Mazhar Ali

ORCID: 0000-0003-2351-6520
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Advanced Malware Detection Techniques
  • Cloud Data Security Solutions
  • Blockchain Technology Applications and Security
  • Climate change impacts on agriculture
  • Network Security and Intrusion Detection
  • Spam and Phishing Detection
  • Vehicular Ad Hoc Networks (VANETs)
  • Soil Carbon and Nitrogen Dynamics
  • Cryptography and Data Security
  • Security and Verification in Computing
  • Cryptographic Implementations and Security
  • User Authentication and Security Systems
  • Chaos-based Image/Signal Encryption
  • Remote Sensing in Agriculture
  • Advanced Authentication Protocols Security
  • Context-Aware Activity Recognition Systems
  • Cloud Computing and Resource Management
  • Misinformation and Its Impacts
  • Privacy-Preserving Technologies in Data
  • Rice Cultivation and Yield Improvement
  • Software Engineering Techniques and Practices
  • Food Security and Health in Diverse Populations
  • Land Use and Ecosystem Services
  • Agriculture Sustainability and Environmental Impact

COMSATS University Islamabad
2015-2024

Abbottabad University of Science and Technology
2018-2022

King Saud University
2016

North Dakota State University
2015

Dakota State University
2015

University of Madras
1993

Cloud storage is an application of clouds that liberates organizations from establishing in-house data systems. However, cloud gives rise to security concerns. In case group-shared data, the face both cloud-specific and conventional insider threats. Secure sharing among a group counters threats legitimate yet malicious users important research issue. this paper, we propose Data Sharing in Clouds (SeDaSC) methodology provides: 1) confidentiality integrity; 2) access control; 3) (forwarding)...

10.1109/jsyst.2014.2379646 article EN IEEE Systems Journal 2015-01-13

The automotive industry is growing day by and personal vehicles have become a significant transportation resource now. With the rise in private vehicles, getting free space for parking one’s car, especially populated areas, has not only difficult but also results several issues, such as: (i) traffic congestion, (ii) wastage of time, (iii) environmental pollution, most importantly (iv) unnecessary fuel consumption. On other hand, car spaces urban areas are increasing at same rate as on roads....

10.1109/access.2019.2950950 article EN cc-by IEEE Access 2019-01-01

Abstract Timely and accurate estimation of rice-growing areas forecasting production can provide crucial information for governments, planners, decision-makers in formulating policies. While there exists studies focusing on paddy rice mapping, only few have compared multi-scale datasets performance classification. Furthermore, mapping large geographical with sufficient accuracy planning purposes has been a challenge Pakistan, but recent advancements Google Earth Engine make it possible to...

10.1038/s41598-022-17454-y article EN cc-by Scientific Reports 2022-08-01

Vehicular ad hoc Networks (VANETs) are an emerging technology with robust applications in Intelligent Transport System. It consists of smart vehicles and roadside infrastructure which communicate through open access wireless networks. The rapid growth results VANETs becoming large-scale, dynamic, heterogeneous it is possible for the attacker to harm vehicular communication leads life-endangering situations. must ensure secured using strong privacy-preserving authentication mechanisms. In...

10.1109/access.2021.3125521 article EN cc-by IEEE Access 2021-01-01

Abstract The rapid increase in urbanization has an important effect on cropping pattern and land use/land cover (LULC) through replacing areas of vegetation with commercial residential coverage, thereby increasing the surface temperature (LST). LST information is significant to understand environmental changes, urban climatology, anthropogenic activities, ecological interactions, etc. Using remote sensing (RS) data, present research provides a comprehensive study LULC changes water scarce...

10.1515/geo-2020-0298 article EN cc-by-nc-nd Open Geosciences 2021-01-01

Outsourcing data to a third-party administrative control, as is done in cloud computing, gives rise security concerns. The compromise may occur due attacks by other users and nodes within the cloud. Therefore, high measures are required protect However, employed strategy must also take into account optimization of retrieval time. In this paper, we propose division replication for optimal performance (DROPS) that collectively approaches issues. DROPS methodology, divide file fragments,...

10.1109/tcc.2015.2400460 article EN publisher-specific-oa IEEE Transactions on Cloud Computing 2015-02-05

Abstract Majority of the devices in Internet Things (IoT) are deployed an environment that is susceptible to cyber‐attacks. Due resource‐constraint nature IoT, it very hard meet security challenges arise due deployment IoT unsecure environment. In this context, authentication one core challenges. Many protocols have been designed address and overcome issues stem from failure. However, many these using complex cryptographic techniques may not be supported by devices. paper, we propose a...

10.1002/ett.3676 article EN Transactions on Emerging Telecommunications Technologies 2019-07-04

Summary To provide reliable data storage and retrieval services to the end users, cloud service provider implements secure storage, sharing, mechanisms. However, aforesaid provided by have certain pitfalls, such as decision latency real‐time computation. address these aforementioned problems, fog computing was introduced for purpose of providing at network's edge. While this migration edge raises various security concerns, trust, authentication, mobility, intrusion, network security, Among...

10.1002/dac.4181 article EN International Journal of Communication Systems 2019-10-16

Off-site data storage is an application of cloud that relieves the customers from focusing on system. However, outsourcing to a third-party administrative control entails serious security concerns. Data leakage may occur due attacks by other users and machines in cloud. Wholesale service provider yet another problem faced environment. Consequently, high-level measures required. In this paper, we propose for environment with semi-trusted third party (DaSCE), system provides (a) key management...

10.1109/tcc.2015.2446458 article EN IEEE Transactions on Cloud Computing 2015-06-17

Accurate recognition of patients' physical activities leads to correct diagnosis and treatments. However, currently deployed approaches are deficient in recognizing the requiring frequent interposture transitions, such as jogging, jumping, turning left, going upstairs. The reason is that with change position rotation, different activity signals generated, which difficult distinguish from other can therefore mislead physicians. Therefore, we propose employ a methodology utilizes energy...

10.1109/jsyst.2016.2610188 article EN IEEE Systems Journal 2016-10-20

Online Social Networks (OSNs) have not only significantly reformed the social interaction pattern but also emerged as an effective platform for recommendation of services and products. The upswing in use OSNs has witnessed growth unwanted activities on media. On one hand, spammers media can be a high risk towards security legitimate users other hand some users, such bloggers pollute results systems that work alongside OSNs. polluted precarious to masses track recommendations. Therefore, it...

10.1109/tdsc.2016.2616879 article EN IEEE Transactions on Dependable and Secure Computing 2016-01-01

Recent studies of social media have made a unanimous conclusion that public opinions can be altered through systematic exploitation using bot accounts. The existing detection methodologies utilize features the accounts to label them as either or human. However, in this work, we propose convolutional neural network (CNN) identify single post on media. We compared our results with an artificial (ANN) trained extracted from accounts' profiles. Results shown detected 98.71% accuracy CNN 97.6%...

10.1109/worlds4.2019.8903989 article EN 2019-07-01

Summary Recent developments in the cloud technologies have motivated migration of distributed large systems, specifically Internet Things to architecture. Since consist a vast network and variety objects, platform proves be an ideal option. It is essential for proper functioning able share data among system processes. The biggest problem faced during transition IoTs security especially while sharing within its tenants. Information Flow Control mechanisms are one many solutions enable...

10.1002/cpe.4729 article EN Concurrency and Computation Practice and Experience 2018-09-05
Coming Soon ...