Follow
Isma Masood
Isma Masood
Shaheed Zulfikar Ali Bhutto Institute of Science and Technology
Verified email at szabist-isb.edu.pk
Title
Cited by
Cited by
Year
EACMS: Emergency access control management system for personal health record based on blockchain
AR Rajput, Q Li, MT Ahvanooey, I Masood
IEEE Access 7, 84304-84317, 2019
1512019
Towards smart healthcare: patient data privacy and security in sensor-cloud infrastructure
I Masood, Y Wang, A Daud, NR Aljohani, H Dawood
Wireless Communications and Mobile Computing 2018, 1-23, 2018
682018
Securing drug distribution systems from tampering using blockchain
M Humayun, NZ Jhanjhi, M Niazi, F Amsaad, I Masood
Electronics 11 (8), 1195, 2022
382022
Selfish herd optimization algorithm based on chaotic strategy for adaptive IIR system identification problem
R Zhao, Y Wang, C Liu, P Hu, H Jelodar, C Yuan, YC Li, I Masood, ...
Soft Computing 24, 7637-7684, 2020
222020
Selfish herds optimization algorithm with orthogonal design and information update for training multi-layer perceptron neural network
R Zhao, Y Wang, P Hu, H Jelodar, C Yuan, YC Li, I Masood, M Rabbani
Applied Intelligence 49, 2339-2381, 2019
192019
Privacy management of patient physiological parameters
I Masood, Y Wang, A Daud, NR Aljohani, H Dawood
Telematics and Informatics 35 (4), 677-701, 2018
192018
Recommendation system based on semantic scholar mining and topic modeling on conference publications
H Jelodar, Y Wang, G Xiao, M Rabbani, R Zhao, S Ayobi, P Hu, I Masood
Soft Computing 25, 3675-3696, 2021
182021
ALO-DM: A smart approach based on ant lion optimizer with differential mutation operator in big data analytics
P Hu, Y Wang, H Wang, R Zhao, C Yuan, Y Zheng, Q Lu, Y Li, I Masood
Database Systems for Advanced Applications: DASFAA 2018 International …, 2018
102018
A survey of real-time approximate nearest neighbor query over streaming data for fog computing
X Jiang, P Hu, Y Li, C Yuan, I Masood, H Jelodar, M Rabbani, Y Wang
Journal of Parallel and Distributed Computing 116, 50-62, 2018
82018
An empirical study on investigating the role of KMS in promoting trust within GSD teams
M Humayun, C Gang, I Masood
Proceedings of the 17th International Conference on Evaluation and …, 2013
62013
A blockchain-based system for patient data privacy and security
I Masood, A Daud, Y Wang, A Banjar, R Alharbey
Multimedia Tools and Applications, 1-25, 2024
12024
Patient’s data privacy and security in mHealth applications: a Charles proxy-based recommendation
AR Rajput, I Masood, A Tabassam, MS Aslam, Z ShaoYu, MA Rajput
Soft Computing 27 (23), 18165-18180, 2023
12023
Corrigendum to “Towards Smart Healthcare: Patient Data Privacy and Security in Sensor-Cloud Infrastructure”
I Masood, Y Wang, A Daud, NR Aljohani, H Dawood
Wireless Communications and Mobile Computing 2019, 1-1, 2019
12019
Recommendation System based on Semantic Scholar Mining and Topic modeling: A behavioral analysis of researchers from six conferences
H Jelodar, Y Wang, M Rabbani, R Zhao, S Ayobi, P Hu, I Masood
arXiv preprint arXiv:1812.08304, 2018
12018
A systematic mapping study on patient data privacy and security for software system development
I Masood, S Zafar
Sixth Intern. Conf. on Software Engineering Advances (ICSEA), 2011
12011
Securing Drug Distribution Systems from Tampering Using Blockchain. Electronics 2022, 11, 1195
M Humayun, NZ Jhanjhi, M Niazi, F Amsaad, I Masood
s Note: MDPI stays neu-tral with regard to jurisdictional claims in …, 2022
2022
Maximizing bichromatic reverse k nearest neighbor with multi-level tags queries in spatial-textual databases
C Zhao, Y Wang, X Jiang, C Yuan, Y Li, I Masood
2017 International Conference on Progress in Informatics and Computing (PIC …, 2017
2017
A Review on Models for Software Quality Enhancement from User’s Perspective
A Ikram, I Masood, T Sarfraz, T Amjad
The system can't perform the operation now. Try again later.
Articles 1–18