default search action
Adeel Anjum
Person information
- affiliation: Southern University of Science and Technology, Shenzhen, China
- affiliation (PhD 2013): University of Nantes, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j78]Zahra Abbas, Sunila Fatima Ahmad, Madiha Haider Syed, Adeel Anjum, Semeen Rehman:
Exploring Deep Federated Learning for the Internet of Things: A GDPR-Compliant Architecture. IEEE Access 12: 10548-10574 (2024) - [j77]Muhammad Noman Sohail, Adeel Anjum, Iftikhar Ahmed Saeed, Madiha Haider Syed, Axel Jantsch, Semeen Rehman:
Optimizing Industrial IoT Data Security Through Blockchain-Enabled Incentive-Driven Game Theoretic Approach for Data Sharing. IEEE Access 12: 51176-51192 (2024) - [j76]Syeda Mahnoor Gilani, Adeel Anjum, Abid Khan, Madiha Haider Syed, Syed Atif Moqurrab, Gautam Srivastava:
A robust Internet of Drones security surveillance communication network based on IOTA. Internet Things 25: 101066 (2024) - [j75]Hajira Batool, Adeel Anjum, Abid Khan, Stefano Izzo, Carlo Mazzocca, Gwanggil Jeon:
A secure and privacy preserved infrastructure for VANETs based on federated learning with local differential privacy. Inf. Sci. 652: 119717 (2024) - [j74]Saira Beg, Adeel Anjum, Mansoor Ahmed:
User-selectable interaction and privacy features in mobile app recommendation (MAR). Multim. Tools Appl. 83(20): 58043-58073 (2024) - 2023
- [j73]Zainab Iftikhar, Adeel Anjum, Abid Khan, Munam Ali Shah, Gwanggil Jeon:
Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger. Clust. Comput. 26(6): 3361-3377 (2023) - [j72]Zainab Iftikhar, Adeel Anjum, Abid Khan, Munam Ali Shah, Gwanggil Jeon:
Correction: Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger. Clust. Comput. 26(6): 3379 (2023) - [j71]Tehsin Kanwal, Hasina Attaullah, Adeel Anjum, Abid Khan, Gwanggil Jeon:
Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches. Digit. Commun. Networks 9(5): 1131-1140 (2023) - [j70]Laraib Javed, Adeel Anjum, Bello Musa Yakubu, Majid Iqbal, Syed Atif Moqurrab, Gautam Srivastava:
ShareChain: Blockchain-enabled model for sharing patient data using federated learning and differential privacy. Expert Syst. J. Knowl. Eng. 40(5) (2023) - [j69]Hira S. Sikandar, Saif Ur Rehman Malik, Adeel Anjum, Abid Khan, Gwanggil Jeon:
Cohort-based kernel principal component analysis with Multi-path Service Routing in Federated Learning. Future Gener. Comput. Syst. 149: 518-530 (2023) - [j68]Najam U. Saqib, Saif Ur Rehman Malik, Adeel Anjum, Madiha Haider Syed, Syed Atif Moqurrab, Gautam Srivastava, Jerry Chun-Wei Lin:
Preserving Privacy in Internet of Vehicles (IoV): A Novel Group-Leader-Based Shadowing Scheme Using Blockchain. IEEE Internet Things J. 10(24): 21421-21430 (2023) - [j67]Rabeeha Fazal, Razaullah Khan, Adeel Anjum, Madiha Haider Syed, Abid Khan, Semeen Rehman:
Improved angelization technique against background knowledge attack for 1:M microdata. PeerJ Comput. Sci. 9: e1255 (2023) - [j66]Syed Atif Moqurrab, Adeel Anjum, Noshina Tariq, Gautam Srivastava:
Instant_Anonymity: A Lightweight Semantic Privacy Guarantee for 5G-Enabled IIoT. IEEE Trans. Ind. Informatics 19(1): 951-959 (2023) - 2022
- [j65]Awais Abdul Khaliq, Adeel Anjum, Abdul Basit Ajmal, Julian L. Webber, Abolfazl Mehbodniya, Shawal Khan:
A Secure and Privacy Preserved Parking Recommender System Using Elliptic Curve Cryptography and Local Differential Privacy. IEEE Access 10: 56410-56426 (2022) - [j64]Syed Atif Moqurrab, Adeel Anjum, Noshina Tariq, Gautam Srivastava:
An efficient framework for semantically-correlated term detection and sanitization in clinical documents. Comput. Electr. Eng. 100: 107985 (2022) - [j63]Saif Ur Rehman Malik, Adeel Anjum, Syed Atif Moqurrab, Gautam Srivastava:
Towards enhanced threat modelling and analysis using a Markov Decision Process. Comput. Commun. 194: 282-291 (2022) - [j62]Razaullah Khan, Xiaofeng Tao, Adeel Anjum, Saif Ur Rehman Malik, Shui Yu, Abid Khan, Waheed ur Rehman, Hassan Malik:
(τ, m)-slicedBucket privacy model for sequential anonymization for improving privacy and utility. Trans. Emerg. Telecommun. Technol. 33(6) (2022) - [j61]Zineddine Kouahla, Ala-Eddine Benrazek, Mohamed Amine Ferrag, Brahim Farou, Hamid Seridi, Muhammet Kurulay, Adeel Anjum, Alia Asheralieva:
A Survey on Big IoT Data Indexing: Potential Solutions, Recent Advancements, and Open Issues. Future Internet 14(1): 19 (2022) - [j60]Tehsin Kanwal, Syed Atif Moqurrab, Adeel Anjum, Abid Khan, Joel J. P. C. Rodrigues, Gwanggil Jeon:
Formal verification and complexity analysis of confidentiality aware textual clinical documents framework. Int. J. Intell. Syst. 37(12): 10380-10399 (2022) - [j59]Hasina Attaullah, Tehsin Kanwal, Adeel Anjum, Ghufran Ahmed, Suleman Khan, Danda B. Rawat, Rizwan Khan:
Fuzzy-Logic-Based Privacy-Aware Dynamic Release of IoT-Enabled Healthcare Data. IEEE Internet Things J. 9(6): 4411-4420 (2022) - [j58]Waseeqa Ghazanfer, Noman Nasir Minhas, Muhammad Rauf, Adeel Anjum:
iTrace: When IOTA Meets COVID-19 Contact Tracing. IT Prof. 24(1): 56-62 (2022) - [j57]Aqsa Ayub, Muhammad Rizwan, Shivanshu Shrivastava, Adeel Anjum, Pelin Angin, Yigit Sever:
Securely Offloading Computation to the Edge with the Tangle Cache. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(4): 40-60 (2022) - [j56]Saira Beg, Saif Ur Rehman Khan, Adeel Anjum:
Data usage-based privacy and security issues in mobile app recommendation (MAR): a systematic literature review. Libr. Hi Tech 40(3): 725-749 (2022) - [j55]Saira Beg, Faisal Baig, Yousaf Hameed, Adeel Anjum, Ahmed Khan:
Thermal image encryption based on laser diode feedback and 2D logistic chaotic map. Multim. Tools Appl. 81(18): 26403-26423 (2022) - [j54]Mazzamal Aslam, Saira Beg, Adeel Anjum, Zakria Qadir, Shawal Khan, Saif Ur Rehman Malik, M. A. Parvez Mahmud:
A strong construction of S-box using Mandelbrot set an image encryption scheme. PeerJ Comput. Sci. 8: e892 (2022) - [j53]Ayesha Shaukat, Adeel Anjum, Saif Ur Rehman Malik, Munam Ali Shah, Carsten Maple:
A Novel Privacy Paradigm for Improving Serial Data Privacy. Sensors 22(7): 2811 (2022) - [j52]Syed Atif Moqurrab, Adeel Anjum, Abid Khan, Mansoor Ahmed, Awais Ahmad, Gwanggil Jeon:
Deep-Confidentiality: An IoT-Enabled Privacy-Preserving Framework for Unstructured Big Biomedical Data. ACM Trans. Internet Techn. 22(2): 42:1-42:21 (2022) - [j51]Syed Atif Moqurrab, Noshina Tariq, Adeel Anjum, Alia Asheralieva, Saif Ur Rehman Malik, Hassan Malik, Haris Pervaiz, Sukhpal Singh Gill:
A Deep Learning-Based Privacy-Preserving Model for Smart Healthcare in Internet of Medical Things Using Fog Computing. Wirel. Pers. Commun. 126(3): 2379-2401 (2022) - 2021
- [j50]Shawal Khan, Shahzad Khan, Mahdi Zareei, Faisal S. Alanazi, Nazri Kama, Masoom Alam, Adeel Anjum:
ABKS-PBM: Attribute-Based Keyword Search With Partial Bilinear Map. IEEE Access 9: 46313-46324 (2021) - [j49]Saira Beg, Adeel Anjum, Mansoor Ahmed, Saif Ur Rehman Malik, Hassan Malik, Navuday Sharma, Omer Waqar:
Dynamic Parameters-Based Reversible Data Transform (RDT) Algorithm in Recommendation System. IEEE Access 9: 110011-110025 (2021) - [j48]Hayat Mohammad Khan, Abid Khan, Farhana Jabeen, Adeel Anjum, Gwanggil Jeon:
Fog-enabled secure multiparty computation based aggregation scheme in smart grid. Comput. Electr. Eng. 94: 107358 (2021) - [j47]Tehsin Kanwal, Adeel Anjum, Abid Khan:
Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities. Clust. Comput. 24(1): 293-317 (2021) - [j46]Tehsin Kanwal, Adeel Anjum, Saif Ur Rehman Malik, Sajjad Haider, Abid Khan, Umar Manzoor, Alia Asheralieva:
A robust privacy preserving approach for electronic health records using multiple dataset with multiple sensitive attributes. Comput. Secur. 105: 102224 (2021) - [j45]Tehsin Kanwal, Adeel Anjum, Saif Ur Rehman Malik, Abid Khan, Muazzam Ali Khan Khattak:
Privacy preservation of electronic health records with adversarial attacks identification in hybrid cloud. Comput. Stand. Interfaces 78: 103522 (2021) - [j44]Tehsin Kanwal, Adeel Anjum, Abid Khan, Alia Asheralieva, Gwanggil Jeon:
A formal adversarial perspective: Secure and efficient electronic health records collection scheme for multi-records datasets. Trans. Emerg. Telecommun. Technol. 32(8) (2021) - [j43]Muhammad Shahbaz Khan, Adeel Anjum, Tanzila Saba, Amjad Rehman, Usman Tariq:
Improved Generalization for Secure Personal Data Publishing Using Deviation. IT Prof. 23(2): 75-80 (2021) - [j42]Saira Beg, Adeel Anjum, Mansoor Ahmad, Shahid Hussain, Ghufran Ahmad, Suleman Khan, Kim-Kwang Raymond Choo:
A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS). J. Netw. Comput. Appl. 174: 102874 (2021) - [j41]M. Abrar, Behjat Zuhaira, Adeel Anjum:
Privacy-preserving data collection for 1: M dataset. Multim. Tools Appl. 80(20): 31335-31356 (2021) - [j40]Ahmad Ali, Mansoor Ahmed, Abid Khan, Adeel Anjum, Muhammad Ilyas, Markus Helfert:
VisTAS: blockchain-based visible and trusted remote authentication system. PeerJ Comput. Sci. 7: e516 (2021) - [j39]Mansoor Ahmed, Kainat Ansar, Cal B. Muckley, Abid Khan, Adeel Anjum, Muhammad Talha:
A semantic rule based digital fraud detection. PeerJ Comput. Sci. 7: e649 (2021) - [j38]Hasina Attaullah, Adeel Anjum, Tehsin Kanwal, Saif Ur Rehman Malik, Alia Asheralieva, Hassan Malik, Ahmed Zoha, Kamran Arshad, Muhammad Ali Imran:
F-Classify: Fuzzy Rule Based Classification Method for Privacy Preservation of Multiple Sensitive Attributes. Sensors 21(14): 4933 (2021) - [j37]Faheem Zafar, Abid Khan, Saif Ur Rehman Malik, Mansoor Ahmed, Carsten Maple, Adeel Anjum:
MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus. Sensors 21(15): 5096 (2021) - [j36]Saeed Akbar, Saif Ur Rehman Malik, Kim-Kwang Raymond Choo, Samee U. Khan, Naveed Ahmad, Adeel Anjum:
A Game-based Thermal-Aware Resource Allocation Strategy for Data Centers. IEEE Trans. Cloud Comput. 9(3): 845-853 (2021) - [j35]Syed Atif Moqurrab, Umair Ayub, Adeel Anjum, Sohail Asghar, Gautam Srivastava:
An Accurate Deep Learning Model for Clinical Entity Recognition From Clinical Notes. IEEE J. Biomed. Health Informatics 25(10): 3804-3811 (2021) - [c6]Muhammad Rizwan, Muhammad Noman Sohail, Alia Asheralieva, Adeel Anjum, Pelin Angin:
SAID: ECC-Based Secure Authentication and Incentive Distribution Mechanism for Blockchain-Enabled Data Sharing System. Blockchain 2021: 530-537 - [c5]Maryam Jadoon, Adeel Anjum:
Differentiation of bacterial and viral pneumonia in children under five using deep learning. UCC Companion 2021: 32:1-32:6 - 2020
- [j34]Junaid Haseeb, Naveed Ahmad, Saif Ur Rehman Malik, Adeel Anjum:
Application of formal methods to modelling and analysis aspects of business process reengineering. Bus. Process. Manag. J. 26(2): 548-569 (2020) - [j33]Celestine Iwendi, Syed Atif Moqurrab, Adeel Anjum, Sangeen Khan, Senthilkumar Mohan, Gautam Srivastava:
N-Sanitization: A semantic privacy-preserving framework for unstructured medical datasets. Comput. Commun. 161: 160-171 (2020) - [j32]Idrees Ahmed, Abid Khan, Adeel Anjum, Mansoor Ahmed, Muhammad Asif Habib:
A Secure Provenance Scheme for Detecting Consecutive Colluding Users in Distributed Networks. Int. J. Parallel Program. 48(2): 344-366 (2020) - [j31]Iqra Fatima, Adeel Anjum, Saif Ur Rehman Malik, Naveed Ahmad:
Cyber Physical Systems and IoT: Architectural Practices, Interoperability, and Transformation. IT Prof. 22(3): 46-54 (2020) - [j30]Muhammad Aizad Fayyaz, Adeel Anjum, Sheikh Ziauddin, Ahmed Khan, Aaliya Sarfaraz:
An improved surveillance video forgery detection technique using sensor pattern noise and correlation of noise residues. Multim. Tools Appl. 79(9-10): 5767-5788 (2020) - [j29]Saira Beg, Naveed Ahmad, Adeel Anjum, Mansoor Ahmad, Abid Khan, Faisal Baig, Ahmed Khan:
S-box design based on optimize LFT parameter selection: a practical approach in recommendation system domain. Multim. Tools Appl. 79(17-18): 11667-11684 (2020) - [j28]Sidra Aslam, Mansoor Ahmed, Imran Ahmed, Abid Khan, Awais Ahmad, Muhammad Imran, Adeel Anjum, Shahid Hussain:
OBAC: towards agent-based identification and classification of roles, objects, permissions (ROP) in distributed environment. Multim. Tools Appl. 79(45-46): 34363-34384 (2020) - [j27]Razaullah Khan, Xiaofeng Tao, Adeel Anjum, Sajjad Haider, Saif Ur Rehman Malik, Abid Khan, Fatemeh Amiri:
Privacy Preserving for Multiple Sensitive Attributes against Fingerprint Correlation Attack Satisfying c-Diversity. Wirel. Commun. Mob. Comput. 2020: 8416823:1-8416823:18 (2020) - [i1]Faheem Zafar, Abid Khan, Saif Ur Rehman Malik, Adeel Anjum, Mansoor Ahmed:
MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus. CoRR abs/2011.08538 (2020)
2010 – 2019
- 2019
- [j26]Muhammad Hammad Waseem, Malik Sajjad Ahmed Nadeem, Assad Abbas, Aliya Shaheen, Wajid Aziz, Adeel Anjum, Umar Manzoor, Muhammad A. Balubaid, Seong-O Shim:
On the Feature Selection Methods and Reject Option Classifiers for Robust Cancer Prediction. IEEE Access 7: 141072-141082 (2019) - [j25]Malik Najmus Saqib, Junaid Kiani, Basit Shahzad, Adeel Anjum, Saif Ur Rehman Malik, Naveed Ahmad, Atta ur Rehman Khan:
Anonymous and formally verified dual signature based online e-voting protocol. Clust. Comput. 22(Suppl 1): 1703-1716 (2019) - [j24]Zineddine Kouahla, Adeel Anjum, Sheeraz Akram, Tanzila Saba, José Martinez:
XM-tree: data driven computational model by using metric extended nodes with non-overlapping in high-dimensional metric spaces. Comput. Math. Organ. Theory 25(2): 196-223 (2019) - [j23]Sajjad Haider, Tehsin Kanwal, Adeel Anjum, Saif Ur Rehman Malik, Ahmed Khan, Abid Khan, Umar Manzoor:
An efficient privacy preserving protocol for dynamic continuous data collection. Comput. Secur. 86: 358-371 (2019) - [j22]Muhammad Waqas, Saif Ur Rehman Malik, Saeed Akbar, Adeel Anjum, Naveed Ahmad:
Convergence time analysis of OSPF routing protocol using social network metrics. Future Gener. Comput. Syst. 94: 62-71 (2019) - [j21]Muhammad Naeem Shehzad, Qaisar Bashir, Ghufran Ahmad, Adeel Anjum, Muhammad Naeem Awais, Umar Manzoor, Zeeshan Azmat Shaikh, Muhammad A. Balubaid, Tanzila Saba:
Thermal-aware resource allocation in earliest deadline first using fluid scheduling. Int. J. Distributed Sens. Networks 15(3) (2019) - [j20]Tehsin Kanwal, Ather Abdul Jabbar, Adeel Anjum, Saif Ur Rehman Malik, Abid Khan, Naveed Ahmad, Umar Manzoor, Muhammad Naeem Shehzad, Muhammad A. Balubaid:
Privacy-aware relationship semantics-based XACML access control model for electronic health records in hybrid cloud. Int. J. Distributed Sens. Networks 15(6) (2019) - [j19]Tehsin Kanwal, Sayed Ali Asjad Shaukat, Adeel Anjum, Saif Ur Rehman Malik, Kim-Kwang Raymond Choo, Abid Khan, Naveed Ahmad, Mansoor Ahmad, Samee U. Khan:
Privacy-preserving model and generalization correlation attacks for 1: M data with multiple sensitive attributes. Inf. Sci. 488: 238-256 (2019) - [j18]Amjad Rehman, Tanzila Saba, Toqeer Mahmood, Zahid Mehmood, Mohsin Shah, Adeel Anjum:
Data hiding technique in steganography for information security using number theory. J. Inf. Sci. 45(6) (2019) - [j17]Basit Raza, Asma Sher, Sana Afzal, Ahmad Kamran Malik, Adeel Anjum, Yogan Jaya Kumar, Muhammad Faheem:
Autonomic workload performance tuning in large-scale data repositories. Knowl. Inf. Syst. 61(1): 27-63 (2019) - 2018
- [j16]Sunnia Amjad, Naveed Ahmad, Tanzila Saba, Adeel Anjum, Umar Manzoor, Muhammad A. Balubaid, Saif Ur Rehman Malik:
Calculating Completeness of Agile Scope in Scaled Agile Development. IEEE Access 6: 5822-5847 (2018) - [j15]Saba Yaseen, Syed M. Ali Abbas, Adeel Anjum, Tanzila Saba, Abid Khan, Saif Ur Rehman Malik, Naveed Ahmad, Basit Shahzad, Ali Kashif Bashir:
Improved Generalization for Secure Data Publishing. IEEE Access 6: 27156-27165 (2018) - [j14]Adeel Anjum, Saif Ur Rehman Malik, Kim-Kwang Raymond Choo, Abid Khan, Asma Haroon, Sangeen Khan, Samee U. Khan, Naveed Ahmad, Basit Raza:
An efficient privacy mechanism for electronic health records. Comput. Secur. 72: 196-211 (2018) - [j13]Fuzel Jamil, Abid Khan, Adeel Anjum, Mansoor Ahmed, Farhana Jabeen, Nadeem Javaid:
Secure provenance using an authenticated data structure approach. Comput. Secur. 73: 34-56 (2018) - [j12]Basit Raza, Yogan Jaya Kumar, Ahmad Kamran Malik, Adeel Anjum, Muhammad Faheem:
Performance prediction and adaptation for database management system workload using Case-Based Reasoning approach. Inf. Syst. 76: 46-58 (2018) - [j11]Zineddine Kouahla, Adeel Anjum, Hamid Seridi:
Indexing through separable partitioning for complex data sharing in P2P systems. J. Intell. Fuzzy Syst. 35(6): 6469-6478 (2018) - [j10]Basharat Mahmood, Naveed Ahmad, Saif Ur Rehman Malik, Adeel Anjum, Saif ul Islam:
Power-efficient scheduling of parallel real-time tasks on performance asymmetric multicore processors. Sustain. Comput. Informatics Syst. 17: 81-95 (2018) - [j9]Rahmat Ullah, Naveed Ahmad, Saif Ur Rehman Malik, Saeed Akbar, Adeel Anjum:
Simulator for modeling, analysis, and visualizations of thermal status in data centers. Sustain. Comput. Informatics Syst. 19: 324-340 (2018) - [j8]Adeel Anjum, Naveed Ahmad, Saif Ur Rehman Malik, Samiya Zubair, Basit Shahzad:
An efficient approach for publishing microdata for multiple sensitive attributes. J. Supercomput. 74(10): 5127-5155 (2018) - [c4]Zineddine Kouahla, Adeel Anjum:
A Parallel Implementation of GHB Tree. CIIA 2018: 47-55 - 2017
- [j7]Behjat Zuhaira, Naveed Ahmad, Tanzila Saba, Junaid Haseeb, Saif Ur Rehman Malik, Umar Manzoor, Muhammad A. Balubaid, Adeel Anjum:
Identifying Deviations in Software Processes. IEEE Access 5: 20319-20332 (2017) - [j6]Adeel Aslam, Naveed Ahmad, Tanzila Saba, Abdulaziz S. Almazyad, Amjad Rehman, Adeel Anjum, Abid Khan:
Decision Support System for Risk Assessment and Management Strategies in Distributed Software Development. IEEE Access 5: 20349-20373 (2017) - [j5]Faheem Zafar, Abid Khan, Saif Ur Rehman Malik, Mansoor Ahmed, Adeel Anjum, Majid Iqbal Khan, Nadeem Javed, Masoom Alam, Fuzel Jamil:
A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends. Comput. Secur. 65: 29-49 (2017) - [j4]Adeel Anjum, Guillaume Raschia, Marc Gelgon, Abid Khan, Saif Ur Rehman Malik, Naveed Ahmad, Mansoor Ahmed, Sabah Suhail, Masoom Alam:
τ-safety: A privacy model for sequential publication with arbitrary updates. Comput. Secur. 66: 20-39 (2017) - [j3]Adeel Anjum, Guillaume Raschia:
BangA: An Efficient and Flexible Generalization-Based Algorithm for Privacy Preserving Data Publication. Comput. 6(1): 1 (2017) - [j2]Faheem Zafar, Abid Khan, Sabah Suhail, Idrees Ahmed, Khizar Hameed, Hayat Mohammad Khan, Farhana Jabeen, Adeel Anjum:
Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes. J. Netw. Comput. Appl. 94: 50-68 (2017) - [j1]Masoom Alam, Saif Ur Rehman Malik, Qaisar Javed, Abid Khan, Shamaila Bisma Khan, Adeel Anjum, Nadeem Javed, Adnan Akhunzada, Muhammad Khurram Khan:
Formal modeling and verification of security controls for multimedia systems in the cloud. Multim. Tools Appl. 76(21): 22845-22870 (2017) - 2016
- [c3]Muhammad Aleem Taufiq, Nazia Hameed, Adeel Anjum, Fozia Hameed:
m-Skin Doctor: A Mobile Enabled System for Early Melanoma Skin Cancer Detection Using Support Vector Machine. eHealth 360° 2016: 468-475 - 2014
- [c2]Adeel Anjum, Adnan Anjum:
Differentially Private K-Anonymity. FIT 2014: 153-158 - 2013
- [b1]Adeel Anjum:
Towards Privacy-Preserving Publication of Continuous and Dynamic Data Spatial Indexing and Bucketization Approaches. (Publication de données qui préserve la vie privée pour des données continues et dynamiques: Les approches d'indexation spatiales et de bucketization). University of Nantes, France, 2013 - [c1]Adeel Anjum, Guillaume Raschia:
Anonymizing sequential releases under arbitrary updates. EDBT/ICDT Workshops 2013: 145-154
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint