default search action
Tamleek Ali
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Muhammad Shoaib, Tamleek Ali Tanveer, Bahar Ali, Bashir Hayat, Anwar Shah:
Grid neighbourhood based three way clustering (3WC). Inf. Sci. 659: 120082 (2024) - 2023
- [j17]Muhammad Amin, Feras N. Al-Obeidat, Abdallah Tubaishat, Babar Shah, Sajid Anwar, Tamleek Ali Tanveer:
Cyber security and beyond: Detecting malware and concept drift in AI-based sensor data streams using statistical techniques. Comput. Electr. Eng. 108: 108702 (2023) - 2022
- [j16]Muhammad Amin, Babar Shah, Aizaz Sharif, Tamleek Ali, Ki-Il Kim, Sajid Anwar:
Android malware detection through generative adversarial networks. Trans. Emerg. Telecommun. Technol. 33(2) (2022) - [j15]Muhammad Amin, Duri Shehwar, Abrar Ullah, Teresa Guarda, Tamleek Ali Tanveer, Sajid Anwar:
A deep learning system for health care IoT and smartphone malware detection. Neural Comput. Appl. 34(14): 11283-11294 (2022) - 2021
- [j14]Salman Jan, Shahrulniza Musa, Toqeer Ali Syed, Mohammad Nauman, Sajid Anwar, Tamleek Ali Tanveer, Babar Shah:
Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models. Expert Syst. J. Knowl. Eng. 38(4) (2021) - 2020
- [j13]Muhammad Amin, Tamleek Ali Tanveer, Mohammad Tehseen, Murad Khan, Fakhri Alam Khan, Sajid Anwar:
Static malware detection and attribution in android byte-code through an end-to-end deep system. Future Gener. Comput. Syst. 102: 112-126 (2020) - [j12]Toqeer Ali Syed, Yasar Khan, Tamleek Ali, Safiullah Faizullah, Turki G. Alghamdi, Sajid Anwar:
An Automated Permission Selection Framework for Android Platform. J. Grid Comput. 18(3): 547-561 (2020)
2010 – 2019
- 2019
- [j11]Zahid Ullah, Imran Ahmed, Tamleek Ali, Naveed Ahmed, Fahim Niaz, Yue Cao:
Robust and Efficient Energy Harvested-Aware Routing Protocol With Clustering Approach in Body Area Networks. IEEE Access 7: 33906-33921 (2019) - [j10]Zahid Ullah, Imran Ahmed, Fakhri Alam Khan, Muhammad Asif, Muhammad Nawaz, Tamleek Ali, Muhammad Khalid, Fahim Niaz:
Energy-Efficient Harvested-Aware Clustering and Cooperative Routing Protocol for WBAN (E-HARP). IEEE Access 7: 100036-100050 (2019) - 2018
- [j9]Mohammad Nauman, Tamleek Ali Tanveer, Sohail Khan, Toqeer Ali Syed:
Deep neural architectures for large scale android malware analysis. Clust. Comput. 21(1): 569-588 (2018) - [j8]Muhammad Amin, Tamleek Ali Tanveer, Shakirullah Shah, Muhammad Abdullah, Muhammad Shafi:
DeepSIC: a deep model. Clust. Comput. 21(1): 741-754 (2018) - 2016
- [j7]Quratulain Alam, Saher Tabbasum, Saif Ur Rehman Malik, Masoom Alam, Tamleek Ali, Adnan Akhunzada, Samee Ullah Khan, Athanasios V. Vasilakos, Rajkumar Buyya:
Formal Verification of the xDAuth Protocol. IEEE Trans. Inf. Forensics Secur. 11(9): 1956-1969 (2016) - [c11]Toqeer Ali Syed, Jawad Ali, Tamleek Ali, Mohammad Nauman, Shahrulniza Musa:
Efficient, Scalable and Privacy Preserving Application Attestation in a Multi Stakeholder Scenario. ICCSA (4) 2016: 407-421 - 2013
- [j6]Tamleek Ali, Muazzam Ali Khan, Amir Hayat, Masoom Alam, Muhammad Ali:
Secure Actor Directed Localization in Wireless Sensor and Actor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j5]Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali, Muhammad Ali, Sajid Anwar, Quratulain Alam:
Behavioral Attestation for Web Services using access policies. Multim. Tools Appl. 66(2): 283-302 (2013) - [j4]Mohammad Nauman, Tamleek Ali, Azhar Rauf:
Using trusted computing for privacy preserving keystroke-based authentication in smartphones. Telecommun. Syst. 52(4): 2149-2161 (2013) - [c10]Toqeer Ali Syed, Tamleek Ali Tanveer, Roslan Ismail, Shahrulniza Musa:
End to End Verification Mechanism for Dynamic Behavior Attestation. ICISA 2013: 1-4 - 2012
- [j3]Hammad Banuri, Masoom Alam, Shahryar Khan, Jawad Manzoor, Bahar Ali, Yasar Khan, Mohsin Yaseen, Mir Nauman Tahir, Tamleek Ali, Quratulain Alam, Xinwen Zhang:
An Android runtime security policy enforcement framework. Pers. Ubiquitous Comput. 16(6): 631-641 (2012) - [j2]Masoom Alam, Tamleek Ali, Sanaullah Khan, Shahbaz Khan, Muhammad Ali, Mohammad Nauman, Amir Hayat, Muhammad Khurram Khan, Khaled Alghathbar:
Analysis of existing remote attestation techniques. Secur. Commun. Networks 5(9): 1062-1082 (2012) - 2010
- [j1]Masoom Alam, Mohammad Nauman, Xinwen Zhang, Tamleek Ali, Patrick C. K. Hung:
Behavioral Attestation for Web Services Based Business Processes. Int. J. Web Serv. Res. 7(3): 52-72 (2010) - [c9]Muhammad Asad Khan, Tamleek Ali, Muhammad Irfan, Khurram Ali Shah, Farhan Ali:
A novel grid middleware architecture. FIT 2010: 29 - [c8]Tamleek Ali, Mohammad Nauman, Xinwen Zhang:
On Leveraging Stochastic Models for Remote Attestation. INTRUST 2010: 290-301 - [c7]Mohammad Nauman, Tamleek Ali:
TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones. ISA 2010: 286-297
2000 – 2009
- 2009
- [c6]Shahbaz Khan, Sanaullah Khan, Mohammad Nauman, Tamleek Ali, Masoom Alam:
Realizing dynamic behavior attestation for mobile platforms. FIT 2009: 5:1-5:6 - [c5]Masoom Alam, Mohammad Nauman, Xinwen Zhang, Tamleek Ali, Patrick C. K. Hung:
Behavioral Attestation for Business Processes. ICWS 2009: 343-350 - [c4]Tamleek Ali Tanveer, Masoom Alam, Mohammad Nauman:
Scalable Remote Attestation with Privacy Protection. INTRUST 2009: 73-87 - [c3]Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamleek Ali:
Remote Attestation of Attribute Updates and Information Flows in a UCON System. TRUST 2009: 63-80 - 2008
- [c2]Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali, Jean-Pierre Seifert:
Model-based behavioral attestation. SACMAT 2008: 175-184 - [c1]Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali:
Behavioral attestation for web services (BA4WS). SWS 2008: 21-28
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint