default search action
Shuja Ansari
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Muhammad Zakir Khan, Muhammad Farooq, Ahmad Taha, Adnan Qayyum, Fehaid Alqahtani, Adnan Nadeem AlHassan, Kamran Arshad, Khaled Assaleh, Shuja Ansari, Muhammad Usman, Muhammad Ali Imran, Qammer H. Abbasi:
Chapter Three - Indoor localization technologies for activity-assisted living: Opportunities, challenges, and future directions. Adv. Comput. 133: 59-98 (2024) - [j24]Muhammad Dangana, Sajjad Hussain, Shuja Ansari, Muhammad Imran, Ahmed Zoha:
A Digital Twin (DT) approach to Narrow-Band Internet of Things (NB-IoT) wireless communication optimization in an industrial scenario. Internet Things 25: 101113 (2024) - [j23]Muhammad Abdullah, Humayun Zubair Khan, Umair Fakhar, Ahmad Naeem Akhtar, Shuja Ansari:
Satellite synergy: Navigating resource allocation and energy efficiency in IoT networks. J. Netw. Comput. Appl. 230: 103966 (2024) - [j22]Mostafa Mohamed Ahmed, Mahmoud A. Shawky, Shady Zahran, Adel Moussa, Naser el-Shimy, Adham A. Elmahallawy, Shuja Ansari, Syed Tariq Shah, Ahmed Gamal Abdellatif:
An experimental analysis of outdoor UAV localisation through diverse estimators and crowd-sensed data fusion. Phys. Commun. 66: 102475 (2024) - [j21]Mehdi Gheisari, Aminreza Karamoozian, Jiechao Gao, Hemn Barzan Abdalla, Shuja Ansari, Riaz Ullah Khan, Zhaoxi Fang:
Accident reduction through a privacy-preserving method on top of a novel ontology for autonomous vehicles with the support of modular arithmetic. Veh. Commun. 46: 100732 (2024) - [j20]Mahmoud A. Shawky, Syed Tariq Shah, Mohammed Abdrabou, Muhammad Usman, Qammer H. Abbasi, David Flynn, Muhammad Ali Imran, Shuja Ansari, Ahmad Taha:
How secure are our roads? An in-depth review of authentication in vehicular communications. Veh. Commun. 47: 100784 (2024) - [c20]Syed Basit Ali Zaidi, Waseem Raza, Haneya Naeem Qureshi, Muhammad Ali Imran, Ali Imran, Shuja Ansari:
A Domain-Aware Framework for Interpretable and Resilient Propagation Models: Enabling Digital Twins for Wireless Networks. VTC Spring 2024: 1-6 - [i4]Naila Azam, Anna Lito Michala, Shuja Ansari, Nguyen Truong:
Modelling Technique for GDPR-compliance: Toward a Comprehensive Solution. CoRR abs/2404.13979 (2024) - 2023
- [j19]Rana Muhammad Sohaib, Oluwakayode Onireti, Yusuf A. Sambo, Rafiq Swash, Shuja Ansari, Muhammad Ali Imran:
Intelligent Resource Management for eMBB and URLLC in 5G and Beyond Wireless Networks. IEEE Access 11: 65205-65221 (2023) - [j18]Mahmoud A. Shawky, Abdul Jabbar, Muhammad Usman, Muhammad Imran, Qammer H. Abbasi, Shuja Ansari, Ahmad Taha:
Efficient Blockchain-Based Group Key Distribution for Secure Authentication in VANETs. IEEE Netw. Lett. 5(1): 64-68 (2023) - [j17]Mahmoud A. Shawky, Muhammad Usman, David Flynn, Muhammad Ali Imran, Qammer H. Abbasi, Shuja Ansari, Ahmad Taha:
Blockchain-based secret key extraction for efficient and secure authentication in VANETs. J. Inf. Secur. Appl. 74: 103476 (2023) - [j16]Qian Wang, Wenfeng Li, Zheqi Yu, Qammer H. Abbasi, Muhammad Imran, Shuja Ansari, Yusuf A. Sambo, Liwen Wu, Qiang Li, Tong Zhu:
An Overview of Emergency Communication Networks. Remote. Sens. 15(6): 1595 (2023) - [j15]Mahmoud A. Shawky, Syed Tariq Shah, Qammer H. Abbasi, Mohamed Hussein, Muhammad Ali Imran, Syed Faraz Hasan, Shuja Ansari, Ahmad Taha:
RIS-Enabled Secret Key Generation for Secured Vehicular Communication in the Presence of Denial-of-Service Attacks. Sensors 23(8): 4104 (2023) - [j14]Naila Azam, Anna Lito Michala, Shuja Ansari, Nguyen Binh Truong:
Data Privacy Threat Modelling for Autonomous Systems: A Survey From the GDPR's Perspective. IEEE Trans. Big Data 9(2): 388-414 (2023) - [j13]Mahmoud A. Shawky, Muhammad Usman, Muhammad Ali Imran, Qammer H. Abbasi, Shuja Ansari, Ahmad Taha:
Adaptive chaotic map-based key extraction for efficient cross-layer authentication in VANETs. Veh. Commun. 39: 100547 (2023) - [c19]Naila Azam, Anna Lito Michala, Shuja Ansari, Nguyen Binh Truong:
Modelling Technique for GDPR-Compliance: Toward a Comprehensive Solution. GLOBECOM 2023: 3300-3305 - [c18]Basit A. Zaidi, Mahmoud A. Shawky, Ahmad Taha, Qammer H. Abbasi, Muhammad Ali Imran, Shuja Ansari:
An Efficient Deep Learning-based Spectrum Awareness Approach for Vehicular Communication. WCNC 2023: 1-6 - [i3]Mahmoud A. Shawky, Syed Tariq Shah, Michael S. Mollel, Jalil Ur Rehman Kazim, Muhammad Ali Imran, Qammer H. Abbasi, Shuja Ansari, Ahmad Taha:
Reconfigurable Intelligent Surface-Assisted Cross-Layer Authentication for Secure and Efficient Vehicular Communications. CoRR abs/2303.08911 (2023) - 2022
- [j12]Muhammad Dangana, Shuja Ansari, Syed Muhammad Asad, Sajjad Hussain, Muhammad Ali Imran:
Towards the Digital Twin (DT) of Narrow-Band Internet of Things (NBIoT) Wireless Communication in Industrial Indoor Environment. Sensors 22(23): 9039 (2022) - [c17]Mahmoud A. Shawky, Qammer H. Abbasi, Muhammad Ali Imran, Shuja Ansari, Ahmad Taha:
Cross-Layer Authentication based on Physical-Layer Signatures for Secure Vehicular Communication. IV 2022: 1315-1320 - [c16]Yu Chen, Yusuf A. Sambo, Oluwakayode Onireti, Shuja Ansari, Muhammad Ali Imran:
LoRaWAN-5G Integrated Network with Collaborative RAN and Converged Core Network. PIMRC 2022: 1-5 - [c15]Abdulrahman Al Ayidh, Yusuf A. Sambo, Shuja Ansari, Muhammad Ali Imran:
Low-Complexity RF Chains Activation Based on Hungarian Algorithm for Uplink Cell-Free Millimetre-Wave Massive MIMO Systems. PIMRC 2022: 529-534 - [c14]Bruno Citoni, Shuja Ansari, Qammer Hussain Abbasi, Muhammad Ali Imran, Sajjad Hussain:
Downlink Independent Throughput optimisation in LoRaWAN. VTC Spring 2022: 1-5 - [c13]Muhammad Dangana, Shuja Ansari, Sajjad Hussain, Muhammad Ali Imran:
NB-IoT Performance Analysis and Evaluation in Indoor Industrial Environment. VTC Spring 2022: 1-7 - [c12]Mahmoud A. Shawky, Muhammad Usman, Muhammad Ali Imran, Qammer H. Abbasi, Shuja Ansari, Ahmad Taha:
Adaptive and Efficient Key Extraction for Fast and Slow Fading Channels in V2V Communications. VTC Fall 2022: 1-6 - 2021
- [j11]Kia Dashtipour, William Taylor, Shuja Ansari, Mandar Gogate, Adnan Zahid, Yusuf A. Sambo, Amir Hussain, Qammer H. Abbasi, Muhammad Ali Imran:
Public Perception of the Fifth Generation of Cellular Networks (5G) on Social Media. Frontiers Big Data 4: 640868 (2021) - [j10]Basel Barakat, Ahmad Taha, Ryan Samson, Aiste Steponenaite, Shuja Ansari, Patrick M. Langdon, Ian J. Wassell, Qammer H. Abbasi, Muhammad Ali Imran, Simeon Keates:
6G Opportunities Arising from Internet of Things Use Cases: A Review Paper. Future Internet 13(6): 159 (2021) - [j9]Abubakar Sharif, Qammer H. Abbasi, Kamran Arshad, Shuja Ansari, Muhammad Zulfiqar Ali, Jaspreet Kaur, Hasan T. Abbas, Muhammad Ali Imran:
Machine Learning Enabled Food Contamination Detection Using RFID and Internet of Things System. J. Sens. Actuator Networks 10(4): 63 (2021) - [j8]Aysenur Turkmen, Shuja Ansari, Paulo Valente Klaine, Lei Zhang, Muhammad Ali Imran:
IMPRESS: Indoor Mobility Prediction Framework for Pre-Emptive Indoor-Outdoor Handover for mmWave Networks. IEEE Open J. Commun. Soc. 2: 2714-2724 (2021) - [j7]Waqas Aman, Muhammad Mahboob Ur Rahman, Shuja Ansari, Ali Arshad Nasir, Khalid A. Qaraqe, Muhammad Ali Imran, Qammer H. Abbasi:
On the effective capacity of IRS-assisted wireless communication. Phys. Commun. 47: 101339 (2021) - [j6]Muhammad Dangana, Shuja Ansari, Qammer H. Abbasi, Sajjad Hussain, Muhammad Ali Imran:
Suitability of NB-IoT for Indoor Industrial Environment: A Survey and Insights. Sensors 21(16): 5284 (2021) - [c11]Kia Dashtipour, William Taylor, Shuja Ansari, Adnan Zahid, Mandar Gogate, Jawad Ahmad, Khaled Assaleh, Kamran Arshad, Muhammad Ali Imran, Qammer H. Abbasi:
Detecting Alzheimer's Disease Using Machine Learning Methods. BODYNETS 2021: 89-100 - [c10]Abdulrahman Al Avidh, Yusuf A. Sambo, Shuja Ansari, Muhammad Ali Imran:
Hybrid Beamforming with Fixed Phase Shifters for Uplink Cell-Free Millimetre-Wave Massive MIMO Systems. EuCNC/6G Summit 2021: 19-24 - [c9]Burak Kizilkaya, Bo Chang, Shuja Ansari, Yusuf A. Sambo, Guodong Zhao, Muhammad Ali Imran:
Age of Control Process for Real-Time Wireless Control. PIMRC 2021: 1-5 - [c8]Bruno Citoni, Shuja Ansari, Qammer Hussain Abbasi, Muhammad Ali Imran, Sajjad Hussain:
Comparative Analysis of Discrete Time Simulations and Stochastic Geometry Models of a Single Gateway LoRaWAN Network. SmartIoT 2021: 8-12 - [c7]Aysenur Turkmen, Shuja Ansari, Paulo Valente Klaine, Lei Zhang, Muhammad Ali Imran:
Indoor Mobility Prediction for mmWave Communications using Markov Chain. WCNC 2021: 1-5 - 2020
- [j5]Shuja Ansari, Jawad Ahmad, Syed Aziz Shah, Ali Kashif Bashir, Tuleen Boutaleb, Sinan Sinanovic:
Chaos-based privacy preserving vehicle safety protocol for 5G Connected Autonomous Vehicle networks. Trans. Emerg. Telecommun. Technol. 31(5) (2020) - [j4]William Taylor, Qammer H. Abbasi, Kia Dashtipour, Shuja Ansari, Syed Aziz Shah, Arslan Khalid, Muhammad Ali Imran:
A Review of the State of the Art in Non-Contact Sensing for COVID-19. Sensors 20(19): 5665 (2020) - [j3]Zheqi Yu, Adnan Zahid, Shuja Ansari, Hasan T. Abbas, Amir M. Abdulghani, Hadi Heidari, Muhammad Ali Imran, Qammer H. Abbasi:
Hardware-Based Hopfield Neuromorphic Computing for Fall Detection. Sensors 20(24): 7226 (2020) - [c6]Zhihan Xu, Shuja Ansari, Amir M. Abdulghani, Muhammad Ali Imran, Qammer H. Abbasi:
IoT Enabled Smart Security Framework for 3D Printed Smart Home. SmartIoT 2020: 117-123 - [c5]Yao Ge, Shuja Ansari, Amir M. Abdulghani, Muhammad Ali Imran, Qammer H. Abbasi:
Intelligent Instruction-Based IoT Framework for Smart Home Applications using Speech Recognition. SmartIoT 2020: 197-204 - [c4]Siyu Wu, Amir M. Abdulghani, Shuja Ansari, Muhammad Ali Imran, Qammer H. Abbasi:
IoT enabled Smart Lighting System using STM32 microcontroller with high performance ARM® Cortex®-M3 core. UCET 2020: 1-4 - [c3]Junaid Akram, Saad Malik, Shuja Ansari, Haider Rizvi, Dongkyun Kim, Raza Hasnain:
Intelligent Target Coverage in Wireless Sensor Networks with Adaptive Sensors. VTC Fall 2020: 1-5 - [i2]Waqas Aman, Muhammad Mahboob Ur Rahman, Shuja Ansari, Ali Arshad Nasir, Khalid A. Qaraqe, Muhammad Ali Imran, Qammer H. Abbasi:
On the Effective Capacity of IRS assisted wireless communication. CoRR abs/2007.06825 (2020) - [i1]William Taylor, Qammer H. Abbasi, Kia Dashtipour, Shuja Ansari, Syed Aziz Shah, Arslan Khan, Muhammad Ali Imran:
A Review on the State of the Art in Non Contact Sensing for COVID-19. CoRR abs/2007.16063 (2020)
2010 – 2019
- 2018
- [j2]Shuja Ansari, Marvin Sánchez, Tuleen Boutaleb, Sinan Sinanovic, Carlos Gamio, Ioannis Krikidis:
SAI: Safety Application Identifier Algorithm at MAC Layer for Vehicular Safety Message Dissemination Over LTE VANET Networks. Wirel. Commun. Mob. Comput. 2018 (2018) - [c2]Shuja Ansari, Tuleen Boutaleb, Sinan Sinanovic, Carlos Gamio, Ioannis Krikidis:
On the Design and Deployment of Multitier Heterogeneous and Adaptive Vehicular Networks. CSNDSP 2018: 1-6 - 2017
- [j1]Shuja Ansari, Tuleen Boutaleb, Sinan Sinanovic, Carlos Gamio, Ioannis Krikidis:
MHAV: Multitier Heterogeneous Adaptive Vehicular Network with LTE and DSRC. ICT Express 3(4): 199-203 (2017) - 2016
- [c1]Shuja Ansari, Tuleen Boutaleb, Carlos Gamio, Sinan Sinanovic, Ioannis Krikidis, Marvin Sánchez:
Vehicular Safety Application Identifier algorithm for LTE VANET server. ICUMT 2016: 37-42
Coauthor Index
aka: Qammer Hussain Abbasi
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-08 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint