Follow
Muhammad Tayyab, P.hD.
Muhammad Tayyab, P.hD.
Lecturer, Taylor's University, Lake-Side Campus, Subang Jaya, Malaysia
Verified email at taylors.edu.my - Homepage
Title
Cited by
Cited by
Year
Mobility Management Issues and Solutions in 5G-and-Beyond Networks: A Comprehensive Review
MUA Siddiqui, F Qamar, M Tayyab, MHDN Hindia, QN Nguyen, R Hassan
Electronics 11 (9), 1366, 2022
492022
Smart cities data: Framework, applications, and challenges
M Bilal, RSA Usmani, M Tayyab, AA Mahmoud, RM Abdalla, M Marjani, ...
Handbook of smart cities, 1-29, 2020
352020
A comprehensive review on deep learning algorithms: Security and privacy issues
M Tayyab, M Marjani, NZ Jhanjhi, IAT Hashem, RSA Usmani, F Qamar
Computers & Security, 103297, 2023
182023
Role of ICT for community in education during COVID-19
RSA Usmani, A Saeed, M Tayyab
ICT Solutions for Improving Smart Communities in Asia, 125-150, 2021
172021
Predicting helpfulness of crowd-sourced reviews: A survey
M Bilal, M Marjani, IAT Hashem, AM Abdullahi, M Tayyab, A Gani
2019 13th International Conference on Mathematics, Actuarial Science …, 2019
152019
Cryptographic Based Secure Model on Dataset for Deep Learning Algorithms
M Tayyab, M Marjani, NZ Jhanjhi, IAT Hashim, AA Almazroi, AA Almazroi
CMC-COMPUTERS MATERIALS & CONTINUA 69 (1), 1183-1200, 2021
102021
Machine learning-based wearable devices for smart healthcare application with risk factor monitoring
SA Alex, S Ponkamali, TR Andrew, NZ Jhanjhi, M Tayyab
Empowering Sustainable Industrial 4.0 Systems With Machine Intelligence, 174-185, 2022
82022
A light-weight watermarking-based framework on dataset using deep learning algorithms
M Tayyab, M Marjani, NZ Jhanjhi, IAT Hashem
2021 National Computing Colleges Conference (NCCC), 1-6, 2021
82021
Secure provenance in wireless sensor networks-a survey of provenance schemes
K Hameed, J Haseeb, M Tayyab, M Junaid, TB Maqsood, MH Naqvi
2017 International Conference on Communication, Computing and Digital …, 2017
82017
Introducing Time based Competitive Advantage in IT Sector with Simulation
R Maryam, A Naseem, J Haseeb, K Hameed, M Tayyab, B Shahzaad
International Journal Of Advanced Computer Science And Applications 8 (7 …, 2017
22017
A WATERMARK-BASED SECURE MODEL FOR DATA SECURITY AGAINST SECURITY ATTACKS FOR MACHINE LEARNING ALGORITHMS
M TAYYAB, M MARJANI, NZ JHANJHI, IAT HASHEM, RSA USMANI
Journal of Engineering Science and Technology 17 (1), 24-37, 2022
12022
ODSA: A Novel Ordering Divisional Scheduling Algorithm for Modern Operating Systems
J Haseeb, K Hameed, M Junaid, M Tayyab, S Rehman, AMM Khan
International Journal of Advanced Computer Science and Applications 8 (7 …, 2017
12017
Digital Safeguards: Navigating Cyber Threats in the Logistics Industry Framework
M Tayyab, K Hameed, NZ Jhanjhi, A Zaheer, F Qamar
Navigating Cyber Threats and Cybersecurity in the Logistics Industry, 258-299, 2024
2024
Swarm Security: Tackling Threats in the Age of Drone Swarms
M Tayyab, M Mumtaz, SM Muzammal, NZ Jhanjhi
Cybersecurity Issues and Challenges in the Drone Industry, 324-342, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–14