| Using augmented reality and deep learning to enhance Taxila Museum experience MA Khan, S Israr, A S Almogren, IU Din, A Almogren, JJPC Rodrigues Journal of Real-Time Image Processing 18 (2), 321-332, 2021 | 96 | 2021 |
| Machine Learning-Based Detection of Spam Emails ZB Siddique, MA Khan, IU Din, A Almogren, I Mohiuddin, S Nazir Scientific Programming 2021, 2021 | 69 | 2021 |
| A Survey of Authentication in Internet of Things-Enabled Healthcare Systems MA Khan, IU Din, T Majali, BS Kim Sensors 22 (23), 9089, 2022 | 52 | 2022 |
| Visualization of Remote Patient Monitoring System Based on Internet of Medical Things MA Khan, IU Din, BS Kim, A Almogren Sustainability 15 (10), 8120, 2023 | 47 | 2023 |
| Doodle-based authentication technique using augmented reality W Wazir, HA Khattak, A Almogren, MA Khan, IU Din IEEE Access 8, 4022-4034, 2020 | 39 | 2020 |
| G-RAT| a novel graphical randomized authentication technique for consumer smart devices MA Khan, IU Din, SU Jadoon, MK Khan, M Guizani, KA Awan IEEE Transactions on Consumer Electronics 65 (2), 215-223, 2019 | 36 | 2019 |
| GRA-PIN: A Graphical and PIN-Based Hybrid Authentication Approach for Smart Devices N Kausar, IU Din, MA Khan, A Almogren, BS Kim Sensors 22 (4), 1349, 2022 | 28 | 2022 |
| Pakistan and cyber crimes: Problems and preventions S Ullah, M Amir, M Khan, H Asmat, K Habib 2015 First International Conference on Anti-Cybercrime (ICACC), 1-6, 2015 | 17 | 2015 |
| Securing Access to Internet of Medical Things Using a Graphical-Password-Based User Authentication Scheme MA Khan, IU Din, A Almogren Sustainability 15 (6), 5207, 2023 | 16 | 2023 |
| Hybrid CNN-LSTM Model for DDoS Attack Detection in Internet of Things-based Healthcare Industry 5.0 Z Ullah, F Arif, QMU Haq, NA Khan, IU Din, A Almogren, MA Khan, ... IEEE Internet of Things Journal, 2025 | 10 | 2025 |
| A novel multi-frame super resolution algorithm for surveillance camera image reconstruction A Khan, MA Khan, F Obaid, S Jadoon, MA Khan, M Sikandar 2015 First International Conference on Anti-Cybercrime (ICACC), 1-6, 2015 | 8 | 2015 |
| Servers voice graphical authentication SS Hassan, S Ullah, S Afzal, MA Khan, MA Khan, H Akbar 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery …, 2015 | 7 | 2015 |
| Correlation between Triadic Closure and Homophily Formed over Location-Based Social Networks NA Khan, W Zhou, MA Khan, A Almogren, I Ud Din Scientific Programming 2021, 2021 | 6 | 2021 |
| Mauth: A fine-grained and user-centric permission delegation framework for web services M Alam, M Ali, Q Alam, T Ali, S Anwar, A Adnan, M Ali International Journal of Physical Sciences 6 (8), 2060-2071, 2011 | 6 | 2011 |
| Optimized selection sort algorithm for two dimensional array S Ullah, MA Khan, MA Khan, H Akbar, SS Hassan 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery …, 2015 | 4 | 2015 |
| Interpretable and Adaptive GAN-BiLSTM Approach for Cyber Threat Detection in IoMT-based Healthcare 5.0 Z Ullah, F Arif, NA Khan, MA Khan, IU Din, A Almogren, A Altameem IEEE Journal of Biomedical and Health Informatics, 2025 | 3 | 2025 |
| Adaptive Generative AI for Elderly-Assisted Living Environments: A Proactive Approach MA Khan, IU Din, NA Khan, S Hassan, A Almogren 2024 7th International Conference on Internet Applications, Protocols, and …, 2024 | 2 | 2024 |
| Enhancing Hyperspectral Image Analysis with Deep Learning: An Innovative Hybrid Approach for Improved Detection and Classification using Deep-Detect Z Zulfiqar, Z Zulfiqar, NA Khan, MA Khan, IU Din, A Almogren, M Zareei, ... IEEE Access, 2024 | 2 | 2024 |
| Hybrid query by humming and metadata search system (HQMS) NA Khan, MA Khan, M Mushtaq Proceedings of the 8th International Conference on Frontiers of Information …, 2010 | 2 | 2010 |
| Investigating the Potential of AI-Driven Data Analytics for eARMS: A Survey-Based Research NA Khan, I Bashir, MA Khan, W Wazir, IU Din, S Hassan 2024 7th International Conference on Internet Applications, Protocols, and …, 2024 | | 2024 |