default search action
Mohammad Ahsan Chishti
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Anam Iqbal, Shaima Qureshi, Mohammad Ahsan Chishti:
EHealth Innovation for Chronic Obstructive Pulmonary Disease: A Context-Aware Comprehensive Framework. Scalable Comput. Pract. Exp. 25(3): 1424-1441 (2024) - 2023
- [j18]Syed Rameem Zahra, Mohammad Ahsan Chishti:
Fuzzy logic and Fog based Secure Architecture for Internet of Things (FLFSIoT). J. Ambient Intell. Humaniz. Comput. 14(5): 5903-5927 (2023) - [j17]Mohd Asifuddola, Mohammad Ahsan Chishti:
A novel fast and fair asynchronous channel hopping rendezvous scheme in cognitive radio networks for internet of things. J. Ambient Intell. Humaniz. Comput. 14(5): 6123-6135 (2023) - [c8]Iqra Amin Shah, Mohammad Ahsan Chishti, Asif Iqbal Baba:
Fog Computing in the Internet of Things: Challenges and Opportunities. IFIPIoT (2) 2023: 198-211 - [i1]Abrar Qadir Mir, Furqan Yaqub Khan, Mohammad Ahsan Chishti:
Online Fake Review Detection Using Supervised Machine Learning And BERT Model. CoRR abs/2301.03225 (2023) - 2022
- [j16]Tausifa Jan Saleem, Mohammad Ahsan Chishti:
LPLB: An approach for the design of a lightweight convolutional neural network. Concurr. Comput. Pract. Exp. 34(22) (2022) - [j15]Ab Rouf Khan, Mohammad Ahsan Chishti:
On contact tracing in COVID-19 (SARS-CoV-2) pandemic using lowest common ancestor in m-ary data aggregation tree in the fog-computing enhanced internet of things. Int. J. Pervasive Comput. Commun. 18(5): 461-475 (2022) - [j14]Jameel Ahamed, Roohie Naaz Mir, Mohammad Ahsan Chishti:
Industry 4.0 oriented predictive analytics of cardiovascular diseases using machine learning, hyperparameter tuning and ensemble techniques. Ind. Robot 49(3): 544-554 (2022) - [j13]Ab Rouf Khan, Mohammad Ahsan Chishti:
βDSC2DAM: beta-dominating set centered Cluster-Based Data Aggregation mechanism for the Internet of Things. J. Ambient Intell. Humaniz. Comput. 13(9): 4279-4296 (2022) - [j12]Syed Rameem Zahra, Mohammad Ahsan Chishti:
A generic and lightweight security mechanism for detecting malicious behavior in the uncertain Internet of Things using fuzzy logic- and fog-based approach. Neural Comput. Appl. 34(9): 6927-6952 (2022) - [j11]Mohammad Khalid Pandit, Roohie Naaz Mir, Mohammad Ahsan Chishti:
Learning Sparse Neural Networks Using Non-Convex Regularization. IEEE Trans. Emerg. Top. Comput. Intell. 6(2): 287-299 (2022) - 2021
- [j10]Tausifa Jan Saleem, Mohammad Ahsan Chishti:
Deep learning for the internet of things: Potential benefits and use-cases. Digit. Commun. Networks 7(4): 526-542 (2021) - [j9]Sahil Sholla, Roohie Naaz Mir, Mohammad Ahsan Chishti:
A Fuzzy Logic-Based Method for Incorporating Ethics in the Internet of Things. Int. J. Ambient Comput. Intell. 12(3): 98-122 (2021) - [j8]Jameel Ahamed, Roohie Naaz Mir, Mohammad Ahsan Chishti:
RML based ontology development approach in internet of things for healthcare domain. Int. J. Pervasive Comput. Commun. 17(4): 377-389 (2021) - [j7]Sahil Sholla, Roohie Naaz Mir, Mohammad Ahsan Chishti:
A neuro fuzzy system for incorporating ethics in the internet of things. J. Ambient Intell. Humaniz. Comput. 12(1): 1487-1501 (2021) - [c7]Syed Rameem Zahra, Mohammad Ahsan Chishti, Asif Iqbal Baba, Fan Wu:
Cushioning the Impact of Covid-19 on the Psyche of Individuals by Using Internet of Things. SmartNets 2021: 1-4 - 2020
- [j6]Mohammad Khalid Pandit, Roohie Naaz Mir, Mohammad Ahsan Chishti:
Adaptive task scheduling in IoT using reinforcement learning. Int. J. Intell. Comput. Cybern. 13(3): 261-282 (2020) - [j5]Neelam Saleem Khan, Mohammad Ahsan Chishti:
Security Challenges in Fog and IoT, Blockchain Technology and Cell Tree Solutions: A Review. Scalable Comput. Pract. Exp. 21(3): 515-542 (2020)
2010 – 2019
- 2019
- [j4]Mohammad Irfan Bala, Mohammad Ahsan Chishti:
Survey of applications, challenges and opportunities in fog computing. Int. J. Pervasive Comput. Commun. 15(2): 80-96 (2019) - [j3]Syed Rameem Zahra, Mohammad Ahsan Chishti:
Assesing the Services, Security Threaths, Challenges and Solutions in the Internet of Things. Scalable Comput. Pract. Exp. 20(3): 457-484 (2019) - [j2]Tausifa Jan Saleem, Mohammad Ahsan Chishti:
Data Analytics in the Internet of Things: A Survey. Scalable Comput. Pract. Exp. 20(4): 607-630 (2019) - [c6]Tausifa Jan Saleem, Mohammad Ahsan Chishti:
Data Mining for the Internet of Things. ICDM (Posters) 2019: 103-110 - 2018
- [j1]Sahil Sholla, Roohie Naaz Mir, Mohammad Ahsan Chishti:
Eventuality of an Apartheid State of Things: An Ethical Perspective on the Internet of Things. Int. J. Technoethics 9(2): 62-76 (2018) - [c5]Mohammad Ahsan Chishti, Shaima Qureshi, Ajaz Hussain Mir:
Performance Analysis of Payload Header Suppression (PHS) for Transmission of VoIP over MPLS based IPv4/IPv6 Network. IMCOM 2018: 21:1-21:6 - 2017
- [c4]Mohammad Irfan Bala, Mohammad Ahsan Chishti:
A model to incorporate automated negotiation in IoT. ANTS 2017: 1-4 - [c3]Sahil Sholla, Roohie Naaz Mir, Mohammad Ahsan Chishti:
Incorporating Ethics in Internet of Things (IoT) Enabled Connected Smart Healthcare. CHASE 2017: 262-263 - 2013
- [c2]Mohammad Ahsan Chishti, Ashaq Majid Ahanger, Shaima Qureshi, Ajaz Hussain Mir:
Performance analysis of Source Specific Multicast over Internet Protocol version 6 with Internet Protocol version 4 in a test bed. CCNC 2013: 956-961
2000 – 2009
- 2005
- [c1]Sajid Hassan, Mohammad Ahsan Chishti, Farhat Anwar, Chandran Elamvazuthi:
Web-Based Management of Key Performance Indicators. iiWAS 2005: 425-432
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-13 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint