personal Communications, Springer, Feb. 2015 [ISI SCI-E]
  270. A. Akhunzada, M. Sookhak, Nor Badrul Anuar, A. Gani, E. Ahmed, S. Furnell, A. Hyat, Muhammad Khurram Khan, "Man-At-The-End Attacks: Analysis, Taxonomy, Human Aspects, Motivation and Future Directions", Journal of Network and Computer Applications, Elsevier, vol. 48, pp. 44-57, February 2015 [ISI SC-E]
  271. H. Debiao, Muhammad Khurram Khan, N. Kumar, "A New Handover Authentication Protocol based on Bilinear Pairing Functions for Wireless Networks", International Journal of Ad hoc and Ubiquitous Computing, pp. 67-74, vol. 18, nos. 1/2, 2015. [ISI SCI-E]
  272. B. Huang, Muhammad Khurram Khan, L. Wu, F. B Muhaya, D. He, "An Efficient Remote User Authentication with Key Agreement Scheme using Elliptic Curve Cryptography", In Press, Wireless Personal Communications, Springer, Feb. 2015 [ISI SCI-E]
  273. M. Sookhak, A. Akhunzada, A. Sookhak, M. Eslaminejad, A. Gani, Muhammad Khurram Khan, L. Xiong, WX Ming, "Geographic Wormhole Detection in Wireless Sensor Network", PLOS ONE, vol. 10, issue 1, Jan. 2015 [ISI SCI-E]
  274. D. Mishra, S. Kumari, Muhammad Khurram Khan, S. Mukhopadhya, "An Anonymous Biometric Based Remote User Authenticated Key Agreement Scheme for Multimedia Systems", Accepted for Publication, International Journal of Communication Systems, Wiley, Jan. 2015 [ISI SCI-E]
  275. X Li, JW Niu, S Kumari, Muhammad Khurram Khan, JG Liao, W Liang, "Design and Analysis of a Chaotic Maps-based Three Party Authenticated Key Agreement Protocol", Accepted for Publication, Nonlinear Dynamics, Springer, Jan. 2015 [ISI SCI-E]
  276. X. Li, J. Niu, S. Kumari, J.Liao, W. Liang, Muhammad Khurram Khan, "A New Authentication Protocol for Healthcare Application using Wireless Medical Sensor Networks with User Anonymity", Accepted for Publication, Security and Communication Networks, Wiley, Jan. 2015 [ISI SCI-E]
  277. S. Kumari, Muhammad Khurram Khan, "Cryptanalysis and Improvement of 'A Robust Smart-Card-Based Remote User Password Authentication Scheme'", International Journal of Communication Systems, Wiley, pp. 3939-3955, vol. 27, issue 12, Dec. 2014. [ISI SCI-E]
  278. S. Kumari, Muhammad Khurram Khan, X. LI, "A More Secure Digital Rights Management Authentication Scheme Based on Smart Card, Accepted for Publication, Multimedia Tools and Applications, Springer, Nov. 2014 [ISI SCI-E]
  279. S.J Horng, S.F Tzeng, X.Wang, S. Qiao, X. Gong, Muhammad Khurram Khan, "Cryptanalysis on a Portable Privacy-Preserving Authentication and Access Control Protocol in VANETs", vol 79, Issue 2, pp. 1445-1454, Wireless Personal Communications, Springer, November 2014, [ISI SCI-E]
  280. M.H Eldefrawy, Muhammad Khurram Khan, "Banknote Validation Through Embedded RFID Chip and NFC-enabled Smart Phone", In Press, Mathematical Problems in Engineering, Nov. 2014 [ISI SCI-E]
  281. S. J Horng, D. Rosiyadi, P. Fan, X. Wang, Muhammad Khurram Khan, "An Adaptive Watermarking Scheme for e-government Document Images", Multimedia Tools and Applications, Springer-Verlag, vol. 72, issue 3, pp. 3085-3103, Oct. 2014 [ISI SCI-E]
  282. S.K.H Islam, Muhammad Khurram Khan, A.M. Al-Khouri, "Anonymous and Provably Secure Certificateless Multireceiver Encryption without Bilinear Pairing", Accepted for Publication, Security and Communication Networks, Wiley, Oct. 2014 [ISI SCI-E]
  283. M. Shookhak, H. Talebian, E. Ahmed, A. Gani, Muhammad Khurram Khan, "A Review on Remote Data Auditing in Single Cloud Server: Taxonomy and Open Issues", Journal of Network & Computer Applications, Elsevier, vol 43, pp. 121-141, August 2014 [ISI SCI-E]
  284. SKH Islam, Muhammad Khurram Khan , "Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems, Journal of Medical Systems, Springer, August 2014 [ISI SCI-E]
  285. D. Jia, X. Duan, Muhammad Khurram Khan, "Binary Artificial Bee Colony Optimization Using Bitwise Operation", Accepted for Publication, Computers & Industrial Engineering, Elsevier, August 2014 [ISI SCI-E]
  286. L. Leng, ABJ Teoh, M. Li, Muhammad Khurram Khan, "Orientation Range of Transposition for Vertical Correlation Suppression of 2DPalmPhasor Code", Accepted for Publication, Multimedia Tools & Applications, Springer, August 2014 [ISI SCI-E]
  287. S.H Islam, Muhammad Khurram Khan, "Provably Secure and Pairing-free Identity-based Handover Authentication Protocol for Wireless Mobile Networks", Accepted for Publication, International Journal of Communication Systems, Wiley, July 2014 [ISI SCI-E]
  288. Y. Zhang, Muhammad Khurram Khan, J. Chen, D. He, "Provable Secure and Efficient Digital Rights Management Authentication Scheme using Smart Card based on Elliptic Curve Cryptography", Mathematical Problems in Engineering, In Press, July 2014 [ISI SCI-E]
  289. M. Sookhak, A. Akhunzada, A. Gani, Muhammad Khurram, "Towards Dynamic Remote Data Auditing in Computational Clouds", In Press, Scientific World Journal, May 2014 [ISI SCI-E]
  290. S. Kumari, Muhammad Khurram Khan, X. Li, "An Improved Remote User Authentication Scheme with Key Agreement", In Press, Computers & Electrical Engineering, Elsevier Science, May 2014 [ISI SCI-E]
  291. D. Mishra, S. Mukhopadhyay, S. Kumari, Muhammad Khurram Khan, "Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce", Journal of Medical Systems, Springer, vol. 38, Issue 5, April 2014 [ISI SCI-E]
  292. Muhammad Khurram Khan, S. Kumari, "Cryptanalysis and Improvement of 'An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems'", Security and Communication Networks, John Wiley & Sons, vol. 7, issue 2, pages 399-408, Feb. 2014. [ISI SCI-E]
  293. D. Mishra, S. Mukhopadhyay, A. Chaturvedi, S. Kumari, Muhammad Khurram Khan, "Cryptanalysis and Improvement of Yan et al.'s Biometric-based Authentication Scheme for Telecare Medicine Information Systems", Journal of Medical Systems, Springer, vol. 38, issue 24, June 2014 [ISI SCI-E]
  294. Xi Li, J. Niu, Muhammad Khurram Khan, J. Liao, X. Zhao, "Robust three-factor Remote User Authentication Scheme with Key Agreement for Multimedia Systems", In Press, Security and Communication Networks, Wiley, March 2014 [ISI SCI-E]
  295. L. Leng, ABJ Teoh, M. Li, Muhammad Khurram Khan, "Analysis of Correlation of 2DPalmHash Code and Orientation Range Suitable for Transposition", Neurocomputing, Elsevier, vol. 131, issue 5, pp. 377-387, May 2014 [ISI SCI-E]
  296. F. Kurniawan, M.S. Khalil, Muhammad Khurram Khan, Y. Alginahi, "Two-layer Fragile Watermarking Method Secure with Chaotic-map for Authentication of Digital Holy Quran", Scientific World Journal, Hindawi, vol. 2014, Article ID 803983, 2014 [ISI SCI-E]
  297. Z. Siddiqui, A.H Abdullah, Muhammad Khurram Khan, Abdullah S.G, "Smart Environment as a Service: Three Factor Cloud based User Authentication for Telecare Medical Information System", Journal of Medical Systems, Springer, vol. 38, issue 1, Jan. 2014 [ISI SCI-E]
  298. Muhammad Khurram Khan, S. Kumari, "An Improved User Authentication Protocol for Healthcare Services via Wireless Medical Sensor Networks", International Journal of Distributed Sensor Networks, vol. 2014, Article ID 347169, 2014. [ISI SCI-E]
  299. D. He, J. Chen, W. Shi, Muhammad Khurram Khan, "On the Security of An Authentication Scheme for Multi-server Architecture", International Journal of Electronic Security and Digital Forensics, vol. 5, no. 3/4, pp. 288-296, 2013.
  300. S. Kumari, Muhammad Khurram Khan, "More Secure Smart Card Based Remote User Password Authentication Scheme with User Anonymity, In Press, Security and Communication Networks, Wiley, Sept. 2013 [ISI SCI-E]
  301. D. He, Muhammad Khurram Khan, Cryptanalysis of aKey Agreement Protocol based on Chaotic Hash, International Journal Electronic Security and Digital Forensics, vol. 5, nos. 3/4, pp. 172-177, 2013.
  302. F. Li, M. Fahad, Muhammad Khurram Khan, T. Takagi, "Lattice-based Signcryption", Concurrency and Computation: Practice and Experience, vol. 25, Issue 14, pp. 2112-2122, Sept. 2013. [ISI SCI-E]
  303. S. Kumari, M.K Gupta, Muhammad Khurram Khan, X. Li, "An Improved Timestamp-bassed Password Authentication Schemem: Comments, Cryptanalysis and Improvement", In Press, Security and Communication Networks, Wiley, Sept. 2013 [ISI SCI-E]
  304. Muhammad Khurram Khan, S. Kumari, An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity, BioMed Research International, vol. 2013, Article ID 491289, 2013. [ISI SCI-E]
  305. L. Leng, ABJ Teoh, M. Li, Muhammad Khurram Khan, "A Remote Cancelable Palmprint Authentication Protocol Based on Multi-directional Two-dimensional PalmPhasor-Fusion", In Press, Security and Communication Networks, John-Wiley & Sons, September 2013 [ISI SCI-E]
  306. Muhammad Khurram Khan, S. Kumari, "An Authentication Scheme for Secure Access to Healthcare Services", Journal of Medical Systems, vol. 37, Issue 4, Springer-Verlag, July 2013. [ISI SCI-E]
  307. S. J Horng, D. Rosiyadi, T. Li, T. Takao, M. Guo, Muhammad Khurram Khan, "A Blind Image Copyright Protection Scheme for e-government", Journal of Visual Communication and Image Representation, Elsevier Science, vol. 24, issue 7, pp. 1099-1105, Oct. 2013. [ISI SCI-E]
  308. S.J Horng, L.Y Hsu, T. Li, S. Qiao, X. Gong, H.H Chou, Muhammad Khurram Khan, "Using Sorted Switching Median Filter to Remove High-Density Impulse Noise", Journal of Visual Communication and Image Representation, vol. 24, Issue 7, pp. 956-967, Elsevier Sciecne, Oct. 2013. [ISI SCI-E]
  309. S.J Horng, S.F Tzeng, P. Fan, X. Wang, T. Li, Muhammad Khurram Khan, "Secure Convertible Undeniable Signature Scheme Using Extended Euclidean Algorithm without Random Oracles", KSII Transactions on Internet and Information Systems, vol. 7, issue 6, pp. 1512-1532, June 2013. [ISI SCIE]
  310. S. Kumari, Muhammad Khurram Khan, R. Kumar, "Cryptanalysis and Improvement of 'A Privacy Enhanced Scheme for Telecare Medical Information Systems'", Journal of Medical Systems, Springer-Verlag, vol. 37, number 4, May 2013. [ISI SCI-E]
  311. Muhammad Khurram Khan, S. Kumari, P. Singh, "Cryptanalysis of an 'Efficient-Strong Authentication Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks'", KSII Transactions on Internet and Information Systems, vol. 7, issue 5, pp. 967-979, May. 2013. [ISI SCI-E]
  312. Muhammad Khurram Khan, S. Kumari, M.K. Gupta, "More Efficient Key-Hash Based Fingerprint Remote Authentication Scheme Using Mobile Device", In Press, Computing, Springer-Verlag, Feb. 2013. [ISI SCI-E]
  313. W. Halboob, A. Mamat, R. Mahmod, K. Alghathbar, Muhammad Khurram Khan, "Trust-based Scalable Access Control Model for Broadcast XML Documents", Information, vol. 16, no. 3(A), pp. 2075-2086, March 2013. [ISI SCI-E]
  314. D. He, Muhammad Khurram Khan, S. Wu, "On the Security of a RSA-based Certificateless Signature Scheme", International Journal of Network Security, vol.15, no.6, pp.408-410, 2013
  315. M. Mahmud, M. Mogy, Muhammad Khurram Khan, K. Alghathbar, S.S Yeo, "Designing User Profiling Prototype for Identification of Malicious Forums", Information, vol. 16, no. 3(A), pp. 1679-1692, March 2013. [ISI SCI-E]
  316. X. Li, J. Niu, Muhammad Khurram Khan, J. Liao, "An Enhanced Smart Card based Remote User Password Authentication Scheme", In Press, Journal of Network & Computer Applications, Elsevier Science, Feb. 2013. [ISI SCI-E]
  317. Muhammad Khurram Khan, H.D Biao, "Cryptanalysis of a Certificateless Aggregate Signature Scheme for Mobile Computation", In Press, Applied Mathematics & Information Sciences, Jan. 2013. [ISI SCI-E]
  318. J. Dongli, X. Duan, Muhammad Khurram Khan, "An Efficient Binary Differential Evolution with Parameter Adaptation", International Journal of Computational Intelligence Systems, pp. 328-336, vol. 6, issue 2, Feb. 2013. [ISI SCI-E]
  319. X. Li, J. Niu, Muhammad Khurram Khan, Z. Wang, "Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme", Mathematical Problems in Engineering, vol. 2013, page 1-10, 2013 [ISI SCI-E]
  320. M. H. Eldefrawy, Muhammad Khurram Khan, K. Alghathbar, "Dynamic Password Based Remote User Authentication without Time Stamping", International Journal of Innovative Computing, Information and Control, pp. 33-45, vol. 9, no. 1, January 2013. [ISI SCI-E]
  321. A. Waqar, A. Raza, H. Abbas, Muhammad Khurram Khan, "A Framework for Preservation of Cloud Users' Data Privacy using Dynamic Reconstruction of Metadata", Journal of Network & Computer Applications (JNCA), Elsevier Science, vol. 36, Issue 1, pp. 235-248, Jan. 2013. [ISI SCI-E]
  322. Muhammad Bilal khan, Khaled Alghathbar, Muhammad Khurram Khan, Abdullah AlKelabi, Abdulaziz AlAjaji, "Cyber Security using Arabic CAPTCHA Scheme", International Arab Journal of Information Technology, pp. 76-84, vol. 10, issue 1, January 2013. [ISI SCI-E]
  323. S.J Horng, D. Rosiyadi, P.Fan, W. Xian, Muhammad Khurram Khan, Y. Pan, "An Efficient Copyright Protection Scheme for E-government Document Images", IEEE Multimedia, vol. 19, issue 3, pp. 62-73, 2012. [ISI SCI-E]
  324. Muhammad Khurram Khan, D. He, "A New Dynamic Identity based Authentication Protocol for Multi-server Environment using Elliptic Curve Cryptography", Security & Communication Networks, John Wiley & Sons, vol. 5, Issue 11, pp. 1260-1266, November 2012. [ISI SCI-E]
  325. M. Alam, T. Ali, S. Khan, S. Khan, M. Ali, M. Nauman, A. Hayat, Muhammad Khurram Khan, Khaled Alghathbar, "Analysis of Existing Remote Attestation Techniques", Security & Communication Networks, John Wiley & Sons, pp. 1062-1082, vol. 5, issue 9, September 2012. [ISI SCI-E]
  326. H.C Li, P.Z Fan, Muhammad Khurram Khan, "Context-adaptive Anisotropic Diffusion for Image Denoising", IET Electronics Letters, vol. 48, Issue 14, pp. 827-829, July 2012. [ISI SCI-E]
  327. S.Y Kang, J. Park, Muhammad Khurram Khan, J. Kwak, "Study on the Common Criteria Methodology for Secure Ubiquitous Environment Construction", Journal of Intelligent Manufacturing, Springer-Verlag, vol. 23, no. 4, pp. 933-939, August 2012. [ISI SCI-E]
  328. M.S Khalil, Muhammad Khurram Khan, "Statistical Authentication of Fingerprint", The Imaging Science Journal, UK, vol.60, no. 3, pp. 165-171, June 2012. [ISI SCI-E]
  329. M. H. Eldefrawy, Muhammad Khurram Khan, K. Alghathbar, T. H. Kim, H. Elkamchouchi, "Mobile-OTP: Two-Factor Authentication using Mobile Phones", Security and Communication Networks, John Wiley & Sons, vol. 5, issue 5, pp. 508-516, May 2012. [ISI SCI-E]
  330. M.I Razzak, S. A Husain, A.A. Mirza, Muhammad Khurram Khan, "Bio-Inspired Multilayered and Multilanguage Arabic Script Character Recognition System", International Journal of Innovative Computing, Information and Control, pp. 2681, vol 8, number 4, April 2012. [ISI SCI-E]
  331. Muhammad Imran Razzak, Basem. A. Elmogy, Muhammad Khurram Khan, K. Alghathbar, "Efficient Distributed Face Recognition in Wireless Sensor Network", International Journal of Innovative Computing, Information and Control, pp. 2811, vol. 8, number 4, April 2012 [ISI SCI-E]
  332. M. Farfoura, S.J Horng, J.L Lai, R.S Run, R.J Chen, Muhammad Khurram Khan, "A Blind Reversible Method for Watermarking Relational Databases Based on a Time-stamping Protocol", Expert Systems with Applications, Elsevier Science, Vol. 39, Issue3, pp. 3185-3196, Feb. 2012. [ISI SCI-E]
  333. M Zubair Rafique, Faraz Ahmed, Muhammad Khurram Khan, Muddassar Farooq, "Securing Smart Phones Against Malicious Exploits", Information, vol. 15, no. 2, pp. 903-922, Feb. 2012. [ISI SCI- E]
  334. F. Li, Muhammad Khurram Khan, "A Biometric Identity-based Signcryption Scheme", Future Generation Computer Systems, Elsevier Science, pp. 306-310, vol 28, Issue 1, January 2012. [ISI SCI-E]
  335. Lijun Yan, Jeng-Shyang Pan, Shu-Chuan Chu, Muhammad Khurram Khan, "Adaptively Weighted Sub-directional Two-dimensional Linear Discriminant Analysis for Face Recognition", Future Generation Computer Systems, Elsevier Science, pp. 232-235, vol 28, Issue 1, January 2012. [ISI SCI-E]
  336. F. Li, Muhammad Khurram Khan, Khaled Alghathbar, Tsuyoshi Takagi, "Identity-based online/offline signcryption for low power devices", Journal of Network and Computer Applications, Elsevier Science, vol. 35, issue 1, pp. 340-347, Jan. 2012. [ISI SCI-E]
  337. M. He, S.J Horng, P. Fan, Muhammad Khurram Khan, R.S Run, J.L Lai, R.J Chen, A. Sutanto, "An Efficient Phishing Webpage Detector", Expert Systems with Applications, Elsevier Science, Vol. 38, Issue 10, pp. 12018-12027, September 2011. [ISI SCI-E]
  338. Eun-Jun Yoon, Muhammad Khurram Khan, Kee-Young Yoo, "New Robust Protocols for Remote User Authentication and Password Change", International Journal of Innovative Computing, Information and Control, pp. 5583-5603, Vol. 7, No. 9, Sept. 2011. [ISI SCI-E]
  339. S.T Lin, S.J Horng, B.H Lee, P. Fan, Y. Pan, J.L Lai, R.J Chen, Muhammad Khurram Khan, "Application of Grey-relational Analysis to Find the Most Suitable Watermarking Scheme", International Journal of Innovative Computing, Information and Control, volume 7, Number 9, September 2011. [ISI SCI-E]
  340. Dongli Jia, Guoxin Zheng, Muhammad Khurram Khan, "An Effective Memetic Differential Evolution Algorithm Based on Chaotic Local Search", Information Sciences, Elsevier Science, vol. 181, Issue 15, pp. 3175-3187, August 2011. [ISI SCI-E]
  341. Y.L Huang, S.J Horng, T.W Kao, R.S Run, J.L Lai, R.J Chen, I.H Kuo, Muhammad Khurram Khan, "An Improved Forecasting Model Based on the Weighted Fuzzy Relationship Matrix Combined with a PSO Adaptation for Enrollments", International Journal of Innovative Computing, Information and Control (IJICIC), vol. 7, number 7, July 2011. [ISI SCI-E]
  342. Y.L Huang, S.J Horng, M.X He, P. Fan, T.W Kao, Muhammad Khurram Khan, J.L Lai, I. H Kuo, "A Hybrid Forecasting Model for Enrollments based on Aggregated Fuzzy Time Series and Particle Swarm Optimization", Expert Systems with Applications, Elsevier Science, vol. 38, Issue 7, pp. 8014-8023, July 2011. [ISI SCI-E]
  343. Dongli Jia, Guoxin Zheng, Bo Yang Qu, Muhammad Khurram Khan, "A Practical Hybrid Particle Swarm Optimization Algorithm for High-dimensional Complex Engineering Problems", Computers and Industrial Engineering, Elsevier Science, vol. 61 Issue 4, pp. 1117-1122, November, 2011. [ISI SCI-E]
  344. Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar, Rubiyah Yousaf , "Multimodal Biometric Recognition based on Fusion of Low Resolution Face and Finger Veins", Accepted for Publication, International Journal of Innovative Computing, Information and Control (IJICIC), vol. 7, no. 8, pp. 4679-4689, August 2011. [ISI SCI-E]
  345. Muhammad Khurram Khan, Khaled Alghathbar, Jiashu Zhang, "Secure and Tokenless Privacy-Protecting Chaotic Revocable Biometrics Authentication Scheme", Telecommunication Systems, Springer-Verlag, vol. 47, no. 3-4, pp. 227-234, June 2011. [ISI SCI-E]
  346. F. Li, Muhammad Khurram Khan, "A Survey of Identity-Based Signcryption", IETE Technical Review, vol. 28, Issue 3, pp. 265-272, May-June 2011. [ISI SCI-E]
  347. Hong Zhao, Hongxia Wang, Muhammad Khurram Khan, "Steganalysis for Palette-based Images using Generalized Difference Image and Color Correlogram", Signal Processing, Elsevier Science, May 2011. [ISI SCI-E]
  348. S.J Horng, W.H Lin, T.W Kao, P. Fan, Muhammad Khurram Khan, "An Efficient Wavelet-tree-based Watermarking Method", Expert Systems with Applications (ESWA), Elsevier Science, vol. 38, issue 11, pp. 14357-14366, Jan. 2011. [ISI SCI-E]
  349. Mohammad Sayim Khalil, Muhammad Imran Razzak, Muhammad Khurram Khan, "Fingerprint Classification Using PCA, LDA, L-LDA and BPN", Information, pp.3313-3324, vol.14, no.10, Oct. 2011. [ISI SCI-E]
  350. M. He, S.J Horng, P. Fan, Muhammad Khurram Khan, R.S Run, J.L Lai, R.J Chen, "A Fast RFID Tag Identification Algorithm Based on Counter and Stack", Expert Systems with Applications, Elsevier Science, vol. 38, Issue 6, pp. 6829-6838, June 2011. [ISI SCI-E]
  351. L.Y Hsu, S.J Horng, M.X He, P. Fan, T.W Kao, Muhammad Khurram Khan, R.S Run, J.L Lai, R. J Chen, "Mutual Funds Trading Strategy based on Particle Swarm Optimization", Expert Systems with Applications, Elsevier Science, vol. 38, Issue 6, pp. 7582-7602, June 2011. [ISI SCI-E]
  352. L.Y Hsu, S.J Horng, P. Fan, Muhammad Khurram Khan, Y.R Wang, R.S Run, J.L Lai, R.J Chen, "MTPSO Algorithm for Solving Planar Graph Coloring Problem", Expert Systems with Applications, Elsevier Science, vol. 38, Issue 5, pp. 5525-5531, May 2011. [ISI SCI-E]
  353. Muhammad Khurram Khan, Jiashu Zhang, Khaled Alghathbar, "Challenge-Response based Biometric Image Scrambling for Secure Personal Identification", Future Generation Computer Systems (FGCS), Elsevier Science, vol. 27, pp. 411-418, April 2011. [ISI SCI-E]
  354. Hong Zhao, Hong-Xia Wang, Muhammad Khurram Khan, "Statistical Analysis of Several Reversible Data Hiding Algorithms", Journal of Multimedia Tools and Applications (MTAP), Springer-Verlag, vol. 52, numbers 2-3, pp. 277-290, April 2011. [ISI SCI-E]
  355. Muhammad imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar, Jong Hyuk Park, "Energy Efficient Distributed Face Recognition in Wireless Sensor Network", Wireless Personal Communications, Springer-Verlag, vol. 60, no. 3, pp. 571-582, 2011. [ISI SCI-E]
  356. Muhammad Khurram Khan, Soo-Kyun Kim, Khaled Alghathbar, "Cryptanalysis and Security Enhancement of a 'More Efficient & Secure Dynamic ID-based Remote User Authentication Scheme'", Computer Communications, Elsevier Science, vol. 34, issue 3, pp. 305-309, March 2011. [ISI SCI-E]
  357. Bilal Khan, Khaled Alghathbar, Syed Irfan Nabi, Muhammad Khurram Khan, Effectiveness of Information Security Awareness Methods based on Psychological Theories, AJBM, vol. 5, issue 26, pp. 10862-10868, Oct. 2011. [ISI SCI-E]
  358. S.Y Lin, S.J Horng, T.W Kao, C.S Fahn, P. Fan, Y.H Chen, Muhammad Khurram Khan, A. Bourgeois, T. Terano, "3D Block-Based Medial Axis Transform and Chessboard Distance Transform Based on Dominance", Image and Vision Computing, Elsevier Science, vol. 29, Issue 4, pp. 272-285, Feb. 2011. [ISI SCI-E]
  359. Xianfeng Guo, Jiashu Zhang, Muhammad Khurram Khan, Khaled Alghathbar, "Secure Chaotic Map based Block Cryptosystem with Application on Camera Sensor Networks", Sensors, vol. 11, issue 2, pp. 1607-1619, Feb. 2011. [ISI SCI-E]
  360. Lu Leng, Jiashu Zhang, Muhammad Khurram Khan, Xi Chen, Ming Ji, Khaled Alghathbar, "Cancelable PalmCode Generated from Randomized Gabor Filters for Palmprint Template Protection", Scientific Research & Essays, vol. 6, number 3, Feb. 2011. [ISI SCI-E]
  361. Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar, Rubiyah Yusof, "CSLDA and LDA Fusion based Face Recognition", Przeglad Elektrotechniczny, vol. 87, Issue 1, pp. 210-214, Jan. 2011. [ISI SCI-E]
  362. Zeeshan Shafi Khan, Khalid Rashid, Muhammad Khurram Khan, Muhammad Sher, "An Extended Intrusion Detection and Prevention System for Next Generation Network Application", Information, vol. 14, no. 1, pp. 135-150, Jan. 2011. [ISI SCI-E]
  363. Zeeshan Siddiqui, Abdul Hanan Abdullah, Muhammad Khurram Khan, Khaled Alghathbar, "Analysis of Enterprise Service Buses based on Information Security, Interoperability and High-availability using AHP Method", International Journal of Physical Sciences, Vol. 6, no. 1, pp. 35-42, Jan. 2011. [ISI SCI-E]
  364. Muhammad Imran Razzak, Syed Afaq Husain, Muhammad Khurram Khan, Muhammad Sher, "Handling Diacritical Marks for Online Arabic Script Based Languages Character Recognition using Fuzzy c-mean Clustering and Relative Position", Information, vol. 14, no. 1, pp. 157-166, Jan. 2011 [ISI SCI-E]
  365. Eun-Jun Yoon, Muhammad Khurram Khan, Kee-Young Yoo, Cryptanalysis of a Handover Authentication Scheme using Credentials based on Chameleon Hashing, IEICE Transactions on Information and Systems, volume E93-D, number 11, pp. 3400-3402, Dec. 2010. [ISI SCI-E]
  366. Eun-Jun Yoon, Muhammad Khurram Khan, Kee-Young Yoo, "Improvement of the Efficient Secret Broadcast Scheme", IEICE Transactions on Information and Systems, volume E93-D, no. 11, pp. 3396-3399, Dec. 2010. [ISI SCI-E]
  367. Lu Leng, Jiashu Zhang, Muhammad Khurram Khan , Xi Chen, Khaled Alghathbar, "Dynamic Weighted Discrimination Power Analysis: a Novel Approach for Face and Palmprint Recognition in DCT Domain", International Journal of the Physical Sciences, vol. 5, Issue, 17, pp. 2543-2554, Dec. 2010. [ISI SCI-E]
  368. A. Rahim, Z.S Khan, F.B Muhaya., M. Sher, Muhammad Khurram Khan, "Information Sharing in Vehicular Adhoc Network", International Journal of Computers, Communications & Control, vol. 5, issue 5, pp. 892-899, Dec. 2010 [ISI SCI-E]
  369. Zeeshan Shafi Khan, Farzana Azam, Khaled Alghathbar, Muhammad Sher, Khalid Rashid,Muhammad Khurram Khan, "Attack Containment in Mobile Ad-hoc Network Through Fair Distribution of Processing Resources", Accepted for Publication, Telecommunication Systems, Springer-Verlag, Dec. 2010 [ISI SCI-E]
  370. Xiaomin Wang, Wei Guo, Wenfang Zhang, Muhammad Khurram Khan, Khaled Alghathbar, "Cryptanalysis and Improvement on a Parallel Keyed Hash Function based on Chaotic Neural Network", In Press, Telecommunication Systems, Springer-Verlag, October 2010. [ISI SCI-E]
  371. Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar, Eun-suk Cho, "Broadcast Authentication for Wireless Sensor Network using Nested Hashing and Chinese Remainder Theorem", Journal of Sensors, vol. 10, issue 9, pp. 8683-8695, September 2010. [ISI SCI-E]
  372. Muhammad Usama, Muhammad Khurram Khan, Khaled Alghathbar, Changhoon Lee, "Chaos-based Secure Satellite Imagery Cryptosystem", Journal of Computer and Mathematics with Applications (CMA), Elsevier Science, vol. 60, number 2, pp. 326-337, July 2010. [ISI SCI-E]
  373. M. Nauman, T. Ali, M. Alam, Muhammad Khurram Khan, Khaled Alghathbar, "Information Flow Analysis of UCON", International Journal of Physical Sciences, vol. 5, number 6, pp. 865-875, June 2010. [ISI SCI-E]
  374. Muhammad Khurram Khan, Ling Xie, Jiashu Zhang, "Chaos and NDFT-based Concealing of Fingerprint-biometric Data into Audio Signals for Trustworthy Person Authentication", Digital Signal Processing (DSP), Elsevier Science, volume 20, issue 1, pp. 179-190, January 2010. [ISI SCI-E]
  375. Muhammad Khurram Khan, Khaled Alghathbar, "Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'", Journal of Sensors, Vol. 10, Issue 3, pp. 2450-2459, March 2010. [ISI SCI-E]
  376. Mingxing He, Shi-Jinn Horng, Pingzhi Fan, Ray-Shine Run, Rong-Jian Chen, Jui-Lin Lai, Muhammad Khurram Khan, Kevin Octavius Sentosa, "Performance Evaluation of Score Level Fusion in Multimodal Biometric Systems", Pattern Recognition, Elsevier Science, vol. 43, issue 5, pp. 1789-1800, May 2010. [ISI SCI-E]
  377. Mohammed S. Khalil, D. Muhammad, Muhammad Khurram Khan, Qais AL-Nuzaili, "Fingerprint Verification using Statistical Descriptors", Digital Signal Processing (DSP), Elsevier Science, vol. 20, issue 4, pp. 1264-1273, July 2010. [ISI SCI-E]
  378. Maqsood Mahmud, Muhammad Khurram Khan, Khaled Alghathbar, Abdul Hanan Bin Abdullah, Mohammad Yazid Bin Idris, "Intrinsic Authentication of Multimedia Objects using Biometric Data Manipulation", In Press, International Arab Journal of Information Technology (IAJIT), May 2010. [ISI SCI-E]
  379. Bilal Khan, Muhammad Khurram Khan, Khaled S. Alghathbar, "Biometrics and Identity Management for Homeland Security Applications in Saudi Arabia", AJBM, vol. 4, no. 15, pp. 3296-3306, Nov. 2010. [ISI SSCI]
  380. Mohammed S. Khalil, Dzulkifli Muhammad, Muhammad Khurram Khan, Khaled Alghathbar, "Singular Points Detection using Fingerprint Orientation Field Reliability", International Journal of Physical Sciences, vol. 5, issue 4, pp. 352-357, April 2010. [ISI SCI-E]
  381. Muhammad Khurram Khan, "Fingerprint Biometric-based Self and Deniable Authentication Schemes for the Electronic World", IETE Technical Review, vol. 26, issue 3, pp. 191-195, May-June, 2009. [ISI SCI-E]
  382. Muhammad Khurram Khan, Jiashu Zhang, "Multimodal Face and Fingerprint Biometrics Authentication on Space-Limited Tokens", Neurocomputing, Elsevier Science, vol. 71, issues 13-15, pp. 3026-3031, August 2008. [ISI SCI-E]
  383. Muhammad Khurram Khan, Jiashu Zhang, Xiaomin Wang, "Chaotic Hash-based Fingerprint Biometric Remote User Authentication Scheme on Mobile Devices", Chaos, Solitons, and Fractals, Elsevier Science, UK, vol. 35, issue 3, pp. 519-524, February 2008. [ISI SCI-E]
  384. Muhammad Khurram Khan, Jiashu Zhang, Lei Tian, "Chaotic Secure Content-based Hidden Transmission of Biometric Templates", Chaos, Solitons and Fractals, Elsevier Science, UK, vol. 32, no. 5, pp. 1749-1759, June 2007. [ISI SCI-E]
  385. Muhammad Khurram Khan, Jiashu Zhang, "Improving the Security of 'A Flexible Biometrics Remote User Authentication Scheme'", Computer Standards and Interfaces (CSI), Elsevier Science, UK, vol. 29, issue 1, pp. 84-87, January 2007. [ISI SCI-E]
  386. Xiaomin Wang, Wenfang Zhang, Jiashu Zhang, Muhammad Khurram Khan, "Cryptanalysis and Improvement on Two Efficient Remote User Authentication Schemes Using Smart Cards", Computer Standards and Interfaces (CSI), Elsevier Science UK, vol. 29, issue 5, pp. 507-512, July 2007. [ISI SCI-E]
  387. Muhammad Khurram Khan, Jiashu Zhang, "Pointing a Finger towards Standardized and Automated Biometrics", IEEE Multimedia, vol. 13, issue 4, pp. 73-75, October, 2006. [ISI SCI-E]
  388. Muhammad Khurram Khan, Jiashu Zhang, "Tamper Proof Identity Verification for Intelligent Transportation Systems", IEEE Pervasive Computing, vol. 5, no. 4, pp. 67, 2006. [ISI SCI-E]
  389. Muhammad Babar Khan, Muhammad Khurram Khan, Jiashu Zhang, Dianye Zhang, "A New Multimodal Biometric Security System for Intelligent Transportation Systems (ITS)", GESTS International Transactions on Computer Science and Engineering, vol. 35, no.1, 2006.
  390. Muhammad Khurram Khan, Jiashu Zhang, "Cryptanalysis and Comments on a Dynamic Id-based Authentication Scheme", International Journal of Computer Science and Network Security, vol. 5, no. 11, Nov. 2005.
  391. Jia Dong Li, Muhammad Khurram Khan, Zhang Jiashu, "New Iris Localization Method Based on Chaos Genetic Algorithms", Journal of Southwest Jiaotong University, vol. 13, no.1, pp. 35-38, May 2005.
  392. Muhammad Khurram Khan, Zhang Jiashu, "Enhancing the Security of Biometric Templates for Trust Worthy Person Authentication", International Transaction on Computer Science & Engineering, vol. 6, no.1, pp. 166-176, May 2005. [Invited Paper].

  393. Conference Publications


  394. Q. Lin, L. Leng, Muhammad Khurram Khan, "Deep Ternary Hashing Code for Palmprint Retrieval and Recognition", 6th International Conference on Advances in Artificial Intelligence, 21-23 October, 2022, UK
  395. Y. Shu, J. Wang, L. Kong, J.Yu, G. Yang, Y. Cai, Z. Wang, Muhammad Khurram Khan, "WiBWi: Encoding-based Bidirectional Physical-Layer Cross-Technology Communication between BLE and WiFi", 27th IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS), Dec. 2021, Beijing, China
  396. W. Khan, Muhammad Khurram Khan, Q. Arshad, H. Malik, J. Almuhtadi, "Digital Labels: Influencing Customers Trust and Raising Cyber Security Awareness for Adapting Autonomous Vehicles", 39th IEEE International Conference on Consumer Electronics, Jan. 2021, USA
  397. Z. Wen, L. Kong, G. Chen, Muhammad Khurram Khan, S. Mumtaz, J. J.P.C. Rodrigues. “Understanding Multi-Path Routing Algorithms in Datacenter Networks”, IEEE Globecom, Waikoloa, HI, USA, 2019.
  398. Z. Wu, L. Kong, G. Chen, Muhammad Khurram Khan, S. Mumtaz, J.J.P.C. Rodrigues. “CrowdSwitch: Crowdsensing Based Switch Between Multiple Cellular Operators in Subways”, IEEE Globecom, Waikoloa, HI, USA, 2019
  399. W.Z. Khan, M.Y Aalsalem, Muhammad Khurram Khan, "Five Acts of Consumer Behavior: A Potential Future Threat to Internet of Things Security and Privacy", Accepted for Publication at 36th IEEE International Conference on Consumer Electronics (ICCE'18), Jan. 2018, Las Vegas, USA
  400. Muhammad Khurram Khan, Z. Siddiqui, O. Tayan, "A Secure Framework for Digital Quran Certification", 35th IEEE International Conference on Consumer Electronics (ICCE'17), Jan. 2017, Las Vegas, USA
  401. M. Alizadeh, M.H Tadayony, K. Sakuraiz, S. Baharun, H. Anada, M. Zamani, A. Zeki, S.A Chaudhry, Muhammad Khurram Khan, "Comments and Improvements of " HOTA: Handover Optimized Ticket-Based Authentication in Network-Based Mobility Management", 20th IEEE International Conference on Innovations in Clouds, Internet and Networks (ICIN'17), 7-9 March 2017, Paris, France
  402. W.Z Khan, M. Alsalem, S. Sohrab, M. Atiquzzaman, Muhammad Khurram Khan, "A Reliable Internet of Things Architecture for Oil and Gas Industry", 19th IEEE International Conference on Advanced Communications Technology (ICACT'17), 19-22 Feb. 2017, Phoenix Park, PyeongChang, Korea
  403. Y. Cao, X.Y. Liu, L. Kong, M.Y Wu, Muhammad Khurram Khan, "EHR: Routing Protocol for Energy Harvesting Wireless Sensor Networks", 22nd IEEE International Conference on Parallel and Distributed Systems (ICPADS'16), 13-16 Dec. 2016, Wuhan, China
  404. W.Z Khan, M.Y Aalsalem, Muhammad Khurram Khan, Q. Arshad, "Enabling Consumer Trust upon Acceptance of IoT Technologies through Security and Privacy Model", 11th International Conference on Future Information Technology (FutureTech'16), April 2016, Beijing, China
  405. A. Aburumman, W.J Seo, R. Islam, Muhammad Khurram Khan, K. K.R. Choo, "A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering", SecureComm 2015, LNICST 164, pp. 1-16, 2015, USA
  406. R. Amin, SKH Islam, G.P. Biswas, Muhammad Khurram Khan, "An Efficient Remote Mutual Authentication Scheme using Smart Mobile Phone over Insecure Networks", International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2015), June 8-9, 2015, London, UK
  407. F. Kurniawan, M.S Khalil, Muhammad Khurram Khan, H. Malik, "Dual-Microphone Forensics of Identical Model Based on Signal Analysis", ICIST 2015, Turkey, March 2015
  408. F. Kurniawan, M.S Khalil, Muhammad Khurram Khan, Y. Alginahi, "DWT+LSB-based Fragile Watermarking Method For Quran Images", IEEE International Symposium on Biometrics & Security Technologies (ISBAST 2014), 26-27 August 2014, Kuala Lumpur, Malaysia
  409. Muhammad Khurram , S. Kumari, X. Wang, R. Kumar, "Security Issues of Chen et al.'s Dynamic ID-based Authentication Scheme", 12th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2014), August 24-27, 2014, Dalian, China
  410. S. Kumari, Muhammad Khurram Khan, X. Li, R. Kumar, "Notes on A Password-Based Remote User Authentication Scheme without Smart Card", IEEE International Symposium on Biometrics & Security Technologies (ISBAST 2014), 26-27 August 2014, Kuala Lumpur, Malaysia
  411. X. Li, Muhammad Khurram Khan, S. Kumari, "Cryptanalysis of a Robust Smart Card Authentication Scheme for Multi-server Architecture", IEEE International Symposium on Biometrics & Security Technologies (ISBAST 2014), 26-27 August 2014, Kuala Lumpur, Malaysia
  412. A. Derhab, A. Bouras, F.B. Muhaya, Muhammad Khurram Khan, Y. Xiang, "Spam Trapping System: Novel Security Framework to Fight against Spam Botnets", 21st IEEE International Conference on Telecommunications, 5-7 May 2014, Lisbon, Portugal
  413. L. Leng, G. Liu, M. Li, Muhammad Khurram Khan, A. Al-Khouri, "Logical Conjunction of Triple-perpendicular-directional Translation Residual for Contactless Palmprint Preprocessing", 11th IEEE International Conference on Information Technology: New Generations, 7-9 April 2014, Las Vegas, USA
  414. M.H Eldefrawy, Muhammad Khurram Khan, H. Elkamchouchi, "The Use of Two Authentication Factors to Enhancethe Security of Mass Storage Devices", 11th IEEE International Conference on Information Technology: New Generations, 7-9 April 2014, Las Vegas, USA
  415. F. Kurniawan, M.S Khalil, Muhammad Khurram Khan, Y.M Alginahi, "Exploiting Digital Watermarking to Preserve Integrityof the Digital Holy Quran Images", International Conference on Advances in Information Technology for the Holy Quran and Its Sciences, Dec. 20-25, 2013, KSA
  416. Muhammad Khurram Khan, D. He, "Cryptanalysis of 'An Improved Remote Password Authentication Scheme with Smartcard', 12th IEEE International Conference Trustcom, July 2013, Australia
  417. Muhammad Khurram Khan, S. Kumari, MK Gupta, "Cryptanalysis of Truong et al.'s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device", 6th International Conference on Brain Inspired Cognitive Systems (BICS'13), June 2013, Beijing, China
  418. X. Li, J. Niu, Muhammad Khurram Khan, J. Liao, "Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards", IEEE International Symposium on Biometrics & Security Technologies (ISBAST'13), 2-5 July 2013, Chengdu, China.
  419. S. Kumari, Muhammad Khurram Khan, F.B Muhaya, R. Kumar, "Cryptanalysis of 'A Robust Smart-Card-Based Remote User Password Authentication Scheme'", IEEE International Symposium on Biometrics & Security Technologies (ISBAST'13), 2-5 July 2013, Chengdu, China.
  420. X. Li, J. Niu, Muhammad Khurram Khan, J. Liao, "Robust biometric based three-factor remote user authentication scheme with key agreement", IEEE International Symposium on Biometrics & Security Technologies (ISBAST'13), 2-5 July 2013, Chengdu, China.
  421. F. Kurniawan, M.S. Khalil, Muhammad Khurram Khan, "Core-point Detection on Camera-base Fingerprint Image", IEEE International Symposium on Biometrics & Security Technologies (ISBAST'13), 2-5 July 2013, Chengdu, China
  422. L. Leng, ABJ Teoh, M. Li, Muhammad Khurram Khan, "Orientation Range for Transposition According to the Correlation Analysis of 2DPalmHash Code", IEEE International Symposium on Biometrics & Security Technologies (ISBAST'13), 2-5 July 2013, Chengdu, China.
  423. F. Kurniawan, Mohammed S. Khalil, Muhammad Khurram Khan, Y.M Alginahi, "Authentication and Tamper Detection of Digital Holy Quran Images", IEEE International Symposium on Biometrics & Security Technologies (IEEE ISBAST'13), July, Chengdu, China
  424. M. H. Eldefrawy, Muhammad Khurram Khan, "Detecting Counterfeit-Money using RFID-enabled Mobile Devices", 7th International Conference for Internet Technology and Secured Transactions (ICITST'12), London, UK, Dec. 2012
  425. Muhammad Khurram Khan, S. Kumari, M. Gupta , "Further Cryptanalysis of 'A Remote Authentication Scheme Using Mobile Device'", 8th International Conference on Information Assurance & Security (IAS'12), Brazil, Nov. 2012.
  426. Muhammad Khurram Khan, H.D Biao, "Weaknesses of 'Security Analysis and Enhancement for Three-party Password-based Authenticated Key Exchange Protocol'", 6th International Conference on Network and Systems Security (NSS'12), LNCS 7646, Springer-Verlag, pp. 530-536, Nov. 2012.
  427. Lu Leng, Shuai Zhang, Xue Bi, Muhammad Khurram Khan, "Two-Dimensional Cancelable Biometric Scheme", ICWAPR'12, China, July 2012.
  428. Mohammed Saeed Alkatheiri, M.H. Eldefrawy, Muhammad Khurram Khan, "BAN Logic Based Security Proof for Mobile OTP Authentication Scheme", 7th International Conference on Future Information Technology (FutureTech'12), Vancouver, Canada, June 2012
  429. S. Kumari, M. Gupta, Muhammad Khurram Khan, "Cryptanalysis of 'An Improved Timestamp-based Remote User Authentication Scheme", IEEE QR2MSE'12, China, June 2012.
  430. M. H. Eldefrawy, K. Alghathbar, Muhammad Khurram Khan, "Hardcopy Document Authentication Based on Public Key Encryption and 2D Barcodes", International Symposium on Biometrics and Security Technologies (ISBAST'12), March 2012, Taipei, Taiwan.
  431. Muhammad Khurram Khan, Pei-Wei Tsai, J.S Pan, B.Y Liao, "Biometric Driven Initiative System for Passive Continuous Authentication", 7th IEEE International conference on Information Assurance and Security (IAS), Malaysia, Dec. 2011.
  432. Fahad B. M, Muhammad Khurram Khan, Y. Xiang, "Polymorphic Malware Detection Using Hierarchical Hidden Markov Model", 9th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC'11), 24-26 October 2011, Melbourne, Australia.
  433. Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan, "Information Security Awareness Campaign: An Alternate Approach", 5th International conference on Information Security and Assurance (ISA'11), Czech Republic, May 2011.
  434. M. Zubair Rafique, Nasser Alrayes, Muhammad Khurram Khan, "Application of Evolutionary Algorithms in Detecting SMS Spam at Access Layer", 16th Genetic and Evolutionary Computing Conference, 12-16 July, 2011, Dublin, Ireland. (Nominated for the best paper award)
  435. Lu Leng, Jiashu Zhang, Gao Chen, Muhammad Khurram Khan, Khaled Alghathbar, "Two-directional Two-dimensional Random Projection and Its Variations for Face and Palmprint Recognition", 11th International Conference on Computational Science and Its Applications (ICCSA'11), LNCS, vol. 6786, pp. 458-470, 20-23 June 2011, Spain.
  436. M. Zubair Rafique, Muddassar Farooq, Muhammad Khurram Khan and Khaled Alghathbar, "A Framework for Detecting Malformed SMS Attack", IEEE/FTRA International Conference on Secure and Trust Computing, data management, and Applications (STA 2011), 28-30 June, 2011, Greece.
  437. L. Leng, J. Zang, G. Chen, Muhammad Khurram Khan, P. Bai, "Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level Fusion", 8th IEEE/FTRA International Conference on Secure and Trust Computing, data management, and Applications (STA 2011), 28-30 June, 2011, Greece.
  438. Mohammed S. Khalil, Muhammad Khurram Khan, "Co-occurrence Matrix Features for Fingerprint Verification", IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID), Jun 24-26,2011, Xiamen, China.
  439. M. Zubair Rafique, Muddassar Farooq, Muhammad Khurram Khan and Khaled Alghathbar, Embedding High Capacity Covert Channels in Short Message Service (SMS), IEEE/FTRA International Conference on Secure and Trust Computing, data management, and Applications (STA 2011), 28-30 June, 2011, Greece.
  440. Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan, "OTP-Based Two-Factor Authentication Using Mobile Phones", 8th IEEE International Conference on Information Technology: New Generations (ITNG'11), April 11-13, 2011, Las Vegas, USA.
  441. M. Zubair Rafique, Zeeshan Shafi Khan, Muhammad Khurram Khan, Khaled Alghathbar, "Securing IP-Multimedia Subsystem (IMS) Against Anomalous Message Exploits by using Machine Learning Algorithms", 8th IEEE International Conference on Information Technology: New Generations (ITNG'11), April 11-13, 2011, Las Vegas, USA.
  442. Mohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan, Hassan Elkamchouchi, "Secure Instant Messaging Protocol for Centralized Communication Group", 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS), February 2011, Paris, France.
  443. Zeeshan Siddiqui, Abdul Hanan Abdullah, Muhammad Khurram Khan, "Qualified Analysis b/w ESB(s) using Analytical Hierarchy Process (AHP) Method", IEEE International Conference on Intelligent Systems, Modelling and Simulation, pp. 100-104, January 2011, Malaysia.
  444. L. Leng, J. Zhang, J. Xu, Muhammad Khurram Khan, Khaled Alghathbar, "Dynamic Weighted discrimination Power Analysis in DCT Domain for Face and Palmprint Recognition", IEEE International Conference on ICT Convergence (ICTC'10), pp. 467-471, November, 2010, South Korea
  445. Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar, "Contactless Biometrics in Wireless Sensor Network: A Survey", 3rd International Conference on Security Technologies (SecTech'10), CCIS, Springer-Verlag, vol. 122, pp. 236-243, Dec. 2010.
  446. Muhammad Imran Razzak, Muhammad Khurram Khan, KhaledAlghathabar, "Bio-Inspired Hybrid Face Recognition System for Small Sample Size and Large Datset", 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), October 2010, Darmstadt, Germany.
  447. Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar, "One-Time Password System with Infinite Nested Hash Chains, Accepted at 3rd International Conference on Security Technologies (SecTech'10), December 2010, South Korea.
  448. Muhammad Bilal khan, Khaled Alghathbar, Muhammad Khurram Khan, Abdullah AlKelabi, Abdulaziz AlAjaji, "Using Arabic CAPTCHA for Cyber Security", 3rd International Conference on Security Technologies (SecTech'10), CCIS, Springer-Verlag, vol. 122, pp. 8-17, Dec 2010, South Korea
  449. Leng Lu, Zhang, J.S, Muhammad Khurram Khan, Bi, X, Ji, M, "Cancelable PalmCode generated from randomized Gabor Filters for palmprint protection", 25th International Conference on Image and Vision Computing (IVCNZ), Nov. 2010, New Zealand.
  450. Muhammad Khurram Khan, Khaled Alghathbar, "Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks'", 4th International Conference on Information Security and Assurance (ISA'10), Lecture Notes in Computer Science, vol. 6059, pp. 55-60, June 2010, (Acceptance rate 10%. Only 30 papers were selected out of 300 submissions), Japan.
  451. Bilal Khan, Maqsood Mahmud, Muhammad Khurram Khan, Khaled Alghathbar, "Security Analysis of Firewall Rule Sets in Computer Networks", 4th International Conference on Emerging Security Information, Systems and Technologies (Securware'10), Italy
  452. Mohammed S. Khalil, Dzulkifli Muhammad, Muhammad Khurram Khan, Khaled Alghathbar, "Fingerprint Verification Based on Statistical Analysis", 5th International Conference on Future Information Technology (FutureTech'10), 21-23 May 2010, Korea
  453. Muhammad Imran, Muhammad Khurram Khan, Khaled Alghathbar, Rubiyah Yousaf, "Face Recognition using Layered Linear Discriminant Analysis and Small Subspace", 10th IEEE International Conference on Computer & Information Technology (CIT'10), pp. 1407-1412, June/July 2010, Bradford, UK.
  454. M. H Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar, "A Key Agreement Algorithm with Rekeying for Wireless Sensor Networks using Public Key Cryptography", 4th IEEE International Conference on Anti -counterfeiting, Security, and Identification in Communication (ASID'10), China, June 2010.
  455. Muhammad Khurram Khan, "Enhancing the Security of a 'More Efficient & Secure Dynamic ID-based Remote User Authentication Scheme'", IEEE 3rd International Conference on Network and System Security (NSS), pp. 420-424, Oct. 2009, Australia.
  456. Mohammed S. Khalil, Dzulkifli Muhammad, Muhammad Khurram Khan, Qais AL-Nuzaili "Fingerprint Verification using Fingerprint Texture", 9th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT) , UAE, Dec. 14-17, 2009.
  457. Hong Zhao, Hong-Xia Wang, Muhammad Khurram Khan, "Difference Histogram Analysis of Several Reversible Data Hiding Schemes", IEEE PrimeAsia'09, Shanghai, China, 2009.
  458. Fahad Bin Muhaya, Muhammad Usama, Muhammad Khurram Khan, "Modified AES using Chaotic Key Generator for Satellite Imagery", ICIC 2009, Lecture Notes in Computer Science (LNCS), Springer-Verlag, pp. 1014-1024, vol. 5754, 2009.
  459. Maqsood Mahmud, Hanif Ullah, Muhammad Khurram Khan, Khaled Alghathbar "Biometric-Gaussian-Stream (BGS) Cipher with New Aspect of Image Encryption (Data Hiding)", BSBT 2009, CCIS, Springer-Verlag, pp. 97-107, vol. 57, 2009.
  460. A. Alghamdi, Hanif Ullah, Maqsood Mahmud, Muhammad Khurram Khan, "Bio-Chaotic Stream Cipher-Based Iris Image Encryption", TrustCom'09, 7th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC-09), Canada, 2009.
  461. Muhammad Usama Khanzada, Muhammad Khurram Khan, "Satellite Imagery Security Application (SISA)", 12th IEEE International Multitopic Conference INMIC, pp. 232-238, 23-24 December 2008.
  462. Muhammad Khurram Khan, "An Efficient and Secure Remote Mutual Authentication Scheme with Smart Cards", IEEE International Symposium on Biometrics & Security Technologies (ISBAST), 23-24 April, 2008.
  463. Muhammad Usama Khanzada, Muhammad Khurram Khan, "Classical and Chaotic Encryption Techniques for the Security of Satellite Images", IEEE International Symposium on Biometrics & Security Technologies (ISBAST), 23-24 April, 2008.
  464. Muhammad Khurram Khan, "Cryptanalysis and Security Enhancement of Two Password Authentication Schemes with Smart Cards", 11th IEEE International Conference on INMIC'07, December 2007.
  465. Muhammad Khurram Khan, Jiashu Zhang, "An Intelligent Fingerprint-Biometric Image Scrambling Scheme", ICIC 2007, Lecture Notes in Computer Science (LNCS), Springer-Verlag Germany, pp. 1141-1151, vol. 4682, August 2007.
  466. Muhammad Khurram Khan, Ling Xie, Jiashu Zhang, "Robust Hiding of Fingerprint Biometric Data into Audio Signals", ICB 2007, Lecture Notes in Computer Science (LNCS), Springer-Verlag Germany, pp. 702-712, vol. 4642, August, 2007.
  467. Muhammad Khurram Khan, "Further Cryptanalysis of 'A User Friendly Remote User Authentication Scheme with Smart Cards'", IEEE Conference Proceedings on ICIET'07, July 2007.
  468. Muhammad Khurram Khan, Jiashu Zhang, "Implementing Templates Security in Remote Biometric Authentication Systems", IEEE Conf. Proceedings on CIS'06, China, pp. 1397-1400, Nov. 2006.
  469. Muhammad Khurram Khan, Jiashu Zhang, "Investigation on Pseudorandom Properties of Chaotic Stream Ciphers", IEEE Conf. Proceedings on ICEIS'06, pp. 289-293, April 2006.
  470. Muhammad Babar Khan, Muhammad Khurram Khan, Jiashu Zhang, Zhang Dianye, "Enhancing the Security of Intelligent Transportation Systems (ITS) using Iris/Finger-based Multimodal Biometrics", IEEE Conf. Proceedings on ICEIS'06, pp. 79-84, April 2006.
  471. Xiaomin Wang, Jiashu Zhang, Wenfang Zhang, Muhammad Khurram Khan, "Security Improvement on the Timestamp-based Password Authentication Scheme Using Smart Cards", IEEE Conf. Proceedings on ICEIS'06, pp. 140-142, April 2006.
  472. Muhammad Khurram Khan, Jiashu Zhang, "An Efficient and Practical Fingerprint-based Remote User Authentication Scheme with Smart Cards", ISPEC'06, Lecture Notes in Computer Science, Springer-Verlag Germany, pp. 260-268, vol. 3903, April 2006. [ISI SCI-E]
  473. Muhammad Khurram Khan, Jiashu Zhang, "Enhancing the Transmission Security of Content-based `Hidden Biometric Data", ISNN'06, Lecture Notes in Computer Science (LNCS), Springer-Verlag, pp. 214-223, vol. 3973, May 2006. [Invited paper] [ISI SCI-E]
  474. Muhammad Khurram Khan, Jiashu Zhang, "Strong Authentication of Remote Users over Insecure Networks by Using Fingerprint-biometric and Smart Cards", Biometric Technology for Human Identification III, SPIE Defense and Security Symposium, Proc. SPIE Vol. 6202, April 2006, Florida, USA.
  475. Muhammad Khurram Khan, Jiashu Zhang, "Security Analysis of 'An Improved Low Computation Cost User Authentication Scheme for Mobile Communication", IEEE INMIC'05, 2005.
  476. Muhammad Babar Khan, Muhammad Khurram Khan, Jiashu Zhang, Dianye Zhang, "Implementing Biometric Security in Intelligent Transportation Systems", IEEE INMIC'05, 2005.
  477. Muhammad Khurram Khan, Zhang Jiashu, "Securing Biometric Templates for Reliable Identity Authentication", ICIC'05, Lecture Notes in Computer Science (LNCS), part II, no. 3645, pp. 723-732, Springer-Verlag Germany, August 2005. [Invited paper] [ISI SCI-E].
  478. Muhammad Khurram Khan, Zhang Jiashu, Lei Tian, "Protecting Biometric Data for Personal Identification", Sinobiometrics'04, Lecture Notes in Computer Science (LNCS), Springer-Verlag Germany, pp. 629-638, vol. 3383, Dec. 2004. [ISI SCI-E].
  479. Muhammad Khurram Khan, Zhang Jiashu, "Biometrics: An Emerging Technology for Security", Second International Workshop on Frontiers of Information Technology, Dec. 2004.
  480. Muhammad Khurram Khan, Zhang Jiashu, Shi-Jinn Horng, "An Effective Iris Recognition System for Identification of Humans", IEEE INMIC'04, pp.114-117, Dec. 2004.
  481. Muhammad Khurram Khan, "Multimodal Biometrics: A More Secure Way against Intruders", First International Workshop on Frontiers of Information Technology, Dec. 2003.

Services

Prof. Khurram is very active in professional services and scholarly activities. He is on the editorial board of several prestigious journals indexed by Thomson Reuters. He is one of the organising chairs of dozens of international conferences. In addition, he has very active participation on the technical program committees of dozens of international conferences. Furthermore, he is an active reviewer of tens of international journals.
img01

Professional Services

Scientific & Scholarly Activities

Professional Services
img01

Administrative Services

Institutional Leadership

Administrative Services
img01

Prospective Students & Collaboration

My Research Network

Prospective Students

Professional Services

Prof. Khurram believes in professionalism and he is eager to lead and participate in professional services and scholarly activities for the advancement of scientific and technological research.
img01

Editorial Board

My Editorial Role

Professional Services
img01

Guest Editor

My Special Issues

Professional Services
img01

Conference Chairs

My Role as Conference Organizer

Professional Services
img01

Program Committee Member

My Role in Conference Programs

Professional Services
img01

Journals Reviewer

My Role as a Reviewer

Professional Services

Editorial Board


  • Editor-in-Chief, Telecommunication Systems, Springer-Nature [SCI-E, Impact Factor 2.5]
  • Editor-in-Chief, Cyber Insights Magazine
  • Area Editor (Network Security), IEEE Communications Surveys & Tutorials [SCI-E, Impact Factor 23.7]
  • Associate Editor, IEEE Transactions on Information Forensics and Security [SCI-E Indexed, Impact Factor 7.231]
  • Associate Editor, IEEE Transactions on Intelligent Vehicles [SCI-E Indexed, Impact Factor 5.009]
  • Associate Editor, IEEE Internet of Things Journal (IEEE IoT-J) [SCI-E, Impact Factor 9.936]
  • Associate Editor, IEEE Communications Letters[SCI-E Indexed, Impact Factor 4.1]
  • Associate Editor, IEEE Communications Magazine [SCI-E, Impact Factor 11.052]
  • Editor, Journal of Network and Computer Applications (JNCA), Elsevier Science (Since July 2010) [SCI-E, Impact Factor 5.570]
  • Associate Editor, IEEE Transactions on Consumer Electronics [SCI-E, Impact Factor 2.739]
  • Associate Editor, IEEE Access Journal (Since May 2013) [SCI-E, Impact Factor 3.557]
  • Associate Editor, IEEE Consumer Electronics Magazine [SCI-E, Impact Factor 3.273]
  • Associate Editor, Financial Innovation, Springer-Nature (Since Jan. 2021) [SSCI, Impact Factor 2.964]
  • Editorial Advisory Board, Journal of Cyber Security Technology, Taylor & Francis (Since April 2018)
  • Associate Editor, Big Data Mining and Analytics (BDMA) (Since May 2019)
  • Associate Editor, Journal of Medical Systems, Springer-Verlag (Since March 2014) [SCI-E Impact Factor 2.456]
  • Editor, Scientific World Journal (Sept. 2013-Aug. 2016) [SCI-E Impact Factor 1.219]
  • Editor, PLOS ONE Journal, USA (Since April 2013) [SCI-E Impact Factor 2.766]
  • Associate Editor, Electronic Commerce Research Journal, Springer-Verlag (Since Jan. 2012) [SSCI, Impact Factor 1.489]
  • Associate Editor, Security and Communication Networks, (Since May 2010) [SCI-E, Impact Factor 1.067]
  • Associate Editor, IET Wireless Sensor Systems, UK (Since March 2015)
  • Senior Editor, Human-Centric Computing and Information Sciences, Springer (Since Jan. 2018) [SCI-E Impact Factor 1.967]
  • Senior Editor, Journal of Information Processing Systems, Korea Information Processing Society (Since Aug. 2016) [ISI ESCI]
  • Editor, Journal of Information Security and Cybercrimes Research, Naif Arab University of Security Sciences, Saudi Arabia (Since 2017)
  • Associate Editor, Telecommunication Systems, Springer-Verlag (From 27 Jan. 2011 till April 2014) [ISI SCI-E]
  • Associate Editor, Computers and Electrical Engineering, Elsevier Science (Jan. 2011-July 2014) [ISI SCI-E]
  • Guest Handling Editor, Journal of Computing and Informatics, (Since Sept. 2012) [SCI-E, Impact Factor 0.524]
  • Editorial Board, International Journal of Biometrics (IJBM), Inderscience Publishers (Since June 2010)
  • Editorial Board, Journal of Chaos, Hindawi Publishing Corporation (Jan. 2013-Aug. 2016)
  • Associate Editor, Journal of Information Hiding and Multimedia Signal Processing (JIHMSP)
  • Editor, International Journal of Chaotic Computing, Infonomics Society UK (Since 28 Jan. 2011)
  • Consulting Editor, Journal of Physical & Information Sciences (JPIS) (Since October 2010)
  • Editorial Advisory Board, Journal of Independent Studies and Research-Computing (JISR)

Guest Editor


  • Guest Editor of Special Issue on "Advances in Security and Blockchain Technologies", Electronics, 2023 [SCI-E]
  • Guest Editor of Special Issue on “Multimodality, Multidimensional Representation and Multimedia Quality Assessment (MQA) towards Information Quality in Social Web of Things (S-WoT)”, ACM Journal of Data and Information Quality, 2023 [SCI-E]
  • Guest Editor of Special Issue on "XAI Based Biomedical Big Data Privacy and Security", IEEE Journal of Biomedical and Health Informatics, 2023 [SCI-E]
  • Guest Editor of Special Issue on “AI Driven Security for 5G/6G-enabled Next Generation Decision Support Systems”, International Journal of Information Security, Springer-Nature, 2023 [SCI-E]
  • Guest Editor of Special Issue on “AI-Driven Cybersecurity Solutions for Next Generation-CPS”, Human-centric Computing and Information Sciences, 2023 [SCI-E]
  • Guest Editor of Special Issue on “AI-Driven Cybersecurity Solutions for Next Generation-5G/6G Enabled Cyber Physical Systems”, Electronics, 2023 [SCI-E]
  • Guest Editor of Special Issue on “Sustainable Computing based Smart Agriculture”, Sustainable Computing: Informatics and Systems, Elsevier, 2023 [SCI-E]
  • Guest Editor of Special Issue on “Content-aware Big Social Data Communications, Analytics and Fusion for Future Web of Things”, IET Communications, 2022 [SCI-E]
  • Guest Editor of Special Issue on “AI-driven Algorithms and Applications in the Dynamic and Evolving Environments”, International Journal of Interactive Multimedia and Artificial Intelligence, 2022 [SCI-E]
  • Guest Editor of Special Issue on “Cybersecurity Intelligence in the Healthcare System”, IEEE Transactions on Industrial Informatics, 2021 [SCI-E]
  • Guest Editor of Special Issue on “Open and Interpretable AI in Computational Pathology”, IEEE Journal of Biomedical and Health Informatics, 2021 [SCI-E]
  • Guest Editor of Special Issue on "Big Data-Driven Futuristic Fabric System in Societal Digital Transformation", Big Data, 2021 [SCI-E]
  • Guest Editor of Special Issue on Privacy-Preserving Federated Machine Learning Solutions for Enhanced Security of Critical Energy Infrastructures, IEEE Transactions on Industrial Informatics, 2021 [SCI-E]
  • Guest Editor of Special Issue on Intelligent Big Data Analytics for Internet of Things, Services and People, IEEE Access, 2020-2021 [SCI-E]
  • Guest Editor of Special Issue on Blockchain for Industrial Data Security, Journal of Parallel and Distributed Computing, Elsevier, 2020-2021 [SCI-E]
  • Guest Editor of Special Issue on Big Data-Driven Multimedia Analytics for Cyber Security, Electronics, 2020 [SCI-E]
  • Guest Editor of Special Issue on Mobile Edge Computing and Mobile Cloud Computing: Addressing Heterogeneity and Energy Issues of Computer and Network Resources, IEEE Access, 2019 [SCI-E]
  • Guest Editor of Special Issue on Parallel Computations and Applications, International Journal of Computational Science and Engineering, vol. 20, no. 2, 2019
  • Guest Editor of Special Issue on Artificial Intelligence-based Information Security, Computers & Electrical Engineering, Elsevier, 2019 [SCI-E]
  • Guest Editor of Special Issue on "Recent Advances in Information Security", Computer Science and Information Systems, 2018 [SCI-E]
  • Guest Editor of Special Issue on Recent Advances in Industrial Internet of Things, Journal of Advances in Mechanical Engineering, Sage Publications, 2018 [SCI-E]
  • Guest Editor of Special Issue on Cyber Security Threats and Defense Advances, IEEE Transactions on Emerging Topics in Computing, 2017-2018 [SCI-E]
  • Guest Editor of Special Issue on "Recent Advances in Trust and Security in Wireless Sensor Networks", International Journal of Distributed Sensor Networks, May 2017 [SCI-E]
  • Guest Editor of Special Issue on "Sustainable Incentive Mechanisms for Mobile Crowdsensing", IEEE Communications Magazine, March 2016 [SCI-E]
  • Guest Editor of "Science, Technology and Innovation Reforms for Sustainable Development of the GCC Countries", Sustainability, MDPI, March 2016 [SCI-E]
  • Guest Editor of Special Issue on "Special Issue on Cloudified 5G Networks, Industrial Systems and Applications", ACM/Springer Mobile Networks & Applications (MONET), Springer, 2016 [SCI-E]
  • Guest Editor for Special Issue on "Advanced Communication Models and Services for Smart World", Modeling and Simulation in Engineering, 2015
  • Guest Editor of Yearly Special Issue on 'Trust, Security & Privacy in Distributed Wireless Sensor Networks', International Journal of Distributed Wireless Sensor Networks, Hindawi, 2014 [SCIE]
  • Guest Editor of Special Issue on Recent Advances in Information Security', The Scientific World Journal, Hindawi, 2014 [SCIE]
  • Guest Editor of Special Issue on 'Security Aspects in Pervasive & Ubiquitous Computing', International Journal of Adhoc & Ubiquitous Computing, Inderscience, 2014 [SCIE]
  • Guest Editor of Special Issue on 'Trust, Security & Privacy in Distributed Wireless Sensor Networks', International Journal of Distributed Wireless Sensor Networks, Hindawi, 2013 [SCIE]
  • Guest Editor of Special Issue on 'Research, Innovation and Entrepreneurship Reforms in Gulf Cooperation Council Countries', Innovation Management Policy & Practice (IMPP), Australia, 2014 [SSCI]
  • Guest Editor of Special issue on 'Chaotic Cryptography and its Applications in Telecommunication Systems', Telecommunication Systems (Springer-Verlag Germany), vol. 52, no. 2, 2013 [SCI-E]
  • Guest Editor of Special issue on 'High Performance Biometrics Recognition Algorithms and Systems, Future Generation Computer Systems, Elsevier Science, Vol. 28, Issue 1, Jan. 2012 [SCI-E]
  • Guest Editor of Special issue on 'Data Hiding for Multimedia Security' in the Journal of Multimedia Tools and Applications (Springer-Verlag Germany), Vol. 52, Issue 2-3, April 2011 [SCI-E]
  • Guest Editor of Special issue on 'Biometrics Systems and Applications' in the Journal of Telecommunication Systems (Springer-Verlag Germany), Vol 47, Issue 3-4, Aug. 2011 [ISI SCI-E]
  • Guest Editor of Special issue on 'Recent Advances in Biometrics Identification' in the Journal of Network and Computer Applications (Elsevier Science), Vol. 33, number 3, May 2010 [ISI SCI-E]
  • Guest Editor of Special issue on 'Information Assurance and Security Engineering' in the IETE Technical Review, Vol 27, Issue 23, 2010 [ISI SCI-E]
  • Founding Editor of 'Bahria University Journal of Information & Communication Technology' (BUJICT) (From 2008 un till 2010)

Conference Chairs


  • Program Chair for the 6th International Conference on Communication Engineering and Technology (ICCET 2023), February 24-26, 2023, Xi'an, China [Link]
  • General Co-Chair for the 4th International Conference on Big Data and Security (ICBDS’22), December 8-12, 2022, Xiamen, China [Link]
  • Executive Committee Chair for the 4th Digital Health Confex, 26 October 2022, Riyadh, Saudi Arabia
  • Program Co-Chair for the 9th IEEE International Conference on Data Science and Advanced Analytics, October 13-16 2022, Shenzhen, China [Link]
  • Program Co-Chair for the 5th International Conference on Communication Engineering and Technology (ICCET), February 25-27, 2022, Shanghai, China [Link]
  • Track Chair for the 39th IEEE International Conference on Consumer Electronics (ICCE 2021), 10-12 January 2021, Las Vegas, USA [Link]
  • General Co-Chair, International Conference on Big Data and Security (ICBDS 2020), Singapore, 20-22 December 2020 [Link]
  • Program Vice Chair for the 2020 World Congress on Information Technology Applications and Services (World IT Congress), 24-26 February, 2020, Jeju, South Korea [Link]
  • Program Chair for the 14th International Conference on Ubiquitous Information Technologies and Applications (CUTE 2019), 18-20 Dec 2019, Macau [Link]
  • General Co-Chair for the International Conference on Big Data and Security (ICBDS’19), 20-22 December 2019, Nanjing, China [Link]
  • Honorary Chair, 12th International Symposium on Information Processing (ISIP'19), 26-27 October 2019, Shanghai, China [Link]
  • Program Vice Chair for the 13th KIPS International Conference on Ubiquitous Information Technologies and Applications (CUTE 2018), 17-19 Dec., 2018, Okinawa, Japan
  • Publicity Co-Chair for the 12th International Conference on Future Generation Communication and Networking (FGCN’18), 20-22 December, 2018, South Korea [Link]
  • International Advisory Board Member for the 6th IEEE International Conference on Computer, Control, Informatics and its Applications (IC3INA’18), 1-2 November 2018, Tangerang, Indonesia [Link]
  • Publicity Co-Chair for the IEEE Middle East & North Africa Communications Conference (MENACOMM’18), April 18-20, 2018, Jounieh, Lebanon [Link]
  • Program Chair for the World Congress on Information Technology Applications and Services (World IT Congress 2018), Feb. 20-22, 2018, Jeju, Korea
  • Publicity Chair for the International Conference on Ubiquitous Business and Wireless Communication & Networks 2018 (UBWCN 2018), 20-21 Jan 2018, Bali, Indonesia
  • International Advisor for the Global Conference on Information Technology, Computing, and Applications (Global IT 2018), Jan. 15-17, 2018, Manila, Philippines
  • Program Co-Chair for the 18th IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT’17), Taipei, Taiwan, 18-20 Dec. 2017 [Link]
  • Program Chair for the Third IEEE International Workshop on Trust and Security in Wireless Sensor Networks, 1-4 August 2017, Sydney, Australia [Link]
  • International Advisor for the IEEE International Conference on Consumer Electronics-Taiwan, 12-14 June 2017, Taipei, Taiwan [Link]
  • Founder and Organizer of the Cybersecurity Capacity and Capability Building Workshop, 15 March 2017, Riyadh, Saudi Arabia
  • Session Chair (Sensors & MEMS) at the 35th IEEE International Conference on Consumer Electronics (ICCE'17), Las Vegas, USA, 8-10 Jan. 2017 [Link]
  • Publication Chair for the 10th International Conference on Provable Security (ProvSec'16), Nanjing, China, 10-12 November 2016 [Link]
  • The General Co-Chair for the 11th International Conference on Green, Pervasive and Cloud Computing (GPC-2016) May 6-8, 2016, Xi'an, China [Link]
  • The General Co-Chair for the 11th International Conference on Future Information Technology (FutureTech2016), April 20-22, 2016, Beijing, China [Link]
  • Program Co-Chair, IEEE International Workshop on Trust and Security in Wireless Sensor Networks in conjunction with IEEE TrustCom-15, August 20-22, 2015, Helsinki, Finland [Link]
  • General Co-Chair for the IEEE International Symposium on Biometrics & Security Technologies (ISBAST'14), Kuala Lumpur, Malaysia, August 2014
  • Publicity Chair for the 8th International Conference on Network and System Security (NSS 2014), Xi'an, China, October 15-17, 2014 [Link]
  • Workshops Co-Chair for the 12th IEEE International Conference on Pervasive Intelligence and Computing (PICom'14), August 24-27, 2014, Dalian, China [Link]
  • Program Chair for the 9th International Conference on Future Information Technology, Zhangjiajie, China, May 29-31, 2014 [Link]
  • Program Co-Chair for the 6th FTRA International Symposium on Advances in Computing, Communications, Security, and Applications (ACSA'14), South Korea, April 2014
  • Publicity Co-Chair for the International Workshop on Advanced Multimedia Computing (AMC'14), April 23-25, 2014, Incheon, Korea [Link]
  • Invited Sessions Chair for the 9th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP'13), Beijing, China, Oct 16-18, 2013 [Link]
  • Program Co-Chair for the 3rd International Conference on Frontier Computing - Theory, Technologies and Applications (FC 2013), Gwangju, South Korea, Sept. 4-6, 2013 [Link]
  • Publication Chair for the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'13), Melbourne, Australia, 16-18 July, 2013 [Link]
  • Workshop Co-Chair for the 11th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA'13), Australia, 16-18 July, 2013 [Link]
  • Steering Committee Chair for the IEEE International Symposium on Biometrics & Security Technologies (ISBAST'13), Chengdu, China, 2-5 July 2013 [Link]
  • Program Chair for the 7th International Conference on Information Security and Assurance, Cebu, Philippines, April 26-28, 2013 [Link]
  • Publicity Co-Chair for the 7th International Conference on Frontier of Computer Science and Technology (FCST-12), Suzhou, China, 21-23 November 2012 [Link]
  • Publicity Co-Chair for the 12th International Conference on Algorithms and Architectures for Paralell Processing, (ICA3PP'12), Fukuoka, Japan, 4-7 September 2012 [Link]
  • Workshop Co-Chair for the 9th International Conference on Secure and Trust Computing, Data Management, and Applications (STA 2012), 23-25 August 2012, Yantai, China [Link]
  • Program Vice Chair for the 7th International Conference on Future Information Technology (FutureTech 2012), Vancouver, Canada, 26-28 June 2012 [Link]
  • Program Chair for the 6th International Conference on Information Security & Assurance (ISA'12), Shanghai, China, 28-30 April 2012 [Link]
  • Steering Committee Chair for the IEEE International Symposium on Biometrics & Security Technologies (IEEE ISBAST'12), Taipei, Taiwan, 26-29 March 2012 [Link]
  • Program Co-Chair for the 4th International Conference on Security Technology (SecTech'11), Jeju Island, South Korea, 8-10 Dec. 2011 [Link]
  • Publicity Co-Chair for the 5th International Conference on Future Generation Communication and Networking (FGCN'11), Dec. 2011 [Link]
  • Publicity Co-Chair for the 4th International Conference on Bio-Science and Bio-Technology (BSBT'11), Jeju Island, Dec. 2011 [Link]
  • Publicity Co-Chair for the 4th International Conference on Signal Processing, Image Processing and Pattern Recognition (SIP'11), South Korea, Dec. 2011 [Link]
  • Program Co-Chair for the 4th International Conference on Advanced Software Engineering & Its Applications (ASEA'11), Korea, Dec. 2011 [Link]
  • International Advisory Board for the 3rd International Conference on Advanced Science and Technology (AST'11), 27-29 September 2011 [Link]
  • General Co-Chair for the International Symposium on Embedded and Pervasive Systems (EPS 2011), Melbourne, Australia, Oct 24-26 [Link]
  • Program Co-Chair for the Second International Symposium on Mobile and Wireless Network Security (MWNS'11), Changsha, China, Nov. 2011 [Link]
  • Workshop Co-Chair for the 11th International Conference on Algorithms and Architectures for Paralell Processing, (ICA3PP'11), Melbourne, Australia, Oct. 2011 [Link]
  • Workshop Management Chair for the 9th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC'11), Melbourne, Australia, Oct. 2011 [Link]
  • Program Co-Chair for the 3rd International Conference on Advanced Communication and Networking (ACN'11), August 2011, Czech Republic [Link]
  • Workshop Management Co-Chair for the 5th International Conference on Information Security and Assurance (ISA'11), 15-17 August 2011, Czech Republic [Link]
  • International Liaison Co-Chair for the 8th International Conference on Secure and Trust Computing, Data Management, and Applications (STA 2011), June 2011, Greece [Link]
  • Publicity Co-Chair for the 5th International Conference on Multimedia and Ubiquitous Engineering (MUE 2011), June 2011, Crete, Greece [Link]
  • Publication Chair for the International Conference on Robot, Vision and Signal Processing (RVSP), November 21-23, 2011, Taiwan [Link]
  • Workshop Co-Chair for International Conference on Ubiquitous Computing and Multimedia Applications (UCMA 2011) , 13-15 April, 2011, Daejeon, Korea [Link]
  • Program Co-Chair for the 3rd International Conference on Security Technology (SecTech'10), Jeju Island, South Korea, 13-15 Dec. 2010 [Link]
  • Publicity Co-Chair for the 3rd International Conference on Signal Processing, Image Processing and Pattern Recognition (SIP'10), Soth Korea, 13-15 Dec. 2010 [Link]
  • Publicity Co-Chair for the 4th International Conference on Future Generation Communication and Networking (FGCN'10), Dec. 2010 [Link]
  • Program Co-Chair for the 3rd International Conference on Advanced Software Engineering & Its Applications (ASEA'10), Korea, 13-15 Dec. 2010 [Link]
  • Publicity Co-Chair for the 3rd International Conference on Bio-Science and Bio-Technology (BSBT'10), Jeju Island, 13-15 Dec. 2010 [Link]
  • Publicity Co-Chair for the 4th International Conference on Network and System Security (NSS'10), Melbourne, Australia, 1-3 September 2010 [Link]
  • Publicity Co-Chair for the 4th International Conference on Multimedia & Ubiquitous Engineering (MUE'10), Cebu, Philippines, 11-13 August 2010 [Link]
  • Publicity Co-Chair for the 6th International Conference on Intelligent Computing (ICIC'10), Changsha, China, 18-21 August 2010 [Link]
  • Program Co-Chair for the 2nd International Conference on Advanced Communication and Networking (ACN'10), June 2010 [Link]
  • Workshop/Session Management Co-Chair for the 4th International Conference on Information Security and Assurance (ISA 2010), Japan, 2010 [Link]
  • International Advisory Board for the 2nd International Conference on Advanced Science and Technology (AST'10), June 2010 [Link]
  • Publicity Co-Chair for the International Conference on Ubiquitous Computing and Multimedia Applications (UCMA'10), 2010 [Link]
  • General Co-Chair for the International Workshop on 'Frontiers of Information Assurance & Security' (FIAS'09) in conjunction with 3rd IEEE International Conference on Network and System Security (NSS'09), Australia, 19-21 October, 2009 [Link]
  • Publicity Co-Chair for the International Conference on Security Technology (SecTech'09), South Korea, 10-12 Dec. 2009 [Link]
  • Publicity Co-Chair for the 5th IEEE International Conference on Intelligent Computing (ICIC'09), South Korea, 16-19 Sept. 2009 [Link]
  • Program Chair and Publication Chair for the 12th IEEE International Multi topic Conference (IEEE INMIC'08), 23-24 December, 2008
  • Program and Organizing Chair for the IEEE International Symposium on Biometrics & Security Technologies (IEEE ISBAST'08), Bahria University, Pakistan
  • Session Chair at 10th National Conference on Management, Computer, Social Sciences, and Economics, SZABIST, Karachi, 15 December, 2007 [Link]
  • Session Chair at IEEE International Conference on Intelligent Computing 2007 (ICIC'07) Qingdao, China, 21-24 August, 2007 [Link]
  • Session Chair at IEEE International Conference on Intelligent Computing 2006 (ICIC'06) Kunming, China, 16-19 August, 2006 [Link]

Program Committee Member


  • Program Committee Member for the 25th International Conference on Information and Communications Security (ICICS), 18-20 November, 2023, Tianjin, China [Link]
  • Program Committee Member for the 21st International Conference on Embedded and Ubiquitous Computing (EUC), 1-3 November 2023, Exeter, UK [Link]
  • Program Committee Member for the International Symposium on Electrical and Electronics Engineering (ISEE 2023), October 19-20, 2023, Ho Chi Minh City, Vietnam [Link]
  • Program Committee Member for the 15th Asian Conference on Intelligent Information and Database Systems (ACIIDS), 24-26 July 2023, Phuket, Thailand [Link]
  • Program Committee Member for the IEEE International Conference on Advanced Innovations in Smart Cities, 23-25 Jan. 2023, Jeddah, Saudi Arabia [Link]
  • Program Committee Member for the IEEE Wireless Communications and Networking Conference (WCNC'22), 26-29 March 2022, Glasgow, Scotland, UK [Link]
  • Program Committee Member for the IEEE International Conference on Metaverse, 15-18 Dec. 2022, Haikou, China [Link]
  • Program Committee Member for the 4th IEEE Middle East & North Africa Communications Conference (MENACOMM’22), 6-8 Dec. 2022, Jordan [Link]
  • Program Committee Member for the 14th Asian Conference on Intelligent Information and Database Systems, November 28-30, 2022, Ho Chi Minh City, Vietnam [Link]
  • Program Committee Member for the 10th IEEE Conference on Communications and Network Security 26-28 September 2022, Austin, USA [Link]
  • Program Committee Member for the IEEE International Mediterranean Conference on Communications and Networking, 5-8 September 2022, Athens, Greece [Link]
  • Program Committee Member for the IEEE 9th International Conference on Communications and Electronics, July 27-29, 2022, Vietnam [Link]
  • Program Committee Member for the 20th International Conference on Computer and Information Technology (CIT-2021), 20-22 December 2021, London, UK [Link]
  • Program Committee Member for the 11th International Conference on Smart Computing, Networking and Services (SmartCNS-2021), 20-22 December 2021, London, UK [Link]
  • Program Committee Member for the 9th International Conference on Smart City and Informatization (iSCI 2021), 18-20 August 2021, Shenyang, China [Link]
  • Program Committee Member for the 19th IEEE International Conference on Embedded and Ubiquitous Computing (EUC 2021), 18-20 August 2021, Shenyang, China [Link]
  • Program Committee Member for the 8th International Conference on Mining Intelligence & Knowledge Exploration (MIKE'2020), 9-11 November 2020, Thessaloniki, Greece [Link]
  • Program Committee Member for the 16th International Conference on Innovations in Intelligent Systems and Applications (INISTA), 24-26 August 2020, Serbia [Link]
  • Program Committee Member for the 12th Asian Conference on Intelligent Information and Database Systems (ACIIDS'19), 23-26 March 2020, Phuket, Thailand [Link]
  • Program Committee Member for the 19th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP’19), 9-11 Dec., 2019, Melbourne, Australia [Link]
  • The Second International Conference on Frontiers in Cyber Security, 15-17 Nov. 2019, Xi'an, China [Link]
  • Program Committee Member for the 2nd IEEE Middle East & North Africa Communications Conference (MENACOMM), 19-21 November 2019, Manama, Bahrain [Link]
  • Program Committee Member for the International Symposium on Electrical and Electronics Engineering (ISEE'19), Ho Chi Minh City, Vietnam, 10-12 October, 2019 [Link]
  • Program Committee Member for the 5th International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2019), 14-17 July 2019, Copenhagen, Denmark [Link]
  • Program Committee Member of the 9th IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA 2019), 3-5 July, 2019, Sofia, Bulgaria [Link]
  • Program Committee Member at CCNCPS 2018 in Conjunction with the 20th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM’19), 9-12 June, Washington DC, USA [Link]
  • Program Committee Member for the 15th International Conference on Artificial Intelligence Applications and Innovations (AIAI'19), 24-26 May 2019, Crete, Greece [Link]
  • Program Committee Member for the 17th IEEE Wireless Communications and Networking Conference, 15-19 April 2019, Marrakech, Morocco [Link]
  • Program Committee Member for the 14th International Conference on Information Assurance and Security, 13-15 Dec. 2018, Porto, Portugal
  • Program Committee Member for the 17th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2018), Melbourne, Australia [Link]
  • Program Committee Member for the 18th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP’18), 15-17 November 2018, Guangzhou, China [Link]
  • Program Committee Member for the 12th IEEE International Conference on Anti-Counterfeiting, Security, and Identification (ASID'18), 9-11 November, 2018, Xiamen, China [Link]
  • Program Committee Member for the First International Conference on Frontiers in Cyber Security (FCS 2018), 5-7 November, 2018, Chengdu, China [Link]
  • Program Committee Member for the 19th International Conference on Engineering Applications of Neural Networks (EANN 2018), 3-5 September 2018, Bristol, UK [Link]
  • Program Committee Member for the 18th IEEE International Conference on Computer and Information Technology (CIT'18), 30 July-03 August, 2018, Halifax, Canada [Link]
  • Program Committee Member for the EAI International Conference on on Smart Grid and Internet of Things, July 11-13, 2018, Canada [Link]
  • Program Committee Member for the 8th IEEE International Conference on Innovations in Intelligent Systems and Applications (INISTA’18), 3-5 July, 2018, Thessaloniki, Greece [Link]
  • Program Committee Member for the 20th IEEE International Conference on High Performance Computing and Communications (HPCC'18), 28-30 June 2018, Exeter, UK [Link]
  • Program Committee Member for the International Conference on Information Society and Smart Cities (ISC 2018), Oxford, United Kingdom [Link]
  • Program Committee Member for the 14th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI 2018), 25-27 May 2018, Rhodes, Greece [Link]
  • Program Committee Member of the International Workshop on Communication, Computing, and Networking in Cyber Physical Systems, IEEE International Conference on Communications (ICC’18), 20-24 May 2018, Kansas, USA [Link]
  • Program Committee Member for the 1st Workshop on Digital Forensics and Software (DFS’8) in conjunction with 5th Symposium on Data Mining Applications (SDMA’18), March 21-22, 2018, Prince Sultan University, Riyadh Saudi Arabia [Link]
  • Program Committee Member for the Global Conference on Information Technology, Computing, and Applications (Global IT 2018), January 15-17, 2018, Manila, Philippines [Link]
  • Program Committee Member for the 11th IEEE International Conference on Open Source Systems (ICOSST’17), 18-20 Dec. 2017, Lahore, Pakistan [Link]
  • Program Committee Member for the 3rd International Symposium on Security and Privacy in Social Networks and Big Data, 13-15 December 2017, Melbourne, Australia [Link]
  • Program Committee Member for the 16th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2017), December 12-15, 2017, Guangzhou, China [Link]
  • Program Committee Member for the 4th EAI International Conference on Safety and Security in Internet of Things, Nov. 6-7, 2017, Valencia, Spain [Link]
  • Program Committee Member for the 18th International Conference on Engineering Applications of Neural Networks (EANN'2017), August 25-27, 2017, Athens, Greece [Link]
  • Program Committee Member for the 13th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI 2017), 19-20 August 2017, Melbourne, Australia [Link]
  • Program Committee Member for the Third IEEE International Workshop on Trust and Security in Wireless Sensor Networks, 1-4 August 2017, Sydney, Australia [Link]
  • Program Committee Member for the EAI International Conference on Smart Grid Assisted Internet of Things, July 11-13, 2017, Ontario, Canada [Link]
  • Program Committee Member for the IEEE International Conference on Innovations in Intelligent Systems and Applications (INISTA'17), 3-5 July 2017, Gdynia, Poland [Link]
  • Program Committee Member for the 11th International Conference on Frontier of Computer Science and Technology (FCST'17), 21-23 June 2017, Exeter, UK [Link]
  • Program Committee Member for the 16th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), 14-16 Dec. 2016, Granada, Spain [Link]
  • Program Committee Member for the 15th International Conference on Ubiquitous Computing and Communications (IUCC'16), 14-16 Dec. 2016, Granada, Spain [Link]
  • Program Committee Member for the 16th IEEE International Conference on Computer and Information Technology (CIT'16), Fiji, 8-10 December 2016 [Link]
  • Program Committee Member for 6th International Symposium on Cloud and Services Computing, Fiji, 8-10 December 2016 [Link]
  • Program Committee Member for 3rd International Conference on Internet of Vehicles (IoV'16), Fiji, 8-10 December 2016 [Link]
  • Program Committee Member for 2nd International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2016), Fiji, 8-10 December 2016 [Link]
  • Program Committee Member for 10th IEEE International Conference on Open Source Systems & Technologies, 15-17 Nov. 2016, Pakistan [Link]
  • Program Committee Member for the IEEE International Workshop on Cloud-based Networks and Applications (CloudNA), 41st IEEE Conference on Local Computer Networks, 7-10 November 2016, Dubai, UAE [Link]
  • Program Committee Member for 10th International Conference on Anti-counterfeiting, Security, and Identification (ASID'16), 23-25 Sept. 2016, Xiamen, China [Link]
  • Program Committee Member for the 12th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI 2016), Thessaloniki, Greece, 16-18 Sept. 2016 [Link]
  • Program Committee Member for the 4th IEEE International Conference on Cloud Computing and Intelligent Systems, August 17-19, 2016, Beijing [Link]
  • Program Committee Member for the International Workshop on Cyber Security and Digital Investigation (CSDI 2016), The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016), August 15-18, 2016, Montreal, Canada [Link]
  • Program Committee Member for the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'16), 23-26 August, Tianjin, China [Link]
  • Program Committee Member for the 13th International Conferenceon Image Analysis and Recognition (ICIAR 2016), July 13-15, 2016, Povoa de Varzim, Portugal [Link]
  • Program Committee Member for the 13th IEEE International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR'16), 10-13 July 2016, Jeju Island, South Korea [Link]
  • Program Committee Member for the IEEE International Instrumentation and Measurement Technology Conference, May 23-26, 2016, Taipei, Taiwan [Link]
  • Program Committee Member for the 8th Asian Conference on Intelligent Information and Database Systems (ACIIDS'16), 14-16 April 2016, Da Nang, Vietnam [Link]
  • Program Committee Member for the International Conference on Internet of things and Cloud Computing (ICC'16), March 22-23 2016, Cambridge, United Kingdom [Link]
  • Program Committee Member for the 3rd International Conference on Computing, Management and Telecommunications (ComManTel'15), DaNang, Vietnan, Dec. 28-30, 2015 [Link]
  • Program Committee Member for the International Conference on Internet of Vehicles (IOV'15), Chengdu, China, Dec. 19-21, 2015 [Link]
  • Program Committee Member for the International Symposium on Cloud and Service Computing (SC2'15), Chengdu, China, Dec. 19-21, 2015 [Link]
  • Publicity Co-Chair for the 9th International Conference on Future Generation Communication and Networking (FGCN'15), Nov. 25-28, 2015, JeJu, Korea [Link]
  • Program Committee Member for the 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP'15), November 18-20, Zhangjiajie, China, 2015 [Link]
  • Program Committee Member for the 9th International Conference on Network and System Security (NSS'15), November 3-5, 2015, New York, USA [Link]
  • Program Committee Member for the 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC'15), 26-18 October 2015, Liverpool, UK [Link]
  • Program Committee Member for the 4th International Conference on Connected Vehicles & Expo (ICCVE'15), October 19-23, 2015, Shenzhen, China [Link]
  • Program Committee Member for the International Conference on E-mobility and Emerging Vehicular Technology, October 13, 2015 Slovakia [Link]
  • Program Committee Member for the 7th International Conference on Evolving Internet, October 11-15, 2015, St. Julians, Malta [Link]
  • Program Committee Member for the International Conference on Advanced Technologies for Communications (ATC'15), Ho Chi Minh, Vietnam, Oct. 14-16, 2015 [Link]
  • Program Committee Member for the 11th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP'15), September 23-25, 2015, Adelaide, Australia [Link]
  • Program Committee Member for the 11th International Conference on Artificial Intelligence Applications and Innovations, Bayonne/Biarritz, France, September 14-17, 2015 [Link]
  • Program Committee Member for the 2nd NAFOSTED Conference on Information and Computer Science (NICS), Sept. 16-18, 2015, Ho Chi Minh City, Vietnam [Link]
  • Program Committee Member for the 9th International Conference on Frontier of Computer Science and Technology (FCST'15), August 26-28, 2015, Dalian, China [Link]
  • Program Committee Member for the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'15), Helsinki, Finland, 20-22 August, 2015 [Link]
  • Program Committee Member for 12th International Conferenceon Image Analysis and Recognition (ICIAR'15), July 22-24, 2015, Niagara Falls, Canada [Link]
  • Program Committee Member for the International Workshop on Secure Peer-to-Peer Intelligent Networks & Systems (SPINS 2015) in conjunction with ANT 2015, June 2015, London, UK, staff.iium.edu.my/sakib/spins15/
  • Program Committee Member for the 2nd IEEE International Conference on Cybernetics, Gdynia Poland, 24-26 June 2015 [Link]
  • Program Committee Member for the 4th International Conference on Informatics, Electronics & Vision (ICIEV'15), 15-18 June, 2015, Fukuoka, Japan [Link]
  • Program Committee Member for the International Instrumentation and Measurement Technology Conference (I2MTC), May 11-14 2015, Pisa, Italy [Link]
  • Program Committee Member for the 7th Asian Conference on Intelligent Information and Database Systems, 23-25 March 2015, Bali, Indonesia [Link]
  • Program Committee Member for the 10th International Conference on Information Assurance and Security (IAS 2014), 27-30 November, Okinawa, Japan [Link]
  • Program Committee Member for 8th International Conference on Anti-counterfeiting, Security, and Identification (ASID'14), Nov. 2014, Macau [Link]
  • Program Committee Member for the 3rd International Conference on Connected Vehicles & Expo (ICCVE 2014), November 3-7, 2014, Vienna, Austria [Link]
  • Program Committee Member for the International Conference on Advanced Cloud and Green Computing (Clogreen'14), 6-8 Nov. 2014, Morocco [Link]
  • Program Committee Member for the 11th International Conferenceon Image Analysis and Recognition (ICIAR'14), October 22-24, 2014, Algarve, Portugal [Link]
  • Program Committee Member for the 7th International Conference on Advanced Technologies for Communications (ATC'14), Oct. 15-17, 2014, Hanoi, Vietnam [Link]
  • Program Committee Member for the International Workshop onbReliability of eHealth Information Systems, 16th International Confernce on E-Health Networking, Application & Services (Healthcom'14), October 15-18, 2014, Brazil
  • Program Committee Member for the 10th International Conference on Artificial Intelligence Applications and Innovations (AIAI 2014), Island of Rhodes, Greece, September 19-21, 2014 [Link]
  • Program Committee Member for the 4th International Symposium on Cloud and Services Computing, Beijing, China, Sept. 1-2, 2014 [Link]
  • Program Committee Member for the 22nd International Conference on Pattern Recognition (ICPR'14), 24-28 August 2014, Stockholm, Sweden [Link]
  • Program Committee Member for the 6th International Symposium on Cyberspace Safety and Security (CSS2014), August 20-22, 2014, Paris, France [Link]
  • Program Committee Member for 14th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP'14), 24-27 August 2014, Dalian, China [Link]
  • Program Committee Member for the 16th IEEE International Conference on High Performance Computing and Communications (HPCC'14), 20-22 August 2014, Paris, France [Link]
  • Program Committee Member for the 5th International Conference on Communications and Electronics (ICCE'14), July 30-1 August 2014, Da Nang, Vietnam [Link]
  • Program Committee Member for the 13th International Conference on Intelligent Software Methodologies, Tools, and Techniques (SOMET'14), September 22-24, 2014, Malaysia [Link]
  • Program Committee Member for the 12th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA'14), Sept. 2014, Milan, Italy [Link]
  • Program Committee Member for the 6th International Conference on Evolving Internet (INTERNET'14), June 22-26, 2014, Seville, Spain [Link]
  • Program Committee Member for the 3rd IEEE/ASE International Conference on Cyber Security, Stanford, USA, 27-31 May , 2014 [Link]
  • Program Committee Member for the International Workshop on Secure Peer-to-Peer Intelligent Networks & Systems (SPINS 2014) in conjunction with ANT 2014, June 2-5, 2014, Hasselt, Belgium [Link]
  • Program Committee Member for the 6th Asian Conference on Intelligent Information and Database Systems, April 7-9, 2014, Thailand [Link]
  • Program Committee Member for the 8th International Conference for Internet Technology and Secured Transactions (ICITST'13), 9-12 December 2013, London, UK [Link]
  • Program Committee Member for the World Congress on Internet Security (WorldCIS'13), 9-12 December 2013, London, UK [Link]
  • Program Committee Member for the International Conference on Connected Vehicles & Expo (ICCVE'13), December 2-6, 2013, Las Vegas, USA [Link]
  • Program Committee Member for the 9th International Conference on Informatoin Assurance and Security (IAS'13), 4-6 December 2013, Tunis, Tunsia [Link]
  • Program Committee MEmber for the 2nd International Conference on Convergence and its Application (ICCA 2013), 29-29 November 2013, Jeju Island, Korea [Link]
  • Program Committee Member for the 8th International Conference on Body Area Networks (BodyNets'13), Sept 30-October 2, 2013, Boston, USA [Link]
  • Program Committee Member for the 5th International Symposium on Cyberspace Safety & Security, Nov. 13-15, 2013, Zhangjiajie, China [Link]
  • Program Committee Member for the 15th IEEE International Conference on High Performance Computing (HPCC'13), Nov. 13-15, China [Link]
  • Program Committee Member for 7th International Conference on Anti-counterfeiting, Security, and Identification (ASID'13), Oct. 25-27 2013, Shanghai [Link]
  • Program Committee Member for the 9th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP'13), Beijing, China, Oct 16-18, 2013 [Link]
  • Program Committee Member for the 4th International Conference on Emerging Intelligent Data and Web Technologies, Sept. 9 - 11, 2013Xi'an, China [Link]
  • Program Committee Member for the 13th International Conference on ITS Telecommunications (ITST'13), October 16-18 2013, Tampere, Finland [Link]
  • Program Committee Member for the 7th International Conference on Genetic and Evolutionary Computing (ICGEC-2013), August 25-27, 2013, Prague, Czech Republic [Link]
  • Program Committee Member for the 9th International Conference on Intelligent Computing (ICIC'13), July 28-31, 2013, Nanning, China [Link]
  • Program Committee Member for the 5th International Conference on Evolving Internet, 21-26 July 2013, Nice, France [Link]
  • Program Committee Member for the 11th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA'13), Australia, 16-18 July, 2013 [Link]
  • Program Committee Member for the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'13), Melbourne, Australia, 16-18 July, 2013 [Link]
  • Program Committee Member for the 10th International Conference on Image Analysis and Recognition (ICIAR'13), 26-28 June 2013, Portugal [Link]
  • Program Committee Member for the International Workshop on Parallel and Mobile Computing in Future Networks (PMCFN'13) In Conjunction with the 13th International Conference on Computational Science and Its Applications (ICCSA 2013), June 24-27, 2013, Vietnam [Link]
  • Program Committee Member for the 6th IAPR International Conference on Biometrics (ICB'13), June 4-7 2013, Madrid, Spain [Link]
  • Program Committee Member for the 6th International Conference on Cryptology in Africa (AfricaCrypt'13), 22-24 June 2013, Cairo, Egypt [Link]
  • Program Committee Member for the 7th International Conference on Network and System Security (NSS'13), 3-4 June 2013, Madrid, Spain [Link]
  • Program Committe Member for the 5th International Conference on Intelligent Information And Database Systems (ACIIDS'13), Kulala Lumpur, Malaysia, 18-20 March 2013 [Link]
  • Program Committee Member for the International Conference on Connected Vehicles & Expo (ICCVE 2012), December 12-16, 2012, Beijing, China [Link]
  • Program Committee Member for the 4th International Symposium on Cyberspace Safety and Security (CSS 2012), 12-13 December 2012, Melbourne, Australia [Link]
  • Program Committee Member for the IEEE Asia Pacific Cloud Computing Congress, 14-17 November 2012, China [Link]
  • Program Committee Member for the 8th International Conference on Informatoin Assurance and Security (IAS'12), 21-23 November, Sao Carlos, Brazil [Link]
  • Program Committee Member for the 21st International Conference on Pattern Recognition (ICPR 2012), 11-15 November 2012, Tsukuba Science City, Japan [Link]
  • Program Committee Member for the 5th International Conference on Internet and Distributed Computing Systems (IDCS 2012), 21-23 November 2012, Fujian, China [Link]
  • Program Committee Member for 6th International Conference on Anti-counterfeiting, Security, and Identification (ASID'12), August 24-26, 2012, Taipei, Taiwan [Link]
  • Program Committee Member for the 6th International Conference on Genetic and Evolutionary Computing (ICGEC-2012), August 25-28, 2012, Kitakyushu, Japan [Link]
  • Program Committee Member for the 7th Asia Pacific International Conference on Information Science and Technology (APIC-IST 2012) , 4-7 July 2012, Jeju Island, Korea [Link]
  • Program Committee Member for the 10th IEEE International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR'12), 15-18 July 2011, Xian, China [Link]
  • Program Committee Member for the 14th IEEE International Conference on High Performance Computing and Communications (HPCC'12), 25-27 June 2012, Liverpool, UK [Link]
  • Program Committee Member for the 4th International Conference on Evolving Internet (INTERNET'12), June 24-29, 2012, Venice, Italy.
  • Program Committee Member for the 9th International Conference on Image Analysis and Recognition (ICIAR'12), 25-27 June 2012, Portugal [Link]
  • Program Committee Member for the 6th International Conference on Network and System Security (NSS'12), 21-23 November 2012, Fujian, China [Link]
  • Program Committee Member for 8th International Conference on Intelligent Computing (ICIC'12), 25-29 July, 2012, Huangshan, China [Link]
  • Program Committee Member for 6th International Conference on Information Technology and Secured Transactions (ICITST'11), 11-14 December 2011, Abu Dhahi, UAE [Link]
  • Program Committee Member for 14th International Multitopic Conference (INMIC), 22-24 December 2011, Karachi [Link]
  • Program Committee Member for 11th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP'11), 24-26 October 2011, Melbourne, Australia [Link]
  • Program Committee Member for 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, (IIH-MSP 2011), 14-16 October 2011, Dalian, China [Link]
  • Program Committee Member the 5th International Conference on Network and System Security (NSS'11), September 2011, Milan, Italy [Link]
  • Program Committee Member the 3rd International Conference on Computational Collective Intelligence, Technologies and Applications (ICCCI'11), 21-23 September 2011, Gdynia, Poland [Link]
  • Program Committee Member for the 5th International Conference on Genetic and Evolutionary Computing (ICGEC'11), 29 August- 1 September 2011, Kitakyushu, Japan [Link]
  • Program Committee Member for 11th IEEE International Conference on Scalable Computing and Communications (ScalCom'11), 21 August- 2 September, 2011, Cyprus
  • Program Committee Member for 5th International Conference on Anti-Counterfeiting, Security and Identification in Communication (ASID 2011), 24-26 June 2011, Xiamen, China [Link]
  • Program Committee Member for 8th International Conference on Image Analysis and Recognition (ICIAR'11), 22 June- 24 June, 2011, Canada [Link]
  • Program Committee Member for 7th International Conference on Intelligent Computing (ICIC'11), 11-14 August, 2011, Zhengzhou, China [Link]
  • Program Committee Member for the 9th IEEE International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR'11), 10-13 July 2011, Guilin, China [Link]
  • Program Committee Member for 12th IEEE International Conference on High Performance Computing and Communications (HPCC'10), 1-3 September 2010, Melbourne, Australia [Link]
  • Program Committee Member for 2nd Workshop on RFID/USN Security and Cryptography (RISC'10), 9-10 November 2010, London UK [Link]
  • Program Committee Member for First International Conference on Networking and Computing (ICNC'10), 17-19 November 2010, Higashi Hiroshima, Japan [Link]
  • Program Committee Member for 2nd International Conference on Computational Collective Intelligence--Technology and Applications (ICCCI 2010), 10-12 November 2010, Taiwan [Link]
  • Program Committee Member for International Conference on Multimedia Information Networking and Security (MINES 2010), 4-6 November 2010, Nanjing, China [Link]
  • Program Committee Member for 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, (IIH-MSP 2010), 15-17 October 2010, Darmstadt, Germany [Link]
  • Program Committee Member for Networking and Electronic Commerce Research Conference 2010 (NAEC 2010), October 7-10, 2010, Riva del Garda, Italy [Link]
  • Program Committee Member for 4th International Conference on Anti-Counterfeiting, Security and Identification in Communication (ASID 2010), 18-20 July 2010, Chengdu, China [Link]
  • Program Committee Member for the 20th International Conference on Pattern Recognition (ICPR), 23-26 August 2010, Turkey [Link]
  • Program Committee Member for the 7th International Conference on Image Analysis and Recognition (ICIAR'10), 21-23 June 2010, Portugal [Link]
  • Program Committee Member for the 10th IEEE International Conference on Scalable Computing and Communications (IEEE Scalcom'10), 29 June-01 July 2010 Bradford, UK [Link]
  • Program Committee Member for the 6th International Conference on Intelligent Computing (ICIC'10), 18-21 August 2010, China [Link]
  • Program Committee Member for the 8th IEEE International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR'10), 11-14 July 2010, Qingdao, China [Link]
  • Program Committee Member for the 8th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA'10), 16-19 May 2010, Tunisia [Link]
  • Program Committee member for the 5th IEEE International Conference on Intelligent Computing (ICIC'09), South Korea, 16-19 Sept. 2009 [Link]
  • Program Committee Member for the 10th IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'09), 8-11 December 2009, Hiroshima, Japan [Link]
  • Program Committee Member for the 2009 FTRG International Workshop on Advances in Cryptography, Security and Applications for Future Computing (ACSA-09), 11-12 December 2009, Jeju Island, Korea [Link]
  • Program Committee member for the 1st International Workshop on RFID Security and Cryptography (RISC'09), 10 November 2009, United Kingdom [Link]
  • Program Committee Member for the IEEE International Conference on Scalable Computing and Communications (IEEE Scalcom'09), 25-27 September 2009, Dalian, China
  • Program Committee Member for the IEEE International Conference on Wavelet Analysis and Pattern Recognition (IEEE ICWAPR'09), 12-15 July 2009, Hebei, China
  • Program Committee Member for the 14th IEEE International Conference on Parallel and Distributed Systems (ICPADS'08), 8-10 December 2008, Melbourne, Australia
  • Program Committee Member for the 10th IEEE International Conference on High Performance Computing and Communications (HPCC-08), 25-27 Sept. 2008, Dalian, China
  • Program Committee Member for the IEEE International Conference on Wavelet Analysis and Pattern Recognition (IEEE ICWAPR'08), 30-31 August 2008, Hong Kong
  • Program Committee member for the IEEE International Conference on Intelligent Computing (ICIC'08), Shanghai, China, 2008 [Link]
  • Program Committee member for the First International Conference on Information Technology and Knowledge Management (IT&KM), SZABIST, Islamabad, Pakistan, March, 2008.
  • Program Committee member for the IEEE International Conference on Intelligent Computing (ICIC'07), Qingdao, China, 2007 [Link]
  • Program Committee member for the IEEE International Conference on Intelligent Computing (ICIC'06), Kunming, China, August, 2006

Journals Reviewer


  • Reviewer for the IEEE Potentials, USA (Since May, 2006)
  • Reviewer for the Neurocomputing, Elsevier Science UK (Since June, 2006)
  • Reviewer for the Journal of Applied Sciences, (Since May, 2007)
  • Reviewer for the Journal of Wireless Communications and Mobile Computing, John Wiley & Sons Ltd, UK, (Since February 2008)
  • Reviewer for the IETE Technical Review, (Since February 2009)
  • Reviewer for the IEEE Trans on Systems, Man and Cybernetics (Part B), USA (Since Sept. 2006)
  • Reviewer for the IEEE Trans on Systems, Man and Cybernetics (Part C), USA (Since March, 2009)
  • Reviewer for the Computers & Electrical Engineering, Elsevier Science Since (March, 2009)
  • Reviewer for the Journal of Digital Signal Processing (DSP), Elsevier Science (Since June, 2009)
  • Reviewer for the Journal of Telecommunication Systems (Springer-Verlag) (Since July, 2009)
  • Reviewer for the IEEE Trans on Computers, USA (Since June, 2009)
  • Reviewer for the Journal of Multimedia Tools and Applications (Springer-Verlag) (Since June, 2009)
  • Reviewer for the Journal of Zhenjiang University Science-A, Springer-Verlag (Since January 2010)
  • Reviewer for the International Journal of Computer Mathematics, Taylor & Francis (Since Feb. 2010)
  • Reviewer for the Journal of Security and Communication Networks, John Wiley & Sons (Since March 2010)
  • Reviewer for the Journal of Systems and Software, Elsevier Science (Since March 2010)
  • Reviewer for the Journal of Sensors, (Since April 2010)
  • Reviewer for the Journal of Machine Vision and Applications, Springer Verlag (Since May 2010)
  • Reviewer for the Arab Journal for Science & Engineering, KFUPM (Since June 2010)
  • Reviewer for the Journal of Expert Systems, Wiley-Blackwell (Since June 2010)
  • Reviewer for the IET Electronics Letters (Since July 2010)
  • Reviewer for the International Journal of Bio-Inspired Computation, Inderscience Publishers, (Since August 2010)
  • Reviewer for the IET Information Security (Since August 2010)
  • Reviewer for the Journal of Computer Science & Technology (JCST), Springer-Verlag (Since October 2010)
  • Reviewer for the IEEE Trans on Dependable and Secure Computing, USA (Since Jan. 2011)
  • Reviewer for the Arab Journal of Science & Engineering (Since Dec. 2011)
  • Reviewer for the IEEE Communication Letters, USA (Since Jan. 2012)
  • Reviewer for the Information Processing Letters, Elsevier Science (Since March 2012)
  • Reviewer for the IEEE Systems Journal (Since June 2012)
  • Reviewer for the Autosoft Journal (Since July 2012)
  • Reviewer for the Signal Processing, Elsevier Science (Since August 2012)​
  • Reviewer for the KSII Transactions on Internet and Information Systems​ (Since Nov. 2012)
  • Reviewer for the IEEE Wireless Communication Letters (Since Dec. 2012)
  • Reviewer for the International Journal of Communication Systems (Since Jan. 2013)
  • Reviewer for the Journal of King Saud University-Computer & Information Sciences (Since March. 2013)
  • Reviewer for the IEEE Transactions on Instrumentation and Measurement (Since July 2013)
  • Reviewer for the Chinese Physics B (Since Nov. 2013)​​​​​​​​​​​​
  • Reviewer for the IEEE Transactions on Information Forensics & Security (Since Feb. 2015)
  • Reviewer for the Real Time Imaging Journal, Springer (June 2016)​
  • Reviewer for the IEEE Journal of Biomedical and Health Informatics (Nov. 2016)
  • Reviewer for the IET Biometrics (Nov. 2017)
  • Reviewer for the Journal of Ambient Intelligence and Humanized Computing (Nov. 2017)
  • Reviewer for the ACM Transactions on Spatial Algorithms and Systems (Jan. 2018)
  • Reviewer for the Optics and Laser Technology, Elsevier (April 2018)

Institutional And Admi​nistrative Services


  • Founder & CEO, Global Foundation for Cyber Studies and Research, Washington D.C USA, Jan. 2019
  • IEEE Distinguished Lecturer, Consumer Electronics Society, (Term 2019-2020)
  • Scientific Committee Member for Research, Development and Innovation Authority (Kingdom of Saudi Arabia) for Evaluation of Research Proposals (Since Sept. 2023)
  • Chair Task Group (TG) on Child Online Protection, Focus Group on Metaverse (FGMV), International Telecommunications Union (ITU), Since March 2023
  • External Assessor for Promotion and Appointment at the University of Malaya, Kuala Lumpur, Malaysia, July 2021-July 2025
  • Member of the T20 (Task Force 4: Digital Transformation) of the G20 (Group of Twenty Countries) Presidency, Italy, 2021
  • Member of the IEEE P2089 Standards Working Group (Standard for Age Appropriate Digital Services Framework ), Feb. 2020
  • Member of the S20 (Science 20) of the G20 (Group of Twenty Countries), May 2020
  • Member of the T20 (Task Force 6) of the G20 (Group of Twenty Countries), Jan. 2020
  • Reviewer for the BS Cybersecurity Degree Program of Princess Noura University, Riyadh, Saudi Arabia, 2020
  • Cybersecurity Subject Expert for Riyadh Valley Company’s (RVC) Series B Multimillion USD Venture Capital Funding Round for a South Korean Cybersecurity Startup (Sept. 2019)
  • Member of the group for IEEE P1940(TM) Standard Profiles for ISO 8583 Authentication Services, Sept. 2019
  • Reviewer and Consultant for the MS Cybersecurity Degree Program of Princess Noura University, Riyadh, Saudi Arabia, 2019
  • Reviewer for the MS Cybersecurity Degree Program of King Faisal University, Hofuf, Saudi Arabia, 2019
  • Reviewer for the MS Cybersecurity Degree Program of King Khaled University, Abha, Saudi Arabia, 2019
  • Reviewer for the Higher Diploma Program in Cyber Crimes and Digital Investigation, Naif Arab University of Security Sciences, Riyadh, Saudi Arabia, May 2019
  • Funding Proposal Reviewer for the Swiss National Science Foundation (SNSF), Switzerland, 2018
  • Registered Reviewer for the National Committee of Research Guarantors, Italian Ministry of Education, Universities and Research (MIUR), 2018
  • Member of the Expert Group on 'Digital Transformation Strategy' for the Arab Federation for Digital Economy, (Since Sept. 2018)
  • Reviewer for the Revised Curriculum of BS (Computer Science) Program, King Faisal University, Saudi Arabia (May 2018)
  • Funding Proposal Reviewer for the Effat University, Saudi Arabia (Since 2018)
  • Vice Chair, IEEE Communications Society Saudi Chapter, (Since Nov. 2017)
  • Reviewer of Scientific Proposals, Czech Science Foundation, Czech Republic, 2017
  • Lead the Team for Developing BS Cybersecurity Degree Program for the College of Community and Applied Sciences, King Saud University, Kingdom of Saudi Arabia (2015-2016)
  • Research & Development Manager, Center of Excellence in Information Assurance (CoEIA), King Saud University, Kingdom of Saudi Arabia (February 2009- March 2012)
  • Adjunct professor at Fujian University of Technology, China (Since 2015)
  • King Saud University Journals Publications Unit Committee Member (Since Feb. 2016)
  • Scientific Council Member of 'IT Research Center for The Holy Quran and its Sciences (NOOR ITRC)', Taibah University, Madinah, Saudi Arabia (Since Nov. 2015)
  • Member of Scientific Committee, Center of Excellence in Information Assurance, King Saud University, Saudi Arabia (2009-2012)
  • Honorary Professor, Harbin Institute of Technology, Shenzhen Graduate School, China (Since May 2010 Till Now)
  • Reviewing Board of KACST Scientific & Research Proposals, Saudi Arabia (Since 2011- Till now)
  • Member of the External Projects Evaluation Committee of CoEIA, King Saud University (Since Jan. 2010)
  • Regional Director of Saudi Arabia for Science & Engineering Support Society (SERSC), Korea
  • Regional Director for Europe & Middle East, Future Technology Research Association (FTRA), South Korea
  • Subject Group Leader (SGL) for Software Engineering Programme, Bahria University (Since 2007-2009)
  • Member Board of Studies (BoS), Dept. of Computer Science & Engineering, Bahria University (Since 2007-2009)
  • Member of Post Graduate Committee, Dept. of Computer Science & Engineering, Bahria University (Since 2008-2009)
  • MS/PhD Computer Science & Engineering Program Coordinator, Bahria University (Since 2007-2009)

Prospective Students & Collaboration


I am always looking for talented, smart and hardworking students, researchers and collaborators.If your research interests are similiar to mine, you are welcome to discuss ideas for supervision, collaboration or joint professional & academic activities etc.

We have a strong research group with several full-time/part-time researchers, students and faculty members who are passionate for their contributions to the academia and society. We are currently focusing on digital authentication, multimedia security, biometrics security, and cloud computing security. If you have some novel and innovative ideas and would like to join our group, please feel free to contact me through my email for further discussions.


I have been fortunate to work with some of the following students, researchers, and collaborators:


  • Dr. Maqsood Mahmud (Accomplished PhD in April 2013 from UTM, Malaysia)
  • Dr. Zeeshan Siddiqui (Accomplished PhD in Feb. 2015 from UTM, Malaysia)
  • Dr. Hong Zhao (Accomplished PhD UMICH USA & Southwest Jiaotong University, China)
  • Mehdi Sookhak (PhD from University of Malaya, Currently Postdoc at Carleton, Canada)
  • Ejaz Ahmed (PhD from University of Malaya, Malaysia)
  • Fajri Kurniawan (RA at CoEIA, Saudi Arabia)
  • Suleman Iqbal (PhD Student at University of Malaya, Malaysia)
  • Adnan Akhunzada (PhD student at University of Malaya, Malaysia)
  • Junaid Shuja (PhD student at University of Malaya, Malaysia)
  • Suleman Khan (PhD student at University of Malaya, Malaysia)
  • Zubair Rafique (Former at CoEIA, Saudi Arabia, Currently in Spain)
  • Hanifullah (Full-time Researcher at CoEIA, Saudi Arabia)
  • Muhammad Usama Khanzada (PMC Chair for IT Security, Saudi Arabia)
  • Dr. Lu Leng (Currently doing Postdoc at Yonsei University, Korea)
  • Muhammad Bilal Khan (Currently Pursuing PhD in Korea, Former RA at CoEIA)
  • Dr. S. Kumari (Accomplished PhD in Jan 2013)
  • Dr. Dhreendra Mishra (Assistant Professor in India, Accomplished PhD in 2013)
  • Dr. AK Das (IIIT, Hyderabad)
  • Dr. Mohamed Eldefrawy (Full-time Researcher at CoEIA, Saudi Arabia)
  • Dr. Muhammad Imran Razzaq (Associate Professor in Saudi Arabia, Former RA at CoEIA)
  • Dr. Zeeshan Shafi Khan (Assistant Professor at Qasim University, Former RA At CoEIA)
  • Dr. Haider Abbass (Assistant Professor at CoEIA, Saudi Arabia)
  • Dr. Mohamed Sayim Khalil (Assistant Professor at CoEIA, Saudi Arabia)
  • Dr. Hafizul Islam (Assistant Professor in India)
  • Dr. Jiadong Li (Associate Professor in China)
  • Prof. Wang Xiaomin (Southwest Jiaotong University, China)
  • Dr. Li Xiong (Huanan University, China)
  • Dr. Masoom Alam (Comsats, Pakistan)
  • Dr. Hafiz Malik (University of Michigan-Dearborn USA)
  • Dr. Andrew Teoh (Yonsei University, Korea)
  • Dr. D. He (Wuhan University of Technology, China)
  • Prof. Yang Xiang (Deakin University, Australia)

Speeches

  • Invited Speech on “Navigating the Future: Trends in Cybersecurity Research and Innovation”, Saudi Scientific Society for Cybersecurity, Riyadh, Saudi Arabia, February 12, 2024
  • Moderated Panel Discussion on “The Role of Cyber and EMS in National Security”, World Defense Show, Riyadh, Saudi Arabia, February 4-8, 2024
  • Keynote Speech on "Cybersecurity for Connected and Autonomous Vehicles: State-of-the-Art and Future Challenges", at 5th International Conference on Big Data and Security (ICBDS), Nanjing, China, December 22-24, 2023
  • Invited Speech on "Cybersecurity in Saudi Arabia: Transforming Challenges into Strategic Advancements", at 6th International Conference on Forensic Sciences and Forensic Medicine 2023, Naif Arab University for Security Sciences, Riyadh, Saudi Arabia, 4-7 December 2023
  • Invited Speech on “Harnessing the Power of Artificial Intelligence for a Seamless and Efficient Editorial Workflow”, at “Artificial Intelligence in Digital Publishing: The Global and KSU’s Outlook” Forum, King Saud University, Riyadh, Saudi Arabia, 6 December 2023
  • Keynote Speech on "Cybersecurity for Connected and Autonomous Vehicles: State-of-the-Art and Future Challenges", The 2nd International Conference on Data Science and Emerging Technologies, Malaysia, Dec. 4-5, 2023
  • Moderated Panel Discussion on “Bolstering Cyber and Cloud Security Efforts to Combat Rising Threats in the Digital Era”, Data Centre and Cloud Infrastructure Summit, Riyadh, Saudi Arabia, 30 Nov. 2023
  • Moderated Panel Discussion on “The Cyber Security Landscape in 2023 and Beyond”, 4th Security Conclave, Riyadh, Saudi Arabia, 24 November, 2023
  • Invited Speech on “Saudi Cybersecurity Ecosystem: Transforming Threats into Opportunities”, Taiwan Western Asia and Africa Forum on Regional Security and Transnational Crime, Taipei, Taiwan, 31st October-3rd November 2023
  • Invited Speech on “Cybersecurity for Connected and Autonomous Vehicles: State-of-the-Art & Future Directions”, Sichuan University, Chengdu, China, 4 August 2023
  • Panel Discussion (Moderator) on “KSA Leadership Panel Discussion: Boosting Saudi’s Vision 2030 to Embrace the Digital Transformation Plan and Improving the Cybersecurity at National Level”, CyberNext Summit & Awards (Kingdom of Saudi Arabia), Riyadh, Saudi Arabia, 16-17 May, 2023
  • Panel Discussion (Moderator) on “The Rise of APTs in MENA: Securing the Digital Economy”, GISEC Global, Dubai, UAE, March 14-16, 2023
  • Invited Speaker for workshop on "Cybersecurity for Connected and Autonomous Vehicles: State-of-the-Art and Future Challenges", GISEC Global, Dubai, UAE, March 14-16, 2023
  • Panelist in the Panel Discussion on “How Secure is Your Data in the Cloud?” at the World Cloud & Data Center Show, Riyadh, 28-29 Nov. 2022
  • Invited Speech on “Child-appropriate Cyberspace: The Need for Protocols and Standards” at symposium on "Strategies and Practices for the Protection of Child Rights in Cyberspace in the Kingdom”, Saudi Human Rights Commission, Riyadh, 27 Nov. 2022
  • Invited as a ‘Key Opinion Leader’ at Huawei Connect 2022 and GITEX Global, Dubai, UAE, 10-14 October 2022
  • Invited as a Panelist in panel discussion on "Alignment, Collaboration, and Co-innovation with the Digital Ecosystem" at 12th Saudi Chief Information Officer (CIO) Summit, Riyadh, Saudi Arabia, 19-20 September, 2022
  • Moderator/Speaker at CIO Executive Summit 2022, Riyadh, Saudi Arabia, 26 June 2022
  • Panelist in the Panel Discussion on “Best Practices for Implementing Zero Trust” at KSA Hybrid Cloud and Cybersecurity Summit 2022, Saudi Arabia, 13-14 June 2022
  • Invited by Chatham House (UK) for Conference on “Cyber Diplomacy and Governance: Opportunities, Challenges, and Ways Forward for Arab Countries”, Deadsea, Jordan, 16-17 May 2022
  • Panelist in the Panel Discussion on “Cybersecurity: An Action Towards a Safer Cyberspace”, World Defense Show, Riyadh, Saudi Arabia, 6-9 March 2022
  • Invited Speaker for Speech on “Cybercrime in the Digital Economy”, 21st Infopoverty World Conference, Observatory on Digital Communication, The United Nations Headquarters, New York, USA, 3 Dec. 2021
  • Invited Speaker for Speech on “Cybercrime in the Era of Digital Disruption”, KSA Disruptive Technologies Forum, Riyadh, Saudi Arabia, 30 November 2021
  • Invited Speaker for Speech on “Cybercrime in the Digital Economy: Trends, Challenges & Recommendations” at ‘Taiwan Western Asia Forum on Security and Transnational Crime’, Taipei, Taiwan, 24 November 2021
  • Panelist in the Panel Discussion Session on “Next Horizons in Cybersecurity and Digital Threats in MENA”, Middle East Institute, Washington D.C, USA, 15 October 2021
  • Panel Discussion Moderator on “Cybersecurity Strategies for the Future of Work” at CyberX Saudi Summit, 4-5 October 2021
  • Keynote Speech on "Cybercrime and the Digital Economy: Challenges and Recommendations", Cybersecurity and Homeland Protection Conference, Saudi Arabia, 1 October 2021
  • Panelist in the Panel Discussion Session on 'Defining Metrics to Demonstrate the Value of Cybersecurity Investments’ at KSA Hybrid Cloud and Cybersecurity Summit, Riyadh, Saudi Arabia, 23-24 August 2021
  • Invited Speaker for Speech on “Cybersecurity: Past, Present, and Future” at Summer School Organized by Southwest Jiaotong University, China, 12 July 2021
  • Invited Lecture Series on “Cybersecurity for Internet of Things” at University Immersion Program Organized by Sichuan University, China, 5-9 July 2021
  • Speaker & Panelist at ‘Virtual Workshop on Internet Infrastructure Security and Information’, Co-hosted by ITU ARCC and Centre for Humanitarian Dialogue (HD), Switzerland, 22 March 2021
  • Keynote Speech on "Advanced Persistent Threats through Industrial IoT on Oil and Gas Sector”, Middle East Cybersecurity Forum, 15-16 March, 2021
  • Keynote Speech on “Cybersecurity Ecosystem in the Digital Economy: Challenges and Recommendations”, 1st Forum on Research & Innovation, Dar-Al-Hekma University, Saudi Arabia, 8 March 2021
  • Keynote Speech on “Cybersecurity for Connected and Autonomous Vehicles: State-of-the-Art & Future Challenges”, 4th International Conference on Communication Engineering and Technology (ICCET’21), Shanghai, China, 25-27 Feb. 2021
  • Keynote Speech on “Cybersecurity for Connected and Autonomous Vehicles: Trends and Future Directions”, IEP-SAC Annual Technical Seminar, Riyadh, Saudi Arabia, 15 Jan. 2021
  • Invited Panelist at T20 Summit Season Webinar on “(COVID-19) Multidisciplinary Approaches to Complex Problems”, Under the G20 Presidency, 27 October 2020
  • Keynote Speech on "Cybersecurity and Cyber Crimes in the Hyper-Connected World”, IEEE International Conference on Computer and Information Science (ICCIS 2020), Al-Jouf, Saudi Arabia, 13-15 October 2020
  • Panel Moderator at T20 Summit Season, Task Force 6 Webinar, Panel Discussion on “Beyond Password Protection – Honoring Personal Identities and Maintaining Autonomy in Cybersecurity”, 6 October 2020
  • Invited Speech on “Cybersecurity Challenges and Recommendations”, Webinar on Digital Revolution: Navigating Critical Transitions, Science 20 (S20), 31 August 2020
  • Keynote Speech on "Cybercrime Ecosystem in the Digital Economy: Challenges and Recommendations", Forum on Innovation and the Fourth Industrial Revolution, King Abdulaziz University, Jeddah, Kingdom of Saudi Arabia, 1 July 2020
  • Invited Panelist Speech on “Fostering a Safer Cyberspace for Children”, T20 Webinar on COVID-19 Disruption, Digital Transformation & Digital Divide: The Educational & Vocational Challenges & Opportunities, G20 Presidency, 20 May 2020
  • Invited Lecture on “Smart Cities: Cyber Threats, Vulnerabilities and Solutions”, IEEE Computer Society Saudi Chapter, 13 May 2020
  • IEEE Distinguished Lecture on "Cybersecurity in the 5G-connected IoT World: Recent Developments & Future Trends", IEEE Consumer Electronics Society, 18 April 2020
  • Keynote Speech on "Cybersecurity in 5G-enabled Vulnerable IoT World", International Conference on Big Data and Security (ICBDS 2019), Nanjing, China, 20-22 December, 2019
  • Keynote Speech on "Cybersecurity Challenges and Solutions in Hyper-Connected 5G-based IoT Ecosystem", Inter​national Conference on Computing​ (ICC 2019), CCIS Springer, Princess Noura University, Riyadh, Saudi Arabia, 10-12 December 2019
  • Invited Speech on "Cyber Insecurity: A Stumbling Block for Digital Transformation of SMEs”, National Forum on Business Transformation: Opportunities and Challenges, IAU, Dammam, Kingdom of Saudi Arabia, 30 November 2019
  • Keynote Speech on "Combating Cybersecurity Challenges in Smart Cities", Technical Seminar, IEP Saudi Arabian Center, Al-Khobar, 21 November 2019
  • Invited Speech on "Addressing Cybercrime Challenges: Strategies for Capacity & Capability Building", Cybercrimes and Digital Forensics Forum, Naif Arab University for Security Sciences, Riyadh, Saudi Arabia, 19-21 November 2019
  • Invited Speech on "Combating the Impact of New-age Cybercrime Ecosystem", Taiwan Western Asia Forum on Regional Security and Transnational Crime, Taipei, Taiwan, 11-15 November 2019
  • Keynote Speech on “Cybersecurity in the 5G-connected IoT World: Recent Developments and Future Trends”, 12th International Symposium on Information Processing (ISIP), Shanghai, China, 26-27 October 2019
  • Invited Lecture on “Writing and Publishing Hight Impact Research Papers”, Deanship of Skills Development, King Saud University, 20 October 2019
  • Invited Speech on “Confronting Cybersecurity Challenges in Additive Manufacturing”, The World 3D Print Summit & Expo, Riyadh, Kingdom of Saudi Arabia, 7-8 October 2019
  • Invited Speaker at UIP Program 2019, “Cybersecurity of the Internet of Things”, Sichuan University, Chengdu, China, 8-11 July, 2019
  • Keynote Speech on “Addressing Cybersecurity Challenges in Smart Cities”, International Industry Researchers Conference on Cybersecurity (SecureConf 2019), Kuala Lumpur, Malaysia, 3-4 July 2019
  • Invited Speech on “Modern Scientific Publishing Landscape: An Editor’s Perspective”, King Saud University, Saudi Arabia, 30 April 2019
  • Keynote Speech on "Smart Cities Cybersecurity: Key Challenges and Solutions", IEEE International Conference on Computer and Information Sciences, Al-Jouf, Saudi Arabia,3-4 April 2019
  • Panelist in the Session “Cybersecurity: Reality and Challenges” at the International Conference on Administrative Development in Light of Saudi Vision 2030, Riyadh, Saudi Arabia, 18-20 March 2019
  • Panelist in the Workshop on “Cybersecurity R&D Grand Challenges in the Kingdom”, Riyadh, Saudi Arabia, 25 Feb. 2019
  • Keynote Speech on “Connected, Intelligent, and Smart: Is Cyberspace Secure”, Southwest Jiaotong University Scholar’s Forum, Chengdu, China, 7-9 Dec. 2018
  • Invited Lecture on “Securing the Smart Cities”, Big Data and Artificial Intelligence Forum, Southwest Jiaotong University, China, 7 Dec. 2018
  • Invited Speech on "Ensuring the Cybersecurity of Smart Cities: Key Challenges and Solutions", The 3rd National Computing Colleges Conference, King Khaled University, Saudi Arabia,8-9 October 2018
  • Keynote Speech on "Security, Privacy and Trust in the Internet of Things", 11th International Symposium on Information Processing, Shanghai, China, 22-23 September 2018
  • Keynote Speech on “Cybersecurity of Smart Cities: Challenges, Threats and Issues”, 3rd Cloud Computing and Internet of Things Conference (CCIOTC’18), Chengdu, China, 23-25 July 2018
  • Invited Lecture on “Academic Writing and Publishing”, Summer School organized by the ACM Special Interest Group on Knowledge Discovery and Data Mining (SIGKDD), China, 23 July 2018
  • Keynote Speech on "Cybersecurity Threats and Challenges for Smart Cities", 10th IEEE International Conference on Communication Software and Networks (IEEE ICCSN’18), Chengdu, China, 6-9 July 2018
  • Invited Lecture on “Cybersecurity of Smart Cities: Challenges, Threats and Opportunities”, School of Information Science & Technology, Southwest Jiaotong University, China, 9 July 2018
  • Invited at the Workshop on ‘Data Protection, Privacy and the GDPR: Is the GCC Ready?’ Organized by the Royal Institute of International Affairs (Chatham House), London, UK, 31 May 2018
  • Keynote Speech on "Smart Cities in the Cyberspace: Challenges and Solution", 21st National Computer Conference (Sponsored by the IEEE And Saudi Computer Society), 25-26 April 2018, Riyadh, Saudi Arabia
  • Keynote Speech on "Redefining Digital Trust in the Internet of Things Era" at the workshop on Cybersecurity: Future Challenges and Network Defenses, King Saud University, Saudi Arabia, 12 March 2018
  • Keynote Speech on "An Inventor's Case between Patenting and Publishing" at the Workshop on 'The Importance of Patents in Promoting Scientific Publishing', King Salman Entrepreneurship Institute, King Saud University, Riyadh, 6 March 2018
  • Invited Lecture on "Modern Landscape of Scientific Publishing", Scientific Research Forum (Organized by Deanship of Scientific Research), College of Pharmacy, King Saud University, Saudi Arabia, 21 Feb. 2018
  • Invited Lecture on "Modern Landscape of Scientific Publishing", Scientific Research Forum (Organized by Deanship of Scientific Research), College of Engineering, King Saud University, Saudi Arabia, 19 Feb. 2018
  • Invited Lecture on "Modern Landscape of Scientific Publishing", Scientific Research Forum (Organized by Deanship of Scientific Research), College of Dentistry, King Saud University, Saudi Arabia, 19 Feb. 2018
  • Invited Lecture on "Modern Landscape of Scientific Publishing", Scientific Research Forum (Organized by Deanship of Scientific Research), College of Medicine, King Saud University, Saudi Arabia, 18 Feb. 2018
  • Keynote Speech on “Establishing Trust in IoT: Challenges and Solutions”, 1st Saudi International Exhibition and Conference on Internet of Things, Riyadh, Saudi Arabia, 28-30 Jan. 2018
  • Invited Global Webinar on “Building Digital Trust in the Internet of Things Ecosystem”, IEEE Communications Society Saudi Chapter, 25 Jan. 2018
  • Keynote Speech on “Security Privacy and Trust in the Internet of Things” at 18th IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'17), Taipei, Taiwan, 18-20 Dec. 2017
  • Invited at Workshop on Cybersecurity of the Sustainable Energy Sector in the GCC, Organized by Chatham House (UK) and ITU Arab Regional Cybersecurity Center (ITU ARCC), Muscat, Oman, 11 Dec. 2017
  • Invited at International Symposium on Regional Security and Transnational Crime, Investigation Bureau, Ministry of Justice, Taipei, Taiwan, 31 Oct.- 1 Nov. 2017
  • Panelist in the Session "C4I Solutions for Combatting Cyber-Terrorism and Managing Crisis" at the International Conference on C4I Solutions, 17-19 October 2017, King Saud University, Riyadh, Saudi Arabia, http://www.c4iconf.com
  • Invited Lecture on "Establishing Consumer Trust in The Internet of Things Enabled Products", Southwest Jiaotong University, 25 July 2017, China
  • Invited Lecture on "Emerging Dynamics of Modern Scientific Publishing", Southwest Jiaotong University, 23 July 2017, China
  • Invited Lecture on "Writing and Publishing High Impact Research Papers", King Abdulaziz City for Science and Technology (KACST), 16 May 2017, Riyadh, Saudi Arabia
  • Keynote Speech on "Building Consumer Trust in Adopting IoT Enabled Products", International Conference for Information and Network Security, 2-3 May 2017, Naif Arab University for Security Sciences, Saudi Arabia
  • Keynote Speech on "The New Dynamics of Scientific Publishing", 29 March 2017, 4th General & Applied Sciences Forum, Prince Sultan University, Riyadh, Saudi Arabia
  • Invited Lecture on "Contributions of CoEIA in Cybersecurity Research, Innovation and Education", Cybersecurity Capacity and Capability Building Workshop, 15 March 2017, King Saud University, Saudi Arabia
  • Invited Lecture on "Choosing Research Topics and Writing Research Papers", College of Computer & Information Sciences, King Saud University, 14 Feb. 2017, Saudi Arabia
  • Invited Guest Speaker Lecture on "The New Dynamics of Scientific Publishing", King Faisal Specialist Hospital and Research Center, 19 Dec. 2016, Riyadh, Saudi Arabia
  • Invited Lecture on "New Strategies in Scientific Publishing", Workshop on Forefront of Scientific Publishing: Research Impact on Achieving Saudi Vision 2030, 8 Nov. 2016, King Saud University, Saudi Arabia
  • Invited Lecture on "Digital Holy Quran Computing: An Information Security Perspective", The 2nd Annual Forum on Information Security: Challenges, Insights, and Trends, Naif Arab University of Security Sciences, 4-5 October 2016, Riyadh, Saudi Arabia
  • Invited Lecture/Seminar on "Innovation: What, Why and How", Southwest Jiaotong University, 4 August 2016, Chengdu, China
  • Panelist in the Session "National Capacity and Capability Building in Cybersecurity" at the International Conference on C4I Solutions, 26-28 April 2016, King Saud University, Riyadh, Saudi Arabia
  • Invited Lecture/Seminar on "Cybersecurity: Evolutions, Applications and Emerging Trends", King Faisal University, Al-Hofuf, Kingdom of Saudi Arabia, 19 Jan 2016
  • Invited Lecture/Seminar on "Research Publishing Strategies for Early Career Researchers", Iqra University, Karachi, Pakistan, 21 Sept. 2015
  • Invited Lecture/Seminar on "Prospects and Challenges of Cybersecurity", Southwest Jiaotong University, Chengdu, China, 5 August 2015
  • Invited Lecture/Seminar on "Writing and Publishing Scientific Papers", Southwest Jiaotong University, Chengdu, China, 5 August 2015
  • Invited Lecture/Seminar on "Cybersecurity: Challenges & Opportunities", Fujian University of Technology, Fuzhou, China, 4 August 2015
  • Invited Lecture/Seminar on "Cybersecurity: Challenges and Opportunities in the Modern Society", Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, 28 July 2015
  • Keynote Speaker at the 43rd Seminar of the Institution of Engineers (Pakistan)-Saudi Arabian Section, Riyadh, Saudi Arabia, 21 May 2015
  • Invited Speaker and Panelist at "The National Symposium for Command & Control and Cybersecurity", King Saud University, Riyadh, Saudi Arabia, 27-29 April 2015
  • Invited Seminar on "Digital Authentication: The First Line of Defense Against Cyber Attacks", King Abdullah University of Science & Technology (KAUST), Saudi Arabia, March 2015
  • Invited Lecture on "Cybersecurity: Challenges & Opportunities", Qatar University, Doha, Qatar, 19 October 2014
  • Invited Lecture on "Cybersecurity Challenges and Opportunities", Southwest Jiaotong University, China, 3 August 2014
  • Invited Keynote Speech at United Nations/UAE Open Government Data Forum, Abu Dhabi, UAE, 28-29 April 2014
  • Invited Lecture "Cybersecurity: Threats, Challenges and Opportunities", College of Business Administration, King Saud University, 17 April, 2014
  • Seminar on "Cybersecurity: Challenges and Concerns", CoEIA, KSU, 7 Jan. 2014
  • Keynote Speaker at 14th IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'13), Taipei, Taiwan, 16-18 Dec. 2013
  • Invited Lecture on "Cybersecurity in Modern Arena", Southwest University for Nationalities, China, 6 July 2013
  • Invited Lecture on "Exploring Biometrics for Reliable Personal Identification", Southwest Jiaotong University, China, 16 July 2012
  • Workshop on "Towards Writing & Publishing Technical Research Papers", CoEIA, King Saud University, 28 December 2011
  • Invited Seminar/Lecture on "Biometrics Personal Identification: Advances in Research and Applications", Southwest University for Nationalities, Chengdu, China, 15 July 2011
  • Invited Seminar/Lecture on Biometrics Research Advances and R&D collaboration invitation at Coventry University, UK, June 2010
  • Invited Seminar/Lecture on Biometrics Security at Southwest Jiaotong University, Chengdu, China, July 2010
  • Invited Seminar/lecture on Writing and Publishing Scientific Papers at Southwest University for Nationalities, China, July 2010
  • Collaborating Avenues in Biometrics & Multimedia Security Research with CoEIA, at CoEIA, King Saud University, 6 January, 2010
  • Research Strategies for Beginners, at CoEIA, King Saud University, 15 March 2009
  • Writing and Publishing Scientific Papers, at CoEIA, King Saud University, 24 October, 2009
  • Biometrics: Changing the Paradigm of Personal Identification, at CoEIA, King Saud University,18 November 2009
  • Tutorial on "Biometrics: Recent Advances, Future Prospects and Applications in Pakistan" at the IEEE International Conference on Information & Emerging Technologies (IEEE ICIET'07), FAST-National University of Computer & Emerging Sciences, July, 2007
  • Securing Biometric Templates for Reliable Identity Authentication, Invited Paper Talk, International Conference on Intelligent Computing (ICIC'05), Hefei, China, August, 2005

FUNDED PROJECTS

  • Combating Cyber Security Attacks in Connected and Autonomous Vehicles via Multi-Layer Protection, Funded By RDO, Ministry of Education, Kingdom of Saudi Arabia, Role: Principal Investigator, 2020-2022
  • Hand-based Biometrics Fusion and Bio-Cryptosystem Computation, Funded by National Plan for Science, Technology and Innovation (NPSTI), Saudi Arabia, Role: Principal Investigator, 2018-2020
  • Cryptgraphically Privacy Preserving Mechanism for Cloud-based Healthcare Systems in KSA, ​Funded by National Plan for Science Technology and Innovation, Saudi Arabia, Role: Consultant, 2014-2016
  • A Secure e-Quran Certification System Integrating Audio, Image and Text Watermarking Technologies for Verification of Integrity and Content-Authenticity​​, Funded by King Abdulaziz City for Science & Technology (KACST), Saudi Arabia, Role: Co-PI, 2015-2017
  • Digital Multimedia Forensics, Funded by National Plan for Science Technology and Innovation (NPSTI), Saudi Arabia, Role: Principal Investigator, Jan. 2014-Dec. 2015 (Highly Recommended Project by KACST & AAAS (USA))
  • Research of Polymorphic Lightweight Chaotic Ciphers with Application to Railway Signal Systems, National Natural Science Foundation of China (NSFC), Role: Co-Investigator, 2014-2017
  • Key Theory and Technological Research on Data Security Protection in Cloud Storage System, National Natural Science Foundation of China (NSFC), Role: Co-Investigator, 2014-2016
  • Research Group on Biometrics and Cybersecurity, Deanship of Scientific Research, King Saud University, Role: Principal Investigator, 2013-2014
  • Digital Quran, Funded by NOORITC Research Center, Taibah University, Saudi Arabia, Role: Principal Investigator, 2012-2013
  • ID-based Signature & Authentication, Funded by National Plan for Science Technology and Innovation (NPSTI), Saudi Arabia, Role: Co-Investigator, 2011-2012
  • ​​​"Early Detection of Spam Botnets based on Traffic Properties", Funded by National Plan for Science Technology and Innovation (NPSTI), Saudi Arabia, Role: Co-Investigator, 2011-2013
  • ​"Remote Authentication and Attestation of Documents: A Cryptographic Digital Watermarking Approach", Role: Internal Collaborat​​or, 2010
  • Satellite Image Security, Deanship of Scientific Research, King Saud University, 2010
  • ​National Science Foundation China (NSFC Grant No: 60572027), Role: Research Team Member, 2004-2006
  • Sichuan Youth Science and Technology Foundation (Grant No. 03ZQ026-033), Role: Research Team Member, 2004-2006​
  • Securing The Transmission of Biometric Data for Reliable Identity Authentication, Doctoral Innovation Funds of Southwest Jiaotong University, Role: Principal Investigator, 2005-2006

There are several other classified funding projects, which are not mentioned in the list due to some reasons.

Awards & Media Coverage

Prof. Khurram has a firm believe that nothing great was ever achieved without enthusiasm. Hard work, consistency, and passion are his friends for the journey of his career. He considers success as a journey not a destination!
img01

Awards & Recognitions

Awards & Recognitions

Awards & Recognitions
img01

Media / Press Coverage

Media / Press Coverage

Media / Press Coverage

Awards & Recognitions

  • Best Research Paper Award (RSEAP: RFID based Secure and Efficient Authentication Protocol for Vehicular Cloud Computing) from Vehicular Communications (Elsevier), Dec. 2023
  • Honorary Award (Cybersecurity Academics) awarded at 4th Security Conclave, 2023
  • “Cybersecurity Excellence Award 2023” awarded by CyberNext Awards 2023
  • “Computer Science Leader Award 2023” awarded by Research.com
  • “Global Thought Leader and Influencer in Cybersecurity 2022”, Thinkers360 (USA)
  • Best Survey Paper Award (Q. Feng, D. He, S. Zeadly, Muhammad Khurram Khan, N. Kumar, “A Survey on Privacy Protection in Blockchain Systems”) from Journal of Network and Computer Applications, Elsevier, Sept. 2021
  • Best Paper Award ("A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems") from the IEEE Systems Journal, March 2020
  • King Saud University Award for Scientific Excellence (Inventions, Innovations, and Technology Licensing), 16 May 2016
  • Best Paper Award ("An Enhanced Smart Card based Remote User Password Authentication Scheme") from the Journal of Network and Computer Applications (Elsevier), Awarded at IEEE Globecom'15, San Diego, USA, Dec. 2015
  • King Saud University Award for Scientific Excellence (Research Productivity), 19 May 2015
  • Awarded Bronze Medal at 41st International Exhibition of Inventions at Geneva, for the invention "Detecting Counterfeit Money using RFID-enabled Smart Phone", Geneva, Switzerland, 10-14 April 2013
  • Awarded Gold Medal at 10th Malaysia Technology Expo 2011, Feb. 2011, Kulala Lumpur, Malaysia, for the best invention & innovation award
  • Certificate of Appreciation from Elsevier Science for Successfully Guest Editing a Special Issue in Journal of Network & Computer Applications (vol. 33 Issue 3, 2010)
  • Certificate of Appreciation for Outstanding Contributions in Biometrics & Information Security Research, AIT Conference 2010, June 2010, Japan
  • Inclusion of biography in '2000 Outstanding Intellectuals of the 21st Century - 2011', Cambridge, UK
  • Marquis Who is Who in the World, 2010 Edition, USA
  • Outstanding Leadership Award, IEEE Network & Systems Security Conference, October 2009, Australia
  • Awarded the best Ph.D. dissertation award in Sichuan Province, China
  • Awarded the best Ph.D. dissertation award at Southwest Jiaotong University, China
  • Outstanding graduate student award at Southwest Jiaotong University, China
  • Record holder to become the first foreign engineering doctorate of Sichuan Province
  • Secured first class first position in 6 months Chinese Language certificate
  • Awarded Gold medal & title of 'Magna Cum Laude' in Masters degree

Media / Press Coverage

  • Live Interview on GEO TV Networks in a Program 'Subah Say Geo' on the Subject 'Biometrics and Security Research', Program Duration: 40 Minutes, GEO TV is a Satellite Television and the Biggest TV Channel in Pakistan. [Link]
  • Interview on Pakistan Television (PTV) on my Research and Academic Achievements in Biometrics Research, Program Duration: 30 Minutes, PTV is a Satellite Television and the Govt/Public Channel in Pakistan. [Link]
  • Press Interview in News paper 'The Daily Jang', Pakistan. The Daily Jang is the Biggest Urdu News Paper in Pakistan, which was Published on Paper and Online. [Link]
  • KSU scientists granted American patent on biometric security | Arab News [Link]
  • King Saud University Granted a US Patent on Biometrics Security | News KSU [Link]
  • King Saud University Award for Scientific Excellence Conferred Upon Prof. Muhammad Khurram Khan | News KSU [Link]
  • Dr. Muhammad Khurram Khan Wins KSU Research Productivity Award | News KSU [Link]
  • KSU Receives a US Patent on Currency Note Authentication | News KSU [Link]
  • King Saud University Earns a Patent on Digital Authentication for Cybersecurity | News KSU [Link]
  • KSU Professor Invited for Keynote Speech at Open Government Data Forum, UAE | News KSU [Link]
  • Risalat Al-Jameah [Link]
  • Risalat Al-Jameah [Link]
  • KSU Professor Joins Journal of Medical Systems as Associate Editor | KSU News [Link]
  • KSU and Taibah University Work Together for Digital Holy Quran Security Project | News KSU [Link]
  • Lecture on Cybersecurity: Challenges and Concerns on 7 January | News KSU [Link]
  • CoEIA lecture to explore detection of counterfeit money | News KSU [Link]
  • جريدة الرياض | «مركز التميز» منظماً لمؤتمر القيادة والسيطرة العالمي [Link]
  • جريدة الرياض | «نور» جامعة طيبة.. مرجعية علمية عالمية في مجال توظيف تقنية المعلومات في خدمة القرآن الكريم [Link]
  • انطلاق فعاليات مؤتمر جامعة طيبة في توظيف تقنية المعلومات لخدمة القرآن [Link]
  • جريدة الرياض | جامعة الملك سعود تحصد براءة اختراع أمريكية لنظام مصادقة كلمات المرور [Link]
  • جريدة الرياض | مركز التميز يحصل على براءة اختراع نظام المصادقة باستخدام كلمات المرور الموقتة [Link]
  • برعاية ولي ولي العهد.. مؤتمر القيادة والسيطرة ينطلق غدًا الثلاثاء [Link]
  • اليوم : مركز التميز بجامعة الملك سعود يحصل على براءة اختراع [Link]
  • جامعة الملك سعود تحصل على براءة اختراع نظام يحمي من الهجمات الإلكترونية [Link]
  • جامعة الملك سعود تحصد براءة اختراع أمريكية لنظام مصادقة كلمات المرور [Link]
  • جامعة طيبة | رسالة طيبة | فعاليات مؤتمر جامعة طيبة الدولي في توظيف تقنية المعلومات لخدمة القران الكريم وعل [Link]
  • براءة اختراع أمريكية لجامعة الملك سعود في نظام لاكتشاف النقود المزورة باستخدام الهواتف الذكية [Link]
  • ثقافي / مركز تميز أمن المعلومات بجامعة الملك سعود / محاضرة وكالة الأنباء السعودية [Link]
  • الصفحة غير متاحه [Link]
  • عام / برعاية ولي ولي العهد.. مؤتمر القيادة والسيطرة ينطلق غدًا الثلاثاء / إضافة ثانية واخيرة [Link]
  • عام / اختتام أعمال ندوة أنظمة القيادة والسيطرة والأمن السيبراني / إضافة ثانية واخيرة [Link]
  • المؤتمر العالمي لحلول القيادة والسيطرة يختتم أعماله غدًا [Link]
  • SaudiaTV [Link]
  • Was.sa [Link]
  • مركز التميز يحصل على براءة اختراع نظام المصادقة باستخدام كلمات المرور المؤقتة - صحيفة الأحساء الآن [Link]
  • عام / انطلاق أعمال ملتقى أمن المعلومات بجامعة نايف بمشاركة 183 خبيرًا أمنيًا/ إضافة أولى واخيرة وكالة الأنباء السعودية [Link]
  • الملتقى الدولي أمن المعلومات: التحديات،الرؤى،والتوجهات – شبكة ضياء للمؤتمرات و الدراسات [Link]
  • KSU Professor Delivers Invited Lecture at Information Security Forum | News KSU [Link]
  • رئيس جامعة المنوفية يشارك بالملتقى الدولى لأمن المعلومات وجرائم الانترنت بالسعودية | شرايين مصر | النهار [Link]
  • KSU Professor (Professor Muhammad Khurram Khan) Delivers Invited Lecture at Information Security Forum - South Asian Pulse [Link]
  • Workshop highlights importance of high-impact R&D | Arab News [Link]
  • King Saud University Represented at 35th IEEE International Conference on Consumer Electronics at USA | News KSU [Link]
  • KSU, Taibah University team working on securing framework for digital Qur’an | Arab News [Link]
  • Cybersecurity Workshop Organized at KSU | News KSU [Link]
  • Cybersecurity Workshop Organized at KSU - BY: Munir Mohammad Hasan - South Asian Pulse [Link]
  • Workshop on Writing and Publishing High Impact Research Papers Organized at KACST | News KSU [Link]
  • Center of Excellence in Information Assurance Participated at the 2nd International Conference on C4I Solutions [Link]
  • مؤتمر عالمي: السعودية أكثر دول الشرق الأوسط عرضة للهجمات الإلكترونية [Link]
  • مؤتمر دولي يوصي بتطوير التعاون الدولي الإلكتروني لمكافحة الإرهاب [Link]
  • KSU Represented at International Symposium on Regional Security and Transnational Crime [Link]
  • Saudi delegation participates in symposium on regional security, transnational crimes | Arab News [Link]
  • KSU Professor Invited at Regional Workshop on Cybersecurity of the Sustainable Energy Sector in the GCC | KSU News [Link]
  • Prof. Khurram Invited as a Keynote Speaker at Leading IEEE International Conference | KSU News [Link]
  • Center of Excellence in Information Assurance Gets Research Fund by KACST |KSU News [Link]
  • Saudi University to Establish Biometric Security Research Laboratory | Arab News [Link]
  • Center of Excellence in Information Assurance Represented at Saudi International Exhibition and Conference for Internet of Things | KSU News [Link]
  • King Saud University Granted a United States Patent in Information Security | KSU News [Link]
  • US Patent for King Saud University Invention in Information Security | Arab News [Link]
  • Workshop on ‘Cybersecurity: Future Challenges & Network Defenses’ organized at KSU | KSU News [Link]
  • Prof. Khurram Delivered a Keynote Speech at 21st National Computer Conference | KSU News [Link]
  • Riyadh Hosts Cyber Security Conference | Arab News [Link]
  • Royal Institute of International Affairs (Chatham House UK) Invites KSU Professor | KSU News [Link]
  • Workshop Discussed Data Protection Landscape in GCC | Arab News [Link]
  • KSU Represented by Prof. Khurram as a Keynote Speaker at an International Conference | KSU News [Link]
  • KSU Represented at the 11th International Symposium on Information Processing | KSU News [Link]
  • CoEIA Represented by Prof. Khurram at the 3rd National Computing Colleges Conference | KSU News [Link]
  • KSU Represented at the Global Forum on ‘Crossing the World Elite’| KSU News [Link]
  • KSU Participates in the Arab Digital Economy Conference | KSU News [Link]
  • Saudi Arabia in the Crosshairs as Cyber-raids Target Gulf | Arab News [Link]
  • Prof. Khurram Selected as the ‘IEEE Distinguished Lecturer’| KSU News [Link]
  • COEIA KSU Represented at Conference on Administrative Development in the Light of Saudi Vision 2030 | KSU News [Link]
  • Prof. Khurram Invited as a Keynote Speaker at the IEEE International Conference on Computer and Information Sciences | KSU News [Link]
  • Saudi Arabia’s War Against Hackers | Arab News [Link]
  • Saudis Warned Against using FaceApp | Arab News [Link]
  • CoEIA KSU Participates at International Cybersecurity Events | KSU News [Link]
  • Counting the Cost of Middle East Cyberattacks | Arab News [Link]
  • Saudi Arabia ‘A Prime Target for Hackers,’ Cyber Experts Warn | Arab News [Link]
  • CoEIA KSU Represented at the World 3D Print Summit and Expo | KSU News [Link]
  • CoEIA KSU Professor Invited for a Keynote Speech on Cybersecurity | KSU News [Link]
  • KSU Professor Represented Saudi Arabia at a High-Profile Forum on Regional Security and Transnational Crime | KSU News [Link]
  • Center of Excellence in Information Assurance Represented at Cybercrimes and Digital Forensics Forum | KSU News [Link]
  • Combating Cybersecurity Challenges in Smart Cities | KSU News [Link]
  • National Forum on Business Transformation: Opportunities and Challenges | KSU News [Link]
  • CoEIA KSU Professor Delivers Keynote at International Conference on Computing | KSU News [Link]
  • ثقافي/ جامعة الأميرة نورة تناقش 50 موضوعًا في مؤتمر الحوسبة [Link]
  • CoEIA and KSU Shine at International Conference on Big Data and Security | KSU News [Link]
  • 七国专家学者齐聚南工程共话大数据与隐私保护技术 | Chinese Newspaper Eastday [Link]
  • Prof. Khurram Joins the Task Force of Think20 under the G20 Presidency | KSU News [Link]
  • The Fourth Industrial Revolution is coming to the Middle East | Arab News [Link]
  • Cyber Experts Advise Users to be Cautious While Using Mobile Apps! | Arab News [Link]
  • SecuLetter Closes US$8M Series B funding Round | Yahoo News [Link]
  • Criminals Exploit COVID-19 Fears to Launch ‘Unprecedented Wave’ of Global Cyberattacks | Arab News [Link]
  • Experts Warn Against Vulnerabilities of Apps, Videoconferencing Platforms| Arab News [Link]
  • New Book Offers Valuable Insights into Vision 2030 | Saudi Gazette [Link]
  • Employees Lack Cyber Protection Amid Working from Home Boom | Arab News [Link]
  • Prof. Khurram from COEIA Delivers a Keynote at the Forum on “Innovation and the Fourth industrial Revolution” | KSU News [Link]
  • Lessons learned from the ‘Historic’ Twitter Hack | Saudi Gazette [Link]
  • Youth Hold Key to Saudi Arabia’s Future Cybersecurity: Industry Experts| Arab News [Link]
  • COEIA KSU Organizes S20 Webinar on Digital Revolution | KSU News [Link]
  • Saudi Arabia to Host Global Artificial Intelligence Summit in October | Arab News [Link]
  • Saudi Arabia Develops Secure Alternative to WhatsApp | Arab News [Link]
  • How Saudi Arabia is Emerging as a MENA Cloud-data Hub | Arab News [Link]
  • KSU Represented at the T20 Summit Season under the G20 Presidency | KSU News [Link]
  • Prof. Khurram Delivers Keynote Speech at the IEEE International Conference on Computer and Information Sciences | KSU News [Link]
  • KSU Professor Discusses Multi-Stakeholder Cybersecurity Solutions for a Post COVID-19 Digital World at T20 | KSU News [Link]
  • More Saudi Women Seeking to Specialize in Cybersecurity, Say Experts | Arab News [Link]
  • Cybersecurity Sector Celebrates Women’s Achievements | Arab News [Link]
  • Online Mask Ads Mystery Revealed as Saudi Banks Launch Cybersecurity Campaign | Arab News [Link]
  • Saudi Initiative: DCO to Boost Economies of 5 Founding Countries | Arab News [Link]
  • Expert Hails Safe Cyberspace Program for Children | Arab News [Link]
  • Fraudsters Up Their Game, Posing as Bank Officials on The Phone in Saudi Arabia | Arab News [Link]
  • Work on ‘Digital Silk Route’ link connecting Pakistan to Egypt to start in March | Arab News [Link]
  • KSU Professor Delivers Keynote Speech at an International Conference | KSU News [Link]
  • Global Chip Shortage Offers Silver Lining to KSA’s Local Industry | Arab News [Link]
  • Prof. Khurram Presents a Cybersecurity Keynote at Research and Innovation Forum | KSU News [Link]
  • Saudi Arabia Sets Sights on Becoming Leading Digital Economy | Arab News [Link]
  • ‘Middle East Cybersecurity Forum’ invites KSU Professor for a Keynote Speech | KSU News [Link]
  • Pakistan’s Central Bank Says Studying Feasibility of Issuing its own Digital Currency | Arab News [Link]
  • Professor Muhammad Khurram Khan – Global Thought Leader and Influencer in Cybersecurity | Disrupt Magazine [Link]
  • Saudi Arabia Implements Cybersecurity Framework | Arab News [Link]
  • Tech Firms Opening Academies in Riyadh a ‘Landmark Move,’ Say Experts | Arab News [Link]
  • KSU Professor Garners ‘Best Survey Paper Award' | KSU News [Link]
  • Semiconductor Shortage Slows Down GCC Auto Sector | TrendsMENA [Link]
  • KSU Professor Represents Saudi Arabia at the United Nations Conference | KSU News [Link]
  • KSU Represented at World Defense Show | KSU News [Link]
  • King Saud University Gets a US Patent on Automotive Cybersecurity | KSU News [Link]
  • Phone Bank Fraud Warning Issued by Saudi Data Agency | Arab News [Link]
  • KSU Professor Invited to Cyber Diplomacy and Governance Conference | KSU News [Link]
  • KSU Professor invited to CIO Executive Summit | KSU News [Link]
  • Chief Information Officers Summit Invites KSU Academic | KSU News [Link]
  • KSU Professor invited to CIO Executive Summit | KSU News [Link]
  • The World's Leading Tech Giant invites KSU Professor| KSU News [Link]
  • King Saud University Awarded a US Patent on Biometrics Security| KSU News [Link]
  • Saudi Human Rights Commission invites KSU Professor | KSU News [Link]
  • KSU Represented at a Leading Cloud Computing Event | KSU News [Link]
  • Leading Cybersecurity Event 'GISEC' Invites KSU Professor | KSU News [Link]
  • KSU Academic Garners “Best Computer Scientist Award” | KSU News [Link]
  • KSU Professor Receives the Prestigious "Cybersecurity Excellence Award" | KSU News [Link]
  • Saudi Arabia to Establish Institute for Global Cybersecurity Forum | Arab News [Link]
  • Pakistan to Launch First central Bank Digital Currency Pilot Within Two Months | Arab News [Link]
  • Pakistani Cybersecurity Expert Leads King Saud University in Winning US AI-based Biometrics Patent | Arab News [Link]
  • King Saud University Receives a US Patent on AI-based Biometrics Security | KSU News [Link]
  • KSU Professor Invited to Speak at a Leading Security Forum | KSU News [Link]
  • King Saud University Scoops Cybersecurity Awards | KSU News [Link]
  • DCO Issues White Paper to Combat Online Misinformation | Arab News [Link]
  • KSU Collaborative Research on Vehicular Cybersecurity Wins ‘Best Paper Award’ | KSU News [Link]
  • King Saud University Granted a US Patent for Breakthrough in Automotive Cybersecurity | KSU News [Link]
  • King Saud University Gets US Patent on Biometrics Security Invention by Pakistani Scientist | Arab News [Link]
  • King Saud University Granted US Cybersecurity Patent for Electric Cars | Arab News [Link]

Drop me a line

Please feel free to contact me anytime through the form below or my mailing address or