Follow
Imdad Ullah
Imdad Ullah
USYD, UNSW Sydney AU, Data61| CSIRO
Verified email at sydney.edu.au
Title
Cited by
Cited by
Year
Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey
Z Shah, I Ullah, H Li, A Levula, K Khurshid
Sensors 22 (3), 1094, 2022
582022
Information leakage through mobile analytics services
T Chen, I Ullah, MA Kaafar, R Boreli
Proceedings of the 15th Workshop on Mobile Computing Systems and …, 2014
572014
DIEER: Delay-Intolerant Energy-Efficient Routing with Sink Mobility in Underwater Wireless Sensor Networks
K Latif, N Javaid, I Ullah, Z Kaleem, Z Abbas, LD Nguyen
Sensors 20 (12), 3467, 2020
382020
Characterising user targeting for in-app mobile ads
I Ullah, R Boreli, MA Kaafar, SS Kanhere
Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE Conference on …, 2014
332014
A review of airport dual energy X-ray baggage inspection techniques: image enhancement and noise reduction
SU Khan, IU Khan, I Ullah, N Saif, I Ullah
Journal of X-Ray Science and Technology, 1-25, 2020
282020
Smart Cybersecurity Framework for IoT-Empowered Drones: Machine Learning Perspective
A Aldaej, TA Ahanger, M Atiquzzaman, I Ullah, M Yousufudin
Sensors 22 (7), 2630, 2022
252022
Privacy in targeted advertising: a survey
I Ullah, R Boreli, SS Kanhere
International Journal of Information Security, 2022
242022
A novel IoT–fog–cloud-based healthcare system for monitoring and predicting COVID-19 outspread
AS Tariq Ahamed Ahanger, Usman Tariq, Muneer Nusir, Abdulaziz Aldaej, Imdad ...
The Journal of Supercomputing, 1-24, 2021
23*2021
Routing Protocols for Mobile Internet of Things (IoT): A Survey on Challenges and Solutions
Z Shah, A Levula, K Khurshid, J Ahmed, I Ullah, S Singh
Electronics 10 (19), 2320, 2021
232021
A Comprehensive Survey of Energy-Efficient MAC and Routing Protocols for Underwater Wireless Sensor Networks
ZU Khan, Q Gang, A Muhammad, M Muzzammil, SU Khan, ME Affendi, ...
Electronics 11 (19), 3015, 2022
162022
IoT-Inspired Framework of Intruder Detection for Smart Home Security Systems
TA Ahanger, U Tariq, A Ibrahim, I Ullah, Y Bouterra
Electronics 9 (9), 1361, 2020
162020
Profileguard: privacy preserving obfuscation for mobile user profiles
I Ullah, R Boreli, SS Kanhere, S Chawla
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 83-92, 2014
162014
Securing IoT-Empowered Fog Computing Systems: Machine Learning Perspective
TA Ahanger, U Tariq, A Ibrahim, I Ullah, Y Bouteraa, F Gebali
Mathematics 10 (8), 1298, 2022
142022
Privacy-preserving targeted mobile advertising: A blockchain-based framework for mobile ads
I Ullah, SS Kanhere, R Boreli
Journal of Network and Computer Applications, 103559, 2022
132022
ANFIS-inspired Smart Framework for Education Quality Assessment
TA Ahanger, U Tariq, A Ibrahim, I Ullah, Y Bouteraa
IEEE Access, 2020
122020
Transmissions failures and load-balanced routing metric for Wireless Mesh Networks
I Ullah, K Sattar, ZU Qamar, W Sami, A Ali
High Capacity Optical Networks and Enabling Technologies (HONET), 2011, 159-163, 2011
122011
Privacy in targeted advertising on mobile devices: a survey
I Ullah, R Boreli, SS Kanhere
International Journal of Information Security, 1-32, 2022
102022
Enabling Privacy Preserving Mobile Advertising via Private Information Retrieval
I Ullah, BG Sarwar, R Boreli, SS Kanhere, S Katzenbeisser, M Hollick
2017 IEEE 42nd Conference on Local Computer Networks (LCN), 347-355, 2017
102017
An Effective Self-Configurable Ransomware Prevention Technique for IoMT
U Tariq, I Ullah, M Yousuf Uddin, SJ Kwon
Sensors 22 (21), 8516, 2022
92022
Effect of transmission opportunity and frame aggregation on VoIP capacity over IEEE 802.11 n WLANs
Z Shah, A Suleman, I Ullah, A Baig
Signal Processing and Communication Systems (ICSPCS), 2014 8th International …, 2014
92014
The system can't perform the operation now. Try again later.
Articles 1–20