Search Results - "Janjua, Muhammad Umar"

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Formal Modeling and Verification of a Blockchain-Based Crowdsourcing Consensus Protocol by Afzaal, Hamra, Imran, Muhammad, Janjua, Muhammad Umar, Gochhayat, Sarada Prasad

    Published in IEEE access (2022)
    “…Crowdsourcing is an effective technique that allows humans to solve complex problems that are hard to accomplish by automated tools. Some significant…”
    Get full text
    Journal Article
  2. 2

    Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique by Bukhari, Syeda Tayyaba, Janjua, Muhammad Umar, Qadir, Junaid

    “…Blockchain technology enables users to control and record their cryptocurrency transactions through the use of digital wallets. As the use of blockchain…”
    Get full text
    Journal Article
  3. 3

    Detailed analysis of Ethereum network on transaction behavior, community structure and link prediction by Said, Anwar, Janjua, Muhammad Umar, Hassan, Saeed-Ul, Muzammal, Zeeshan, Saleem, Tania, Thaipisutikul, Tipajin, Tuarob, Suppawong, Nawaz, Raheel

    Published in PeerJ. Computer science (10-12-2021)
    “…Ethereum, the second-largest cryptocurrency after Bitcoin, has attracted wide attention in the last few years and accumulated significant transaction records…”
    Get full text
    Journal Article
  4. 4

    LoRaDRL: Deep Reinforcement Learning Based Adaptive PHY Layer Transmission Parameters Selection for LoRaWAN by Ilahi, Inaam, Usama, Muhammad, Farooq, Muhammad Omer, Umar Janjua, Muhammad, Qadir, Junaid

    “…The performance of densely-deployed low-power wide-area networks (LPWANs) can significantly deteriorate due to packets collisions, and one of the main reasons…”
    Get full text
    Conference Proceeding
  5. 5
  6. 6

    Formal verification of fraud-resilience in a crowdsourcing consensus protocol by Afzaal, Hamra, Imran, Muhammad, Janjua, Muhammad Umar

    Published in Computers & security (01-08-2023)
    “…•A Trust and Transactions Chain consensus protocol is proposed for a blockchain-based crowdsourcing system.•Communicating Sequential Programs language is…”
    Get full text
    Journal Article
  7. 7

    Formal verification of persistence and liveness in the trust-based blockchain crowdsourcing consensus protocol by Afzaal, Hamra, Imran, Muhammad, Janjua, Muhammad Umar

    Published in Computer communications (01-08-2022)
    “…Crowdsourcing is a potential computing paradigm that exploits collective human intelligence to solve complex tasks, but it suffers from various safety and…”
    Get full text
    Journal Article
  8. 8

    Using Blockchain to Rein in the New Post-Truth World and Check the Spread of Fake News by Qayyum, Adnan, Qadir, Junaid, Janjua, Muhammad Umar, Sher, Falak

    Published in IT professional (01-07-2019)
    “…In recent years, “fake news” has become a global issue that raises unprecedented challenges for human society and democracy. This problem has arisen due to the…”
    Get full text
    Journal Article
  9. 9

    A compliance-based ranking of certificate authorities using probabilistic approaches by Junaid, Kashif, Janjua, Muhammad Umar, Qadir, Junaid

    “…The security of the global Certification Authority (CA) system has recently been compromised as a result of attacks on the Public Key Infrastructure (PKI)…”
    Get full text
    Journal Article
  10. 10

    ProofChain: An X.509-compatible blockchain-based PKI framework with decentralized trust by Saleem, Tania, Janjua, Muhammad Umar, Hassan, Muhammad, Ahmad, Talha, Tariq, Filza, Hafeez, Khadija, Salal, Muhammad Ahsan, Bilal, Muhammad Danish

    “…Public Key Infrastructure (PKI) is the most widely accepted cryptography protocol to enable secure communication over the web. PKI comprises digital…”
    Get full text
    Journal Article
  11. 11

    EthReview: An Ethereum-based Product Review System for Mitigating Rating Frauds by Zulfiqar, Maryam, Tariq, Filza, Janjua, Muhammad Umar, Mian, Adnan Noor, Qayyum, Adnan, Qadir, Junaid, Sher, Falak, Hassan, Muhammad

    Published in Computers & security (01-01-2021)
    “…On an e-commerce platform, a buyer‘s decision about the purchase of products is highly dependent on the existing reviews of that product. These reviews provide…”
    Get full text
    Journal Article
  12. 12

    Predicting functional roles of Ethereum blockchain addresses by Saleem, Tania, Ismaeel, Muhammad, Janjua, Muhammad Umar, Ali, Abdul Rehman, Aqib, Awab, Ahmed, Ali, Hassan, Saeed Ul

    Published in Peer-to-peer networking and applications (01-11-2023)
    “…Ethereum is one of the largest blockchain programming platforms. Users in Ethereum are identified using public-private key addresses, which are difficult to…”
    Get full text
    Journal Article
  13. 13

    Tracking adoption of revocation and cryptographic features in X.509 certificates by Zulfiqar, Maryam, Janjua, Muhammad Umar, Hassan, Muhammad, Ahmad, Talha, Saleem, Tania, Stokes, Jack W.

    “…SSL certificates hold immense importance when it comes to the security of the WebPKI. The trust in these certificates is driven by the strength of their…”
    Get full text
    Journal Article
  14. 14

    Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning by Ilahi, Inaam, Usama, Muhammad, Qadir, Junaid, Janjua, Muhammad Umar, Al-Fuqaha, Ala, Hoang, Dinh Thai, Niyato, Dusit

    “…Deep reinforcement learning (DRL) has numerous applications in the real world, thanks to its ability to achieve high performance in a range of environments…”
    Get full text
    Journal Article
  15. 15

    Intelligent Resource Allocation in Dense LoRa Networks using Deep Reinforcement Learning by Ilahi, Inaam, Usama, Muhammad, Farooq, Muhammad Omer, Janjua, Muhammad Umar, Qadir, Junaid

    Published 22-12-2020
    “…The anticipated increase in the count of IoT devices in the coming years motivates the development of efficient algorithms that can help in their effective…”
    Get full text
    Journal Article
  16. 16

    Using Blockchain to Rein in The New Post-Truth World and Check The Spread of Fake News by Qayyum, Adnan, Qadir, Junaid, Janjua, Muhammad Umar, Sher, Falak

    Published 28-03-2019
    “…In recent years, `fake news' has become a global issue that raises unprecedented challenges for human society and democracy. This problem has arisen due to the…”
    Get full text
    Journal Article
  17. 17

    Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning by Ilahi, Inaam, Usama, Muhammad, Qadir, Junaid, Janjua, Muhammad Umar, Al-Fuqaha, Ala, Hoang, Dinh Thai, Niyato, Dusit

    Published 27-01-2020
    “…Deep Reinforcement Learning (DRL) has numerous applications in the real world thanks to its outstanding ability in quickly adapting to the surrounding…”
    Get full text
    Journal Article