default search action
Junaid Chaudhry
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j22]Hina Abrar, Syed Jawad Hussain, Junaid Chaudhry, Kashif Saleem, Mehmet A. Orgun, Jalal Al-Muhtadi, Craig Valli:
Corrections to "Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry". IEEE Access 9: 79628 (2021) - [j21]Junaid Ahsenali Chaudhry, Kashif Saleem, Mamoun Alazab, Hafiz Maher Ali Zeeshan, Jalal Al-Muhtadi, Joel J. P. C. Rodrigues:
Data Security Through Zero-Knowledge Proof and Statistical Fingerprinting in Vehicle-to-Healthcare Everything (V2HX) Communications. IEEE Trans. Intell. Transp. Syst. 22(6): 3869-3879 (2021) - 2020
- [j20]Imtithal A. Saeed, Ali Selamat, Mohd. Foad Rohani, Ondrej Krejcar, Junaid Ahsenali Chaudhry:
A Systematic State-of-the-Art Analysis of Multi-Agent Intrusion Detection. IEEE Access 8: 180184-180209 (2020) - [j19]Ghulam Shabbir, Adeel Akram, Muhammad Munwar Iqbal, Sohail Jabbar, Mai Alfawair, Junaid Chaudhry:
Network Performance Enhancement of Multi-sink Enabled Low Power Lossy Networks in SDN Based Internet of Things. Int. J. Parallel Program. 48(2): 367-398 (2020)
2010 – 2019
- 2019
- [j18]Guanglou Zheng, Wencheng Yang, Craig Valli, Rajan Shankaran, Haider Abbas, Guanghe Zhang, Gengfa Fang, Junaid Chaudhry, Li Qiao:
Fingerprint Access Control for Wireless Insulin Pump Systems Using Cancelable Delaunay Triangulations. IEEE Access 7: 75629-75641 (2019) - [j17]Muhammad Asif Habib, Mudassar Ahmad, Sohail Jabbar, Shehzad Khalid, Junaid Chaudhry, Kashif Saleem, Joel J. P. C. Rodrigues, Mohammed Sayim Khalil:
Security and privacy based access control model for internet of connected vehicles. Future Gener. Comput. Syst. 97: 687-696 (2019) - [j16]Uvais Qidwai, Junaid Chaudhry, Sohail Jabbar, Hafiz Maher Ali Zeeshan, Naeem Janjua, Shehzad Khalid:
Using casual reasoning for anomaly detection among ECG live data streams in ubiquitous healthcare monitoring systems. J. Ambient Intell. Humaniz. Comput. 10(10): 4085-4097 (2019) - [j15]Awais Ahmad, Mudassar Ahmad, Muhammad Asif Habib, Shahzad Sarwar, Junaid Chaudhry, Muhammad Ahsan Latif, Saadat Hanif Dar, Muhammad Shahid:
Parallel query execution over encrypted data in database-as-a-service (DaaS). J. Supercomput. 75(4): 2269-2288 (2019) - [j14]Ahmed Ibrahim, Craig Valli, Ian McAteer, Junaid Chaudhry:
Correction to: A security review of local government using NIST CSF: a case study. J. Supercomput. 75(9): 6158 (2019) - [i3]Rajakumar Arul, Gunasekaran Raja, Ali Kashif Bashir, Junaid Chaudry, Amjad Ali:
A Console GRID LA Console GRID Leveraged Authentication and Key Agreement Mechanism for LTE/SAE. CoRR abs/1905.07607 (2019) - [i2]Junaid Chaudhry, Uvais Qidwai, Mahdi H. Miraz:
Securing Big Data from Eavesdropping Attacks in SCADA/ICS Network Data Streams through Impulsive Statistical Fingerprinting. CoRR abs/1909.11021 (2019) - 2018
- [j13]Jalal Al-Muhtadi, Ma Qiang, Khan Zeb, Junaid Ahsenali Chaudhry, Kashif Saleem, Abdelouahid Derhab, Mehmet A. Orgun, Rajan Shankaran, Muhammad Imran, Maruf Pasha:
A Critical Analysis of Mobility Management Related Issues of Wireless Sensor Networks in Cyber Physical Systems. IEEE Access 6: 16363-16376 (2018) - [j12]Hina Abrar, Syed Jawad Hussain, Junaid Ahsenali Chaudhry, Kashif Saleem, Mehmet A. Orgun, Jalal Al-Muhtadi, Craig Valli:
Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry. IEEE Access 6: 19140-19150 (2018) - [j11]Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zheng, Junaid Ahsenali Chaudhry, Erwin Adi, Craig Valli:
Securing Mobile Healthcare Data: A Smart Card Based Cancelable Finger-Vein Bio-Cryptosystem. IEEE Access 6: 36939-36947 (2018) - [j10]Faisal Riaz, Sania Khadim, Rabia Rauf, Mudassar Ahmad, Sohail Jabbar, Junaid Ahsenali Chaudhry:
A validated fuzzy logic inspired driver distraction evaluation system for road safety using artificial human driver emotion. Comput. Networks 143: 62-73 (2018) - [j9]Sohail Jabbar, Mudassar Ahmad, Kaleem Razzaq Malik, Shehzad Khalid, Junaid Ahsenali Chaudhry, Omar Aldabbas:
Designing an Energy-Aware Mechanism for Lifetime Improvement of Wireless Sensor Networks: a Comprehensive Study. Mob. Networks Appl. 23(3): 432-445 (2018) - [j8]Rajakumar Arul, Gunasekaran Raja, Ali Kashif Bashir, Junaid Chaudry, Amjad Ali:
A Console GRID Leveraged Authentication and Key Agreement Mechanism for LTE/SAE. IEEE Trans. Ind. Informatics 14(6): 2677-2689 (2018) - [j7]Junaid Chaudhry, Al-Sakib Khan Pathan, Mubashir Husain Rehmani, Ali Kashif Bashir:
Threats to critical infrastructure from AI and human intelligence. J. Supercomput. 74(10): 4865-4866 (2018) - [j6]Wencheng Yang, Song Wang, Guanglou Zheng, Junaid Ahsenali Chaudhry, Craig Valli:
ECB4CI: an enhanced cancelable biometric system for securing critical infrastructures. J. Supercomput. 74(10): 4893-4909 (2018) - [j5]Ahmed Ibrahim, Craig Valli, Ian McAteer, Junaid Ahsenali Chaudhry:
A security review of local government using NIST CSF: a case study. J. Supercomput. 74(10): 5171-5186 (2018) - [c23]Junaid Chaudhry, Craig Valli, Michael Crowley, Jon Haass, Peter Roberts:
POStCODE Middleware for Post-Market Surveillance of Medical Devices for Cyber Security in Medical and Healthcare Sector in Australia. ISMICT 2018: 1-10 - [c22]Musfira Siddique, Muhammad Ayzed Mirza, Mudassar Ahmad, Junaid Chaudhry, Rafiqul Islam:
A Survey of Big Data Security Solutions in Healthcare. SecureComm (2) 2018: 391-406 - [c21]Wan Nur Hidayah Ibrahim, Ali Selamat, Ondrej Krejcar, Junaid Ahsenali Chaudhry:
Recent Advances on Fog Health - A Systematic Literature Review. SoMeT 2018: 157-170 - [i1]Junaid Ahsenali Chaudhry, Kashif Saleem, Paul S. Haskell-Dowland, Mahdi H. Miraz:
A Survey of Distributed Certificate Authorities in MANETs. CoRR abs/1807.03246 (2018) - 2017
- [c20]Kashif Saleem, Junaid Chaudhry, Mehmet A. Orgun, Jalal Al-Muhtadi:
A bio-inspired secure IPv6 communication protocol for Internet of Things. ICST 2017: 1-6 - [c19]Junaid Ahsenali Chaudhry, Kashif Saleem, Rafiqul Islam, Ali Selamat, Mudassar Ahmad, Craig Valli:
AZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments. LCN Workshops 2017: 121-127 - [c18]Wencheng Yang, Guanglou Zheng, Ahmed Ibrahim, Junaid Ahsenali Chaudhry, Song Wang, Jiankun Hu, Craig Valli:
Application of 3D Delaunay Triangulation in Fingerprint Authentication System. MONAMI 2017: 291-298 - [c17]Sharmin Jahan, Mozammel Chowdhury, Rafiqul Islam, Junaid Ahsenali Chaudhry:
Securing Healthcare Data Using Biometric Authentication. ATCS/SePrIoT@SecureComm 2017: 123-132 - 2014
- [j4]Saqib Ali, Anjum Naveed, Md. Asri Bin Ngadi, Junaid Ahsenali Chaudhry:
Interference Nomenclature in Wireless Mesh Networks. Wirel. Pers. Commun. 75(4): 1983-2003 (2014) - 2012
- [j3]Asvhini a/p Subramaniam, Junaid Ahsenali Chaudhry, Mudassar Ahmad:
A Study on Elliptic Curve Digital Signature Algorithm (ECDSA) for Reliable E-Commerce Applications. Smart Comput. Rev. 2(1): 71-78 (2012) - [j2]Armaghan Behnia, Rafhana Abd Rashid, Junaid Ahsenali Chaudhry:
A Survey of Information Security Risk Analysis Methods. Smart Comput. Rev. 2(1): 79-94 (2012) - [c16]Uvais A. Qidwai, Junaid Ahsenali Chaudhry, Mohamed Shakir, Robert G. Rittenhouse:
Ubiquitous Monitoring System for Critical Cardiac Abnormalities. FGIT-MulGraB/BSBT/IUrC 2012: 124-134 - [c15]Junaid Ahsenali Chaudhry, Uvais A. Qidwai, Mudassar Ahmad:
Performance Evaluation of TCP and UDP Traffic in IEEE 1451 Compliant Healthcare Infrastructure. ICONIP (4) 2012: 396-403 - [c14]Robert G. Rittenhouse, Malrey Lee, Junaid Ahsenali Chaudhry, Uvais A. Qidwai:
Power and Task Management in Wireless Body Area Network Based Medical Monitoring Systems. ICONIP (4) 2012: 404-414 - [c13]Junaid Ahsenali Chaudhry, Uvais A. Qidwai, Malrey Lee:
Dynamic Health Level 7 Packetizer for On-the-Fly Integrated Healthcare Enterprises (IHE) in Disaster Zones. ICONIP (1) 2012: 432-438 - 2010
- [c12]Junaid Ahsenali Chaudhry, Muhammad Imran:
Autonomic Fault Identification for Ubiquitous Self Healing Systems. UIC/ATC Workshops 2010: 370-374
2000 – 2009
- 2009
- [j1]Junaid Ahsenali Chaudhry:
Autonomic Self Healing-Based Load Assessment for Load Division in OKKAM Backbone Cluster. J. Inf. Process. Syst. 5(2): 69-76 (2009) - [c11]Junaid Ahsenali Chaudhry, Yonghwan Lee, Ken R. Pence, Janos Sztipanovits:
Autonomic Self-Healing for MANETs. IC-AI 2009: 575-581 - 2008
- [c10]Themis Palpanas, Junaid Ahsenali Chaudhry, Periklis Andritsos, Yannis Velegrakis:
Entity Data Management in OKKAM. DEXA Workshops 2008: 729-733 - [c9]Junaid Ahsenali Chaudhry, Themis Palpanas, Periklis Andritsos, Antonio Maña:
Entity Lifecycle Management for OKKAM. IRSW 2008 - [c8]Barbara Bazzanella, Junaid Ahsenali Chaudhry, Themis Palpanas, Heiko Stoermer:
Towards a General Entity Representation Model. SWAP 2008 - 2007
- [c7]Junaid Ahsenali Chaudhry, Seungkyu Park:
AHSEN - Autonomic Healing-Based Self Management Engine for Network Management in Hybrid Networks. GPC 2007: 193-203 - [c6]Yonghwan Lee, Junaid Ahsenali Chaudhry, Dugki Min, Seungkyu Park, Duckwon Chung:
A Comparative Performance Analysis of CBD Application Framework with JBean Application Framework for Improved Distributed Application Development. IPC 2007: 76-79 - [c5]Junaid Ahsenali Chaudhry, Yonghwan Lee, Dugki Min, Seungkyu Park, Chun-Hyon Chang, Duckwon Chung:
Applied Self-Healing: Self-Aware Service Request Optimization for Gateway Stability in Ubiquitous Zone-Based Networks. PRDC 2007: 179-186 - [c4]Junaid Ahsenali Chaudhry, Yonghwan Lee, Seungkyu Park, Dugki Min:
On Self-aware Delay Time Based Service Request Optimization for Gateway Stability in Autonomic Self-healing Systems. SEUS 2007: 348-357 - [c3]Yonghwan Lee, Junaid Ahsenali Chaudhry, Dugki Min, Sunyoung Han, Seungkyu Park:
A Dynamically Adjustable Rule Engine for Agile Business Computing Environments. APWeb/WAIM 2007: 785-796 - 2006
- [c2]Junaid Ahsenali Chaudhry, Seungkyu Park:
A Novel Autonomic Rapid Application Composition Scheme for Ubiquitous Systems. ATC 2006: 48-56 - 2004
- [c1]Junaid Ahsenali Chaudhry, Won-Sik Yoon, Jai-Hoon Kim, We-Duke Cho:
U-Kitchen: Application Scenario. WSTFEUS 2004: 169-171
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint