


default search action
Abdullah Ayub Khan
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j50]Jing Yang
, Haoshen Qin
, Yiping Sun
, Hao Wang
, Abdullah Ayub Khan
, Lip Yee Por
, Roohallah Alizadehsani
, Pawel Plawiak
:
A Generative Adversarial Network-Based Extractive Text Summarization Using Transductive and Reinforcement Learning. IEEE Access 13: 65490-65509 (2025)
[j49]Muhammad Adeel Mannan, Abdul Khalique Shaikh, Abdullah Ayub Khan
, Kaamran Raahemifar, Mohamad Afendee Mohamed:
Transforming ERP systems with collaborative AI: Paving the path to strategic growth and sustainability. Array 28: 100517 (2025)
[j48]Faisal Mehmood, Abdullah Ayub Khan
, Han Wang, Shahid Karim, Umara Khalid, Feng Zhao:
BLPCA-ledger: A lightweight plenum consensus protocols for consortium blockchain based on the hyperledger indy. Comput. Stand. Interfaces 91: 103876 (2025)
[j47]Syed Azeem Inam, Abdullah Ayub Khan, Noor Ahmed
, Tehseen Mazhar, Tariq Shahzad, Sunawar Khan, Mamoon M. Saeed
, Habib Hamam:
A novel deep learning approach for investigating liquid fuel injection in combustion system. Discov. Artif. Intell. 5(1): 32 (2025)
[j46]Anmol Rahujo, Daniya Atif, Syed Azeem Inam, Abdullah Ayub Khan, Sajid Ullah:
A survey on the applications of transfer learning to enhance the performance of large language models in healthcare systems. Discov. Artif. Intell. 5(1): 90 (2025)
[j45]Abdullah Ayub Khan
, Jing Yang
, Asif Ali Laghari
, Abdullah M. Baqasah
, Roobaea Alroobaea
, Chin Soon Ku
, Roohallah Alizadehsani
, U. Rajendra Acharya, Lip Yee Por
:
BAIoT-EMS: Consortium network for small-medium enterprises management system with blockchain and augmented intelligence of things. Eng. Appl. Artif. Intell. 141: 109838 (2025)
[j44]Asif Ali Laghari
, Hang Li, Shoulin Yin, Awais Khan Jumani, Abdullah Ayub Khan, Fida Hussain Dahri
:
Internet of Things for gaming: A review. Entertain. Comput. 52: 100910 (2025)
[j43]Jing Yang, Ke Tian
, Huayu Zhao, Zheng Feng, Sami Bourouis
, Sami Dhahbi, Abdullah Ayub Khan
, Mouhebeddine Berrima, Lip Yee Por
:
Wastewater treatment monitoring: Fault detection in sensors using transductive learning and improved reinforcement learning. Expert Syst. Appl. 264: 125805 (2025)
[j42]Abdullah Ayub Khan, Abdul Khalique Shaikh, Abdulmajeed Alsufyani, Nawal Alsufyani, Asif Ali Laghari, Mohamad Afendee Mohamed:
Multi-objective Particle Swarm Optimization for Sustainable Industrial Operations: Energy and Cost Perspectives. Int. J. Comput. Intell. Syst. 18(1): 273 (2025)
[j41]Usman Ali, Irfan Ali Kandhro, Raja Sohail Ahmed Larik, Abdullah Ayub Khan, Muhammad Huzaifa Shahbaz, Muhammad Osama:
The future of third web: a role of blockchain and Web 3.0. Int. J. Electron. Secur. Digit. Forensics 17(3): 391-403 (2025)
[j40]Muhammad Abbas, Sarmad Ahmed Shaikh, Rumsia Tahir, Abdullah Ayub Khan, Asif Ali Laghari:
Secure SEO techniques for improving the website ranking: an efficient approach. Int. J. Electron. Secur. Digit. Forensics 17(4): 448-459 (2025)
[j39]Umara Khalid, Li Chen, Abdullah Ayub Khan, Bowei Chen, Faisal Mehmood, Muhammad Yasir:
A smart facial acne disease monitoring for automate severity assessment using AI-enabled cloud-based internet of things. Discov. Comput. 28(1): 12 (2025)
[j38]Abdullah Ayub Khan, Asif Ali Laghari
, Syed Azeem Inam, Sajid Ullah, Muhammad Shahzad, Darakhshan Syed:
A survey on multimedia-enabled deepfake detection: state-of-the-art tools and techniques, emerging trends, current challenges & limitations, and future directions. Discov. Comput. 28(1): 48 (2025)
[j37]Umara Khalid, Li Chen, Abdullah Ayub Khan, Faisal Mehmood:
An automatic acne detection, severity, and assessment framework using generative adversarial network with deep neural network. Discov. Comput. 28(1): 113 (2025)
[j36]Abdullah Ayub Khan, Asif Ali Laghari, Hamad Almansour, Leila Jamel, Fahima Hajjej, Vania Vieira Estrela, Mohamad Afendee Mohamed, Sajid Ullah:
Quantum computing empowering blockchain technology with post quantum resistant cryptography for multimedia data privacy preservation in cloud-enabled public auditing platforms. J. Cloud Comput. 14(1): 43 (2025)
[j35]Aun Abbas, Muqaddas Salahuddin, Muhammad Zohaib Khan, Abdullah Ayub Khan, Fahim Uz Zaman, Syed Azeem Inam, Ghadah Aldehim, Tehseen Mazhar, Muhammad Amir Khan:
Machine learning-based hybrid technique to enhance cyber-attack perspective. J. Cloud Comput. 14(1): 57 (2025)
[j34]Abdullah Ayub Khan, Abdul Khalique Shaikh, Roobaea Alroobaea
, Abdullah M. Baqasah, Majed Alsafyani, Hamed Alsufyani, Asif Ali Laghari:
Blockchain-enabled secure Internet of Medical Things (IoMT) architecture for multi-modal data fusion in precision cancer diagnosis and continuous monitoring. J. Cloud Comput. 14(1): 58 (2025)
[j33]Kashif Laeeq, Zulfiqar Ali Memon, Mohammad Asad Abbasi, Shafique Ahmed Awan, Abdullah Ayub Khan
:
Integrated modular approach to provide optimized VLE for learners' engagement. Multim. Tools Appl. 84(22): 25009-25026 (2025)
[j32]Syed Muhammad Hassan Zaidi, Abdul Hafeez Khan, Syed Azeem Inam
, Abdullah Ayub Khan, Jamil Abedalrahim Jamil Alsayaydeh
, Ahmad Ali AlZubi, Benny Ogunshola
, Safarudin Gazali Herawan
:
Unsupervised classification of multi-class chart images: a comparison of customized CNNs and transfer learning techniques. PeerJ Comput. Sci. 11: e3148 (2025)
[j31]Abdullah Ayub Khan, Abdulmajeed Alsufyani, Nawal Alsufyani, Mohamad Afendee Mohamed:
BAML: a decentralized approach to secure, privacy-preserving financial compliance for enhancing anti-money laundering with blockchain hyperledger and federated learning. Peer Peer Netw. Appl. 18(5): 270 (2025)
[j30]Asif Ali Laghari, Hang Li, Shahid Karim, Waheeduddin Hyder, Shoulin Yin, Abdullah Ayub Khan, Rashid Ali Laghari:
Internet of multimedia things (IoMT): A review. Rev. Socionetwork Strateg. 19(1): 19-47 (2025)
[j29]Jing Yang
, Vijay Govindarajan
, Lip Yee Por
, Zaffar Ahmed Shaikh
, Qin Xin
, Pronaya Bhattacharya
, Abdullah Ayub Khan
, Yiyu Wang
:
DDoS Attack Detection in Consumer IoT-Based Healthcare Systems Using Improved Off-Policy Proximal Policy Optimization and Generative Adversarial Network. IEEE Trans. Consumer Electron. 71(4): 11662-11675 (2025)
[j28]Abdullah Ayub Khan, Asif Ali Laghari
, Abdullah M. Baqasah
, Rex Bacarra
, Roobaea Alroobaea
, Majed Alsafyani, Jamil Abedalrahim Jamil Alsayaydeh:
BDLT-IoMT - a novel architecture: SVM machine learning for robust and secure data processing in Internet of Medical Things with blockchain cybersecurity. J. Supercomput. 81(1): 271 (2025)
[j27]Abdullah Ayub Khan, Refka Ghodhbani, Abdulmajeed Alsufyani, Nawal Alsufyani, Mohamad Afendee Mohamed:
Leveraging blockchain-integrated explainable artificial intelligence (XAI) for ethical and personalized healthcare decision-making: a framework for secure data sharing and enhanced patient trust. J. Supercomput. 81(15): 1353 (2025)- 2024
[j26]Shahid Karim
, Geng Tong
, Yiting Yu
, Asif Ali Laghari
, Abdullah Ayub Khan
, Muhammad Ibrar, Faisal Mehmood
:
Developments in Brain Tumor Segmentation Using MRI: Deep Learning Insights and Future Perspectives. IEEE Access 12: 26875-26896 (2024)
[j25]Abdullah Ayub Khan
, Asif Ali Laghari
, Roobaea Alroobaea
, Abdullah M. Baqasah
, Majed Alsafyani
, Rex Bacarra
, Jamil Abedalrahim Jamil Alsayaydeh
:
Secure Remote Sensing Data With Blockchain Distributed Ledger Technology: A Solution for Smart Cities. IEEE Access 12: 69383-69396 (2024)
[j24]Abdullah Ayub Khan
, Sami Dhabi, Jing Yang, Wajdi Alhakami, Sami Bourouis
, Lip Yee Por
:
B-LPoET: A middleware lightweight Proof-of-Elapsed Time (PoET) for efficient distributed transaction execution and security on Blockchain using multithreading technology. Comput. Electr. Eng. 118: 109343 (2024)
[j23]Syed Azeem Inam, Abdullah Ayub Khan, Tehseen Mazhar, Noor Ahmed
, Tariq Shahzad, Muhammad Amir Khan
, Mamoon M. Saeed
, Habib Hamam:
PR-FCNN: a data-driven hybrid approach for predicting PM2.5 concentration. Discov. Artif. Intell. 4(1): 75 (2024)
[j22]Asif Ali Laghari, Hang Li, Abdullah Ayub Khan, Shoulin Yin, Shahid Karim, Muhammad Khan:
Internet of Things (IoT) applications security trends and challenges. Discov. Internet Things 4(1): 36 (2024)
[j21]Jiale Xiong
, Jing Yang
, Lei Yan, Muhammad Awais
, Abdullah Ayub Khan
, Roohallah Alizadehsani, U. Rajendra Acharya:
Efficient reinforcement learning-based method for plagiarism detection boosted by a population-based algorithm for pretraining weights. Expert Syst. Appl. 238(Part E): 122088 (2024)
[j20]Jing Yang
, Mohammad Shokouhifar
, Lip Yee Por
, Abdullah Ayub Khan
, Muhammad Awais, Zohreh Mousavi
:
DT2F-TLNet: A novel text-independent writer identification and verification model using a combination of deep type-2 fuzzy architecture and Transfer Learning networks based on handwriting data. Expert Syst. Appl. 242: 122704 (2024)
[j19]Muhammad Saad Chughtai, Irfana Bibi
, Shahid Karim, Syed Wajid Ali Shah, Asif Ali Laghari
, Abdullah Ayub Khan
:
Deep learning trends and future perspectives of web security and vulnerabilities. J. High Speed Networks 30(1): 115-146 (2024)
[j18]Abdullah Ayub Khan
, Asif Ali Laghari
, Abdullah M. Baqasah
, Roobaea Alroobaea
, Ahmad S. Almadhor, Gabriel Avelino R. Sampedro, Natalia Kryvinska
:
Blockchain-enabled infrastructural security solution for serverless consortium fog and edge computing. PeerJ Comput. Sci. 10: e1933 (2024)
[j17]Jing Yang
, Liangyu Li
, Lip Yee Por
, Sami Bourouis
, Sami Dhahbi, Abdullah Ayub Khan
:
Harnessing Multimodal Data and Deep Learning for Comprehensive Gait Analysis in Pediatric Cerebral Palsy. IEEE Trans. Consumer Electron. 70(3): 5401-5410 (2024)
[j16]Abdullah Ayub Khan
, Asif Ali Laghari
, Abdullah M. Baqasah
, Roobaea Alroobaea
, Thippa Reddy Gadekallu
, Gabriel Avelino R. Sampedro
, Yaodong Zhu
:
ORAN-B5G: A Next-Generation Open Radio Access Network Architecture With Machine Learning for Beyond 5G in Industrial 5.0. IEEE Trans. Green Commun. Netw. 8(3): 1026-1036 (2024)- 2023
[j15]Mohammad Asad Abbasi, Yen-Lin Chen
, Abdullah Ayub Khan
, Zulfiqar Ali Memon, Nouman M. Durrani
, Jing Yang, Chin Soon Ku
, Lip Yee Por
:
Enabling IoT Service Classification: A Machine Learning-Based Approach for Handling Classification Issues in Heterogeneous IoT Services. IEEE Access 11: 89024-89037 (2023)
[j14]Abdullah Ayub Khan
, Aftab Ahmed Shaikh
, Asif Ali Laghari, Muhammad Malook Rind:
Cloud forensics and digital ledger investigation: a new era of forensics investigation. Int. J. Electron. Secur. Digit. Forensics 15(1): 1-23 (2023)
[j13]Aftab Ahmed Shaikh
, Abdullah Ayub Khan
:
Management of electronic ledger: a constraint programming approach for solving curricula scheduling problems. Int. J. Electron. Secur. Digit. Forensics 15(1): 88-99 (2023)
[j12]Muhammad Ameen Chhajro, Asharib Ahmed, Muhammad Ahmed Raza, Abdullah Ayub Khan
, Asif Ali Wagan, Asif Ali Laghari:
A survey on electronic natural language applications: current challenges and limitations. Int. J. Electron. Secur. Digit. Forensics 15(2): 211-223 (2023)
[j11]Danella Patrick, Abdullah Ayub Khan
, Fayyaz Ali, Irfan Ali Kandhro, Mahnoor Anwar, Asadullah Kehar
, Anwar Ali Sanjrani:
A novel comparison of data analytics and business intelligence tools: an information preservation and ledger management solution. Int. J. Electron. Secur. Digit. Forensics 15(4): 387-412 (2023)
[j10]Abdullah Ayub Khan
, Asif Ali Laghari
, Anil Kumar, Zaffar Ahmed Shaikh
, Umair Baig, Abdul Ahad Abro
:
Cloud forensics-enabled chain of custody: a novel and secure modular architecture using Blockchain Hyperledger Sawtooth. Int. J. Electron. Secur. Digit. Forensics 15(4): 413-423 (2023)
[j9]Asif Ali Laghari
, Hang Li, Shoulin Yin, Shahid Karim, Abdullah Ayub Khan
, Muhammad Ibrar:
Blockchain applications for Internet of Things (IoT): A review. Multiagent Grid Syst. 19(4): 363-379 (2023)- 2022
[j8]Abdullah Ayub Khan, Asif Ali Wagan, Asif Ali Laghari, Abdul Rehman Gilal, Izzatdin Abdul Aziz, Bandeh Ali Talpur:
BIoMT: A State-of-the-Art Consortium Serverless Network Architecture for Healthcare System Using Blockchain Smart Contracts. IEEE Access 10: 78887-78898 (2022)
[j7]Abdullah Ayub Khan
, Asif Ali Laghari
, Zaffar Ahmed Shaikh
, Zdzislawa Dacko-Pikiewicz, Sebastian Kot
:
Internet of Things (IoT) Security With Blockchain Technology: A State-of-the-Art Review. IEEE Access 10: 122679-122695 (2022)
[j6]Abdullah Ayub Khan
, Aftab Ahmed Shaikh
, Omar Cheikhrouhou, Asif Ali Laghari
, Mamoon Rashid
, Muhammad Shafiq
, Habib Hamam:
IMG-forensics: Multimedia-enabled information hiding investigation using convolutional neural network. IET Image Process. 16(11): 2854-2862 (2022)
[j5]Abdullah Ayub Khan
, Aftab Ahmed Shaikh
, Asif Ali Laghari, Mazhar Ali Dootio, Muhammad Malook Rind, Shafique Ahmed Awan:
Digital forensics and cyber forensics investigation: security challenges, limitations, open issues, and future direction. Int. J. Electron. Secur. Digit. Forensics 14(2): 124-150 (2022)
[j4]Abdullah Ayub Khan, Aftab Ahmed Shaikh, Zaffar Ahmed Shaikh, Asif Ali Laghari, Shahid Karim:
IPM-Model: AI and metaheuristic-enabled face recognition using image partial matching for multimedia forensics investigation with genetic algorithm. Multim. Tools Appl. 81(17): 23533-23549 (2022)- 2021
[j3]Abdullah Ayub Khan
, Mueen Uddin
, Aftab Ahmed Shaikh
, Asif Ali Laghari
, Adil E. Rajput:
MF-Ledger: Blockchain Hyperledger Sawtooth-Enabled Novel and Secure Multimedia Chain of Custody Forensic Investigation Architecture. IEEE Access 9: 103637-103650 (2021)
[j2]Abdullah Ayub Khan
, Syed Asif Ali:
Network forensics investigation: behaviour analysis of distinct operating systems to detect and identify the host in IPv6 network. Int. J. Electron. Secur. Digit. Forensics 13(6): 600-611 (2021)
[j1]Abdullah Ayub Khan
, Asif Ali Laghari
, Shafique Ahmed Awan:
Machine Learning in Computer Vision: A Review. EAI Endorsed Trans. Scalable Inf. Syst. 8(32): e4 (2021)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-07 22:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







