default search action
Asad Ali
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Asad Ali 0001 — King's College London, UK
- Asad Ali 0002 — University of Kent, School of Engineering and Digital Arts, Canterbury, UK
- Asad Ali 0003 — National University of Sciences and Technology, School of EE and CS, Pakistan
- Asad Ali 0004 — Hazara University, Department of Mathematics, Mansehra, Pakistan
- Muhammad Asad Ali (aka: Asad Ali 0005) — University of Tokyo, Japan
- Asad Ali 0006 — University of Salerno, Fisciano, Italy
- Asad Ali 0007 — University of Dublin, Trinity College, School of Computer Science and Statistics, Ireland
- Asad Ali 0008 — Tampere University, Finland (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Nan Zhang, Asad Ali, Abrar Hussain, Kifayat Ullah, Shi Yin:
Decision Algorithm for Interval Valued Intuitionistic Fuzzy Heronian Mean Aggregation Operators Based on Aczel Alsina T-Norm. IEEE Access 12: 55302-55325 (2024) - [j23]Zheng-Shao Chen, R. Vaitheeshwari, Eric Hsiao-Kuang Wu, Ying-Dar Lin, Ren-Hung Hwang, Po-Ching Lin, Yuan-Cheng Lai, Asad Ali:
Clustering APT Groups Through Cyber Threat Intelligence by Weighted Similarity Measurement. IEEE Access 12: 141851-141865 (2024) - [j22]Asad Ali, Minhajul Islam, Tushin Mallick, Mohammad Sakibul Islam, Sadman Sakib, Md. Shohrab Hossain, Ying-Dar Lin:
3GPP Edge-Fog federation: Transparent 3rd-party authentication and application mobility. Comput. Commun. 222: 220-229 (2024) - [j21]Shengshan Chen, Ren-Hung Hwang, Asad Ali, Ying-Dar Lin, Yu-Chih Wei, Tun-Wen Pai:
Improving quality of indicators of compromise using STIX graphs. Comput. Secur. 144: 103972 (2024) - [j20]Asad Ali, Syed Adeel Ali Shah, Tamara Al Shloul, Muhammad Assam, Yazeed Yasin Ghadi, Sangsoon Lim, Ahmad Zia:
Multiobjective Harris Hawks Optimization-Based Task Scheduling in Cloud-Fog Computing. IEEE Internet Things J. 11(13): 24334-24352 (2024) - [j19]Asad Ali, Ying-Dar Lin, Jian Liu, Chin-Tser Huang:
The universal federator: A third-party authentication solution to federated cloud, edge, and fog. J. Netw. Comput. Appl. 229: 103922 (2024) - [j18]Adeel Ahmad, Jianhua Gong, Akhter Rasheed, Saqib Hussain, Asad Ali, Zeinebou Cheikh:
Sharp Results for a New Class of Analytic Functions Associated with the q-Differential Operator and the Symmetric Balloon-Shaped Domain. Symmetry 16(9): 1134 (2024) - [j17]Asad Ali, Ying-Dar Lin, Chi-Yu Li, Yuan-Cheng Lai:
Transparent Third-Party Authentication With Application Mobility for 5G Mobile-Edge Computing. IEEE Trans. Netw. Serv. Manag. 21(1): 1142-1157 (2024) - [c12]Abdul Aziz, Zafar Ali, Guilin Qi, Yi Huang, Pavlos Kefalas, Aminullah, Asad Ali:
Leverage Diagnosis Intensity in Medication Recommendations. ICIC (LNAI 6) 2024: 38-50 - [c11]Sijjad Ali, Jia Wang, Victor Chung Ming Leung, Asad Ali:
Decentralized Ransomware Recovery Network: Enhancing Resilience and Security Through Secret Sharing Schemes. IoTBDS 2024: 294-301 - [c10]Muhammad Uzair, Sijjad Ali, Asad Ali, Hamza Amir, Rana Zaki Abdul Bari, Hamid Sharif, Maryam Jamil, M. Hunza, Nabel Akram, Sharofiddin Allaberdiev:
Unlocking Antenna Performance: Harnessing the Power of the Hahn-Banach Theorem in Wireless Communication Systems. SIMULTECH 2024: 340-347 - 2023
- [j16]Binayak Kar, Widhi Yahya, Ying-Dar Lin, Asad Ali:
Offloading Using Traditional Optimization and Machine Learning in Federated Cloud-Edge-Fog Systems: A Survey. IEEE Commun. Surv. Tutorials 25(2): 1199-1226 (2023) - [j15]Huo Tang, Adeel Ahmad, Akhter Rasheed, Asad Ali, Saqib Hussain, Saima Noor:
Sharp Coefficient and Hankel Problems Related to a Symmetric Domain. Symmetry 15(10): 1865 (2023) - [j14]Asad Ali, Farhan Aadil, Muhammad Fahad Khan, Muazzam Maqsood, Sangsoon Lim:
Harris Hawks Optimization-Based Clustering Algorithm for Vehicular Ad-Hoc Networks. IEEE Trans. Intell. Transp. Syst. 24(6): 5822-5841 (2023) - [c9]Syed M. Fasih, Asad Ali, Talha Mabood, Atif Ullah, Muhammad Hanif, Waqar Ahmad:
Fruit Fly Detection and Classification in IoT Setup. ICCSA (Workshops 5) 2023: 593-607 - 2022
- [j13]Asad Ali, Samin Rahman Khan, Sadman Sakib, Md. Shohrab Hossain, Ying-Dar Lin:
Federated 3GPP Mobile Edge Computing Systems: A Transparent Proxy for Third Party Authentication With Application Mobility Support. IEEE Access 10: 35106-35119 (2022) - [j12]Swarnabha Roy, Tony Vo, Steven Hernandez, Austin Lehrmann, Asad Ali, Stavros Kalafatis:
IoT Security and Computation Management on a Multi-Robot System for Rescue Operations Based on a Cloud Framework. Sensors 22(15): 5569 (2022) - [c8]Asad Ali, Tushin Mallick, Sadman Sakib, Md. Shohrab Hossain, Ying-Dar Lin:
Provisioning Fog Services to 3GPP Subscribers: Authentication and Application Mobility. ICC 2022: 4926-4931 - [i4]Binayak Kar, Widhi Yahya, Ying-Dar Lin, Asad Ali:
A Survey on Offloading in Federated Cloud-Edge-Fog Systems with Traditional Optimization and Machine Learning. CoRR abs/2202.10628 (2022) - 2021
- [j11]Asad Ali, Yuefeng Liao:
Optimized Control for Modified Push-Pull Dual Active Bridge Converter to Achieve Wide ZVS Range and Low Current Stress. IEEE Access 9: 140258-140267 (2021) - [j10]Asad Ali, Ali Utkan Sahin, Öznur Özkasap, Ying-Dar Lin:
The Universal Fog Proxy: A Third-party Authentication Solution for Federated Fog Systems with Multiple Protocols. IEEE Netw. 35(6): 285-291 (2021) - [j9]Asad Ali, Anjum Naveed, Muhammad Zeeshan:
A dual model node based optimization algorithm for simultaneous escape routing in PCBs. PeerJ Comput. Sci. 7: e499 (2021) - [i3]Asad Ali, Tushin Mallick, Sadman Sakib, Md. Shohrab Hossain, Ying-Dar Lin:
Provisioning Fog Services to 3GPP Subscribers: Authentication and Application Mobility. CoRR abs/2112.02476 (2021) - [i2]Asad Ali, Samin Rahman Khan, Sadman Sakib, Md. Shohrab Hossain, Ying-Dar Lin:
Federated 3GPP Mobile Edge Computing Systems: A Transparent Proxy for Third Party Authentication with Application Mobility Support. CoRR abs/2112.08590 (2021) - 2020
- [j8]Asad Ali, Faisal Ahmed Khan:
Condition and location-aware channel switching scheme for multi-hop multi-band WLANs. Comput. Networks 168 (2020) - [j7]Ying-Dar Lin, Duc-Tai Truong, Asad Ali, Chi-Yu Li, Yuan-Cheng Lai, Thai-Mai Thi Dinh:
Proxy-Based Federated Authentication: A Transparent Third-Party Solution for Cloud-Edge Federation. IEEE Netw. 34(6): 220-227 (2020) - [c7]Asad Ali, Ying-Dar Lin, Chi-Yu Li, Yuan-Cheng Lai:
Transparent 3rd-Party Authentication with Application Mobility for 5G Mobile Edge Computing. EuCNC 2020: 219-224 - [c6]Asad Ali, Fatima Hussain, Rasheed Hussain, Adil Mehmood Khan, Alexander Ferworn:
Multi-Band Multi-Hop WLANs for Disaster Relief and Public Safety Applications. WCNC Workshops 2020: 1-6 - [i1]Marcus Venzke, Daniel Klisch, Philipp Kubik, Asad Ali, Jesper Dell Missier, Volker Turau:
Artificial Neural Networks for Sensor Data Classification on Small Embedded Systems. CoRR abs/2012.08403 (2020)
2010 – 2019
- 2019
- [j6]Noora Khalid, Saleem Ullah, Sheikh Saeed Ahmad, Asad Ali, Farrukh Chishtie:
A remotely sensed tracking of forest cover and associated temperature change in Margalla hills. Int. J. Digit. Earth 12(10): 1133-1150 (2019) - 2017
- [c5]Zohaib Aftab, Asad Ali:
Simulating a wearable lower-body exoskeleton device for torque and power estimation. Humanoids 2017: 412-417 - 2016
- [j5]Muhammad Zeeshan, Asad Ali, Anjum Naveed, Alex X. Liu, Ann L. Wang, Hassaan Khaliq Qureshi:
Modeling packet loss probability and busy time in multi-hop wireless networks. EURASIP J. Wirel. Commun. Netw. 2016: 168 (2016) - [j4]Petra Hanson, David Ko, Andrew Ko, Asad Ali, Sudhesh Kumar, Ian Spero, Thomas M. Barber:
Effects of computer-generated music on human physiological, metabolic and endocrine responses. Int. J. Creative Comput. 1(2/3/4): 308-329 (2016) - [j3]Farhan Aadil, Salabat Khan, Khalid Bashir Bajwa, Muhammad Fahad Khan, Asad Ali:
Intelligent Clustering in Vehicular ad hoc Networks. KSII Trans. Internet Inf. Syst. 10(8): 3512-3528 (2016) - 2015
- [c4]Asad Ali, Amna Sehar, Sana Najaf, Hafiz Muhammad Asif:
Customizable Transceiver Design of a Visible Light Communication System. FIT 2015: 138-143 - [c3]Asad Ali, Mohamad A. Eid:
An automated system for Accident Detection. I2MTC 2015: 1608-1612 - 2014
- [j2]Asad Ali, Kanza Ali:
Delay sensitive routing algorithm. J. High Speed Networks 20(4): 253-262 (2014) - [j1]Asad Ali, Kanza Ali, Aftab Ahmad Shaikh:
Energy and delay aware routing algorithm for fiber-wireless networks. Wirel. Networks 20(6): 1313-1320 (2014) - [c2]Muhammad Aslam, Ehsan Ullah Munir, Muhammad Bilal, Muhammad Asad, Asad Ali, Tauseef Shah, Syed Bilal:
HADCC: Hybrid Advanced Distributed and Centralized Clustering Path Planning Algorithm for WSNs. AINA 2014: 657-664 - 2013
- [c1]Abdul Rehman, Asad Ali, Riaz ul Amin, Syed Attique Shah:
VANET thread based message trust model. ICDIM 2013: 58-60
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint