Habib Ullah Khan

ORCID: 0000-0001-8373-2781
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Technology Adoption and User Behaviour
  • Blockchain Technology Applications and Security
  • Advanced Malware Detection Techniques
  • Big Data and Business Intelligence
  • Impact of AI and Big Data on Business and Society
  • Digital Marketing and Social Media
  • User Authentication and Security Systems
  • FinTech, Crowdfunding, Digital Finance
  • Cloud Computing and Resource Management
  • Software Engineering Research
  • Software Engineering Techniques and Practices
  • Families in Therapy and Culture
  • Outsourcing and Supply Chain Management
  • ICT Impact and Policies
  • Online and Blended Learning
  • Information and Cyber Security
  • Vehicular Ad Hoc Networks (VANETs)
  • Cerebrovascular and Carotid Artery Diseases
  • Organizational and Employee Performance
  • Text and Document Classification Technologies
  • Impact of Technology on Adolescents
  • Cybercrime and Law Enforcement Studies
  • Network Security and Intrusion Detection
  • Advanced Authentication Protocols Security

Qatar University
2016-2025

Wuhan Institute of Technology
2024-2025

Gachon University
2024

Sejong University
2024

Aligarh Muslim University
2024

Combined Military Hospital
1969-2024

National University of Medical Sciences
2019-2024

International Islamic University, Islamabad
2016-2023

Khyber Teaching Hospital
2010-2023

Qurtuba University of Science and Information Technology
2023

Internet of Things (IoT) devices are operating in various domains like healthcare environment, smart cities, homes, transportation, and grid system. These transmit a bulk data through sensors, actuators, transceivers, or other wearable devices. Data the IoT environment is susceptible to many threats, attacks, risks. Therefore, robust security mechanism indispensable cope with vulnerabilities, security, privacy challenges related IoT. In this research, systematic literature review has been...

10.1109/access.2020.3006358 article EN cc-by IEEE Access 2020-01-01

Abstract Receiving an accurate emotional response from robots has been a challenging task for researchers the past few years. With advancements in technology, like service interact with users of different cultural and lingual backgrounds. The traditional approach towards speech emotion recognition cannot be utilized to enable robot give efficient response. conventional uses same corpus both training testing classifiers detect emotions, but this generalized multi-lingual environments, which...

10.1007/s40747-020-00250-4 article EN cc-by Complex & Intelligent Systems 2021-01-11

The metaverse is touted as an exciting new technology amalgamation facilitating next-level immersive experiences for users. However, initial indicate that a host of privacy, security and control issues will need to be effectively resolved its vision realized. This paper highlights the in underlying enabling technologies/platforms. It also discussed broader challenges confronting developers, service providers other stakeholders ecosystem which if left unaddressed may hamper broad adoption...

10.3390/electronics12020391 article EN Electronics 2023-01-12

This research examines the factors that influence customers' intention in adapting Mobile Payment Device MPD technology an emerging economy Qatar. Unified Theory of Acceptance and Use Technology Model UTAUT is employed as basis for proposed model. A questionnaire survey used a tool to collect data. Research results reveal performance expectancy, social influence, perceived information security have direct significant effects on consumer's behavioural adapt MPD. It also found effort...

10.1504/ijmc.2015.072100 article EN International Journal of Mobile Communications 2015-01-01

Ever since the emergence of big data concept, researchers have started applying concept to various fields and tried assess level acceptance it with renown models like technology model (TAM) variations. In this regard, paper tries look at factors that associated usage analytics, by synchronizing TAM organizational learning capabilities (OLC) framework. These are applied on construct, intended also mediation effect OLC constructs is assessed. The for study collected from students pertaining...

10.1186/s40537-017-0081-8 article EN cc-by Journal Of Big Data 2017-07-10

Healthcare systems are transformed digitally with the help of medical technology, information systems, electronic records, wearable and smart devices, handheld devices. The advancement in big data, along availability new computational models field healthcare, has enabled caretakers researchers to extract relevant visualize healthcare data a spectrum. role becomes challenging task form storage, required retrieval within limited time, cost efficient solutions terms care, many others. Early...

10.1109/access.2020.2995572 article EN cc-by IEEE Access 2020-01-01

Brain tumor is a fatal disease, caused by the growth of abnormal cells in brain tissues. Therefore, early and accurate detection this disease can save patient's life. This paper proposes novel framework for using magnetic resonance (MR) images. The based on fully convolutional neural network (FCNN) transfer learning techniques. proposed has five stages which are preprocessing, skull stripping, CNN-based segmentation, postprocessing, learning-based binary classification. In MR images filtered...

10.1155/2021/3365043 article EN cc-by BioMed Research International 2021-11-30

With the quick evolution of medical technology, era big data in medicine is quickly approaching. The analysis and mining these significantly influence prediction, monitoring, diagnosis, treatment tumor disorders. Since it has a wide range traits, low survival rate, an aggressive nature, brain regarded as deadliest most devastating disease. Misdiagnosed tumors lead to inadequate treatment, reducing patient's life chances. Brain detection highly challenging due capacity distinguish between...

10.3389/fncom.2022.1005617 article EN cc-by Frontiers in Computational Neuroscience 2022-09-02

In the modern digital era, software systems are extensively adapted and have become an integral component of human society. Such wide use consists large more critical data that inevitably needs to be secured. It is imperative make sure these not only satisfy users' or functional requirements, but it equally important security systems. However, recent research shows many development methods do explicitly include measures during as they move from demand engineering their final losses....

10.1109/access.2021.3052311 article EN IEEE Access 2021-01-01

Security is one of the most critical aspects software quality. Software security refers to process creating and developing that assures integrity, confidentiality, availability its code, data, services. development organizations treat as an afterthought issue, a result, they continue face threats. Incorporating at any level Development Life Cycle (SDLC) has become urgent requirement. Several methodologies, strategies, models have been proposed developed address security, but only few them...

10.1109/access.2022.3140181 article EN cc-by IEEE Access 2022-01-01

The Internet of Things (IoT) technologies continuously expand with time due to the advances in automated, connected device technology, mobility, and wide access information. IoT is collection many linked devices their unique features, such as scalability, maintainability, fault tolerance, reliability, accuracy, much more. With growing number hybrid large organizations, security privacy concerns are becoming more challenging. Security essential for protecting hardware, network aspects...

10.1016/j.phycom.2023.102084 article EN cc-by Physical Communication 2023-04-19

The deadly coronavirus disease (COVID-19) has highlighted the importance of remote health monitoring (RHM). digital twins (DTs) paradigm enables RHM by creating a virtual replica that receives data from physical asset, representing its real-world behavior. However, DTs use passive internet things (IoT) sensors, which limit their potential to specific location or entity. This problem can be addressed using robotic (IoRT), combines robotics and IoT, allowing (RTs) navigate in particular...

10.1109/jiot.2023.3267171 article EN cc-by IEEE Internet of Things Journal 2023-04-14

Abstract The emergence of smart and nanobiosensor (NB) technologies has transformed the monitoring management bacterial infections. These developments offer remarkable accuracy precision for detecting infectious pathogens. Smart artificial intelligence (AI)-assisted NB-based methods are used as powerful tools in biomedicine detection, combatting multidrug resistance, diagnosing In this study, we delve into advancements these technologies, focusing on AI-based techniques NBs infections from...

10.1515/ntrev-2024-0056 article EN cc-by Nanotechnology Reviews 2024-01-01

The adoption of Financial Technology (FinTech), along with the enhancement Human Resource (HR) competencies, service innovation, and firm growth, plays a crucial role in development banking sector. Despite their importance, obtaining reliable results is often challenging due to complex, high-dimensional correlations among various features that affect industry. To address this issue, research introduces hybrid Multi-Criteria Decision-Making (MCDM) model integrates Entropy-Weighted Method...

10.1371/journal.pone.0313210 article EN cc-by PLoS ONE 2025-01-14

Purpose – This paper aims to report on the information security behaviors of smartphone users in an affluent economy Middle East. Design/methodology/approach A model based prior research, synthesized from a thorough literature review, is tested using survey data 500 representing three major mobile operating systems. Findings The overall level low. Regression coefficients indicate that efficacy measures and cost adopting them are main factors influencing behaviors. At present, more worried...

10.1108/ics-04-2015-0018 article EN Information and Computer Security 2016-02-25

Skin cancer is developed due to abnormal cell growth. These cells are grown rapidly and destroy the normal skin cells. However, it's curable at an initial stage reduce patient's mortality rate. In this article, method proposed for localization, segmentation classification of lesion early stage. The contains three phases. phase I, different types localized using tinyYOLOv2 model in which open neural network (ONNX) squeeze Net used as a backbone. features extracted from depthconcat7 layer...

10.1109/access.2020.3009276 article EN cc-by IEEE Access 2020-01-01

White blood cells (WBCs) protect human body against different types of infections including fungal, parasitic, viral, and bacterial. The detection abnormal regions in WBCs is a difficult task. Therefore method proposed for the localization based on YOLOv2-Nucleus-Cytoplasm, which contains darkNet-19 as basenetwork YOLOv2 model. In this model features are extracted from LeakyReLU-18 supplied an input to YOLOv2-Nucleus-Cytoplasm localizes classifies with maximum score labels. It also localize...

10.1109/access.2020.3021660 article EN cc-by IEEE Access 2020-01-01

The spam detection is a big issue in mobile message communication due to which insecure. In order tackle this problem, an accurate and precise method needed detect the communication. We proposed applications of machine learning-based for detection. technique, learning classifiers such as Logistic regression (LR), K-nearest neighbor (K-NN), decision tree (DT) are used classification ham messages device SMS collection data set testing method. dataset split into two categories training...

10.1155/2020/8873639 article EN cc-by Security and Communication Networks 2020-07-09
Coming Soon ...