default search action
Sajjad Khan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Anton Wahrstätter, Sajjad Khan, Davor Svetinovic:
OpenFL: A scalable and secure decentralized federated learning system on the Ethereum blockchain. Internet Things 26: 101174 (2024) - [c21]Luis Ruhländer, Emilian Popp, Maria Stylidou, Sajjad Khan, Davor Svetinovic:
On the Security and Privacy Implications of Large Language Models: In-Depth Threat Analysis. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2024: 543-550 - 2023
- [j8]Jorão Gomes Jr., Sajjad Khan, Davor Svetinovic:
Fortifying the Blockchain: A Systematic Review and Classification of Post-Quantum Consensus Solutions for Enhanced Security and Resilience. IEEE Access 11: 74088-74100 (2023) - [j7]Kainat Mustafa, Sajjad Khan, Sheraz Aslam, Herodotos Herodotou, Nouman Ashraf, Amil Daraz, Tamim Alkhalifah:
Toward Holistic Energy Management by Electricity Load and Price Forecasting: A Comprehensive Survey. IEEE Access 11: 132604-132626 (2023) - [j6]Sajjad Khan, Jorão Gomes Jr., Muhammad Habib Ur Rehman, Davor Svetinovic:
Dynamic behavior assessment protocol for secure Decentralized Federated Learning. Internet Things 24: 100956 (2023) - [j5]David J. Schodt, Michael J. Wester, Mohamadreza Fazel, Sajjad Khan, Hanieh Mazloom-Farsibaf, Sandeep Pallikkuth, Marjolein B. m. Meddens, Farzin Farzam, Eric A. Burns, William K. Kanagy, Derek A. Rinaldi, Elton Jhamba, Sheng Liu, Peter K. Relich, Mark J. Olah, Stanly L. Steinberg, Keith A. Lidke:
SMITE: Single Molecule Imaging Toolbox Extraordinaire (MATLAB). J. Open Source Softw. 8(90): 5563 (2023) - [j4]Anton Wahrstätter, Jorão Gomes Jr., Sajjad Khan, Davor Svetinovic:
Improving Cryptocurrency Crime Detection: CoinJoin Community Detection Approach. IEEE Trans. Dependable Secur. Comput. 20(6): 4946-4956 (2023) - [c20]Jaqueline Hans, Sajjad Khan, Davor Svetinovic:
Blockchain CBDC Security Threats Using STRIDE. BCCA 2023: 522-529 - [c19]Marko Jevtic, Sajjad Khan, Jorão Gomes Jr., Davor Svetinovic:
Blockchain-Based Countermeasures for Luxury Goods Counterfeiting: A Focused Survey. BCCA 2023: 530-537 - [c18]Aleksandra Ursula Charlotte Hamel, Bogdan-Cristian Zarcu, András-Gergely Csenteri, Tamara Pfliegler, Sajjad Khan, Davor Svetinovic:
Safeguarding Healthcare: A Comprehensive Threat Analysis of Clinical Decision Support Systems. DASC/PiCom/CBDCom/CyberSciTech 2023: 478-485 - [c17]Hong Hanh Doan, Audri Adhyas Paul, Harald Zeindlinger, Yiheng Zhang, Sajjad Khan, Davor Svetinovic:
Threat Modeling for ML-based Topology Prediction in Vehicular Edge Computing Architecture. DASC/PiCom/CBDCom/CyberSciTech 2023: 523-530 - [c16]Beáta Stingelová, Clemens Thaddäus Thrakl, Laura Wronska, Sandra Jedrej-Szymankiewicz, Sajjad Khan, Davor Svetinovic:
User-Centric Security and Privacy Threats in Connected Vehicles: A Threat Modeling Analysis Using STRIDE and LINDDUN. DASC/PiCom/CBDCom/CyberSciTech 2023: 690-697 - [c15]Marija Brkic, Horia-Stefan Dinu, Alida Mirkovic, Alma Sabirovic, Sajjad Khan, Davor Svetinovic:
Cyber Vulnerabilities in Blockchain Electronic Health Records: An In-Depth Threat Analysis. DASC/PiCom/CBDCom/CyberSciTech 2023: 784-791 - 2022
- [c14]Coco Koban, Maryia Falaleyeva, Maria Spravtseva, Roman Moiseev, Sajjad Khan:
Modeling User-Centric Threats in Smart City: A Hybrid Threat Modeling Method. AICCSA 2022: 1-7 - 2021
- [j3]Sajjad Khan, Muhammad Bilal Amin, Ahmad Taher Azar, Sheraz Aslam:
Towards Interoperable Blockchains: A Survey on the Role of Smart Contracts in Blockchain Interoperability. IEEE Access 9: 116672-116691 (2021)
2010 – 2019
- 2019
- [c13]Sajjad Khan, Zahoor Ali Khan, Nadeem Javaid, Waleed Ahmad, Raza Abid Abbasi, Hafiz Muhammad Faisal:
On Maximizing User Comfort Using a Novel Meta-Heuristic Technique in Smart Home. AINA 2019: 26-38 - [c12]Waleed Ahmad, Nadeem Javaid, Sajjad Khan, Maria Zuraiz, Tayyab Awan, Muhammad Amir, Raza Abid Abbasi:
A New Memory Updation Heuristic Scheme for Energy Management System in Smart Grid. AINA 2019: 53-66 - [c11]Sajjad Khan, Zahoor Ali Khan, Nadeem Javaid, Sahibzada Muhammad Shuja, Muhammad Abdullah, Annas Chand:
Energy Efficient Scheduling of Smart Home. AINA Workshops 2019: 67-79 - [c10]Raza Abid Abbasi, Nadeem Javaid, Sajjad Khan, Shujat ur Rehman, Amanullah, Rana Muhammad Asif, Waleed Ahmad:
Minimizing Daily Cost and Maximizing User Comfort Using a New Metaheuristic Technique. AINA Workshops 2019: 80-92 - [c9]Raza Abid Abbasi, Nadeem Javaid, Shujat ur Rehman, Amanullah, Sajjad Khan, Hafiz Muhammad Faisal, Sajawal Ur Rehman Khan:
Minimizing Daily Electricity Cost Using Bird Chase Scheme with Electricity Management Controller in a Smart Home. AINA 2019: 82-94 - [c8]Waleed Ahmad, Nadeem Javaid, Basit Karim, Syed Qasim Jan, Muhammad Ali, Raza Abid Abbasi, Sajjad Khan:
Pro Utility Pro Consumer Comfort Demand Side Management in Smart Grid. AINA Workshops 2019: 385-397 - [c7]Sahibzada Muhammad Shuja, Nadeem Javaid, Sajjad Khan, Hina Akmal, Murtaza Hanif, Qazi Fazalullah, Zain Ahmad Khan:
Efficient Scheduling of Smart Home Appliances for Energy Management by Cost and PAR Optimization Algorithm in Smart Grid. AINA Workshops 2019: 398-411 - [c6]Sajjad Khan, Nadeem Javaid, Annas Chand, Abdul Basit Majeed Khan, Fahad Rashid, Imran Uddin Afridi:
Electricity Load Forecasting for Each Day of Week Using Deep CNN. AINA Workshops 2019: 1107-1119 - [c5]Sahibzada Muhammad Shuja, Nadeem Javaid, Sajjad Khan, Umair Sarfraz, Syed Hamza Ali, Muhammad Taha, Tahir Mehmood:
Electricity Price Prediction by Enhanced Combination of Autoregression Moving Average and Kernal Extreme Learing Machine. AINA Workshops 2019: 1145-1156 - [c4]Abdul Basit Majeed Khan, Sajjad Khan, Sayed Aimal, Mudassar Khan, Bibi Ruqia, Nadeem Javaid:
Half Hourly Electricity Load Forecasting Using Convolutional Neural Network. IMIS 2019: 172-184 - [c3]Ayesha Anjum Butt, Sajjad Khan, Tehreem Ashfaq, Sakeena Javaid, Norin Abdul Sattar, Nadeem Javaid:
A Cloud and Fog based Architecture for Energy Management of Smart City by using Meta-heuristic Techniques. IWCMC 2019: 1588-1593 - [c2]Sajjad Khan, Nadeem Javaid, Annas Chand, Raza Abid Abbasi, Abdul Basit Majeed Khan, Hafiz Muhammad Faisal:
Forecasting day, week and month ahead electricity load consumption of a building using empirical mode decomposition and extreme learning machine. IWCMC 2019: 1600-1605 - 2016
- [c1]Irfan Azam, Abdul Majid, Tanveer Khan, Sajjad Khan, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid:
Avoiding Energy Holes in Underwater Wireless Sensor Networks with Balanced Load Distribution. CISIS 2016: 341-350 - 2015
- [j2]Sajjad Khan, Waqas Anwar, Xuan Wang, Usama Ijaz Bajwa:
Template based affix stemmer for a morphologically rich language. Int. Arab J. Inf. Technol. 12(2): 146-154 (2015)
2000 – 2009
- 2005
- [j1]Sajjad Khan:
Review of "Struts Recipes by George Franciscus and Danilo Gurovich". ACM Queue 3(6): 60 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-22 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint