Diagonal and vertical routing protocol for underwater wireless sensor network T Ali, LT Jung, I Faye Procedia-Social and Behavioral Sciences 129, 372-379, 2014 | 222 | 2014 |
Systematic literature review of challenges in blockchain scalability D Khan, LT Jung, MA Hashmani Applied Sciences 11 (20), 9372, 2021 | 157 | 2021 |
An analytical model to minimize the latency in healthcare internet-of-things in fog computing environment S Shukla, MF Hassan, MK Khan, LT Jung, A Awang PloS one 14 (11), e0224934, 2019 | 103 | 2019 |
Enhancing energy efficiency of wireless sensor network through the design of energy efficient routing protocol N Zaman, L Tang Jung, MM Yasin Journal of Sensors 2016, 2016 | 98 | 2016 |
Temporary cluster based routing for underwater wireless sensor networks M Ayaz, A Abdullah, LT Jung 2010 International Symposium on Information Technology 2, 1009-1014, 2010 | 76 | 2010 |
Semantic-k-NN algorithm: An enhanced version of traditional k-NN algorithm M Ali, LT Jung, AH Abdel-Aty, MY Abubakar, M Elhoseny, I Ali Expert Systems with Applications 151, 113374, 2020 | 69 | 2020 |
Proposing a data privacy aware protocol for roadside accident video reporting service using 5G in Vehicular Cloud Networks Environment ZA Almusaylim, N Zaman, LT Jung 2018 4th International conference on computer and information sciences …, 2018 | 68 | 2018 |
End-to-end delay and energy efficient routing protocol for underwater wireless sensor networks T Ali, LT Jung, I Faye Wireless Personal Communications 79, 339-361, 2014 | 68 | 2014 |
Energy, traffic load, and link quality aware ad hoc routing protocol for wireless sensor network based smart metering infrastructure H Farooq, L Tang Jung International Journal of Distributed Sensor Networks 9 (8), 597582, 2013 | 53 | 2013 |
K-NN classifier for data confidentiality in cloud computing MA Zardari, LT Jung, N Zakaria 2014 International Conference on Computer and Information Sciences (ICCOINS …, 2014 | 52 | 2014 |
From DNA to protein: Why genetic code context of nucleotides for DNA signal processing? A review M Ahmad, LT Jung, AA Bhuiyan Biomedical Signal Processing and Control 34, 44-63, 2017 | 50 | 2017 |
Malicious web page detection: A machine learning approach A Sirageldin, BB Baharudin, LT Jung Advances in Computer Science and its Applications: CSA 2013, 217-224, 2014 | 43 | 2014 |
Security framework for low latency VANET applications AA Wagan, LT Jung 2014 international conference on computer and information sciences (ICCOINS …, 2014 | 41 | 2014 |
SMTrust: Proposing trust-based secure routing protocol for RPL attacks for IoT applications SM Muzammal, RK Murugesan, NZ Jhanjhi, LT Jung 2020 International Conference on Computational Intelligence (ICCI), 305-310, 2020 | 40 | 2020 |
Choices available for implementing smart grid communication network H Farooq, LT Jung 2014 International Conference on Computer and Information Sciences (ICCOINS …, 2014 | 40 | 2014 |
Adaptive and priority-based resource allocation for efficient resources utilization in mobile-edge computing Z Sharif, LT Jung, I Razzak, M Alazab IEEE Internet of Things Journal 10 (4), 3079-3093, 2021 | 39 | 2021 |
Flooding control by using angle based cone for UWSNs T Ali, LT Jung, S Ameer 2012 International Symposium on Telecommunication Technologies, 112-117, 2012 | 36 | 2012 |
A critical review of blockchain consensus model D Khan, LT Jung, MA Hashmani, A Waqas 2020 3rd international conference on computing, mathematics and engineering …, 2020 | 31 | 2020 |
Reliable data deliveries using packet optimization in multi-hop underwater sensor networks M Ayaz, LT Jung, A Abdullah, I Ahmad Journal of King Saud University-Computer and Information Sciences 24 (1), 41-48, 2012 | 28 | 2012 |
A Confidentiality-based data Classification-as-a-Service (C2aaS) for cloud security M Ali, LT Jung, AH Sodhro, AA Laghari, SB Belhaouari, Z Gillani Alexandria Engineering Journal 64, 749-760, 2023 | 27 | 2023 |