


default search action
Ahmad Taha
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j16]Mahmoud A. Shawky
, Syed Tariq Shah
, Ahmed Gamal Abdellatif
, Muhammad Ali Imran
, Qammer H. Abbasi
, Shuja Ansari
, Ahmad Taha
:
Reconfigurable Intelligent Surface-Assisted Cross-Layer Authentication for Secure and Efficient Vehicular Communications. IEEE Internet Things J. 12(24): 54450-54467 (2025)
[j15]Wenjie Mei
, Dongzhe Zheng
, Yu Zhou, Ahmad Taha, Chengyan Zhao:
On input-to-state stability verification of identified models obtained by Koopman operator. J. Frankl. Inst. 362(3): 107490 (2025)
[j14]Muhammad Farooq
, Syed Aziz Shah
, Dingchang Zheng
, Ahmad Taha
, Muhammad Ali Imran
, Qammer H. Abbasi
, Hasan Tahir Abbas
:
Contactless Heart Sound Detection Using Advanced Signal Processing Exploiting Radar Signals. IEEE J. Biomed. Health Informatics 29(2): 1009-1020 (2025)
[c13]Wenshuo Tang, Shilong Yan, Mahmoud A. Shawky, Benoit Couraud, Muhammad Ali Imran, David Flynn, Ahmad Taha:
Digitalising Social Housing via Cyber-Physical Systems and AI for Comfort, Health, and Transition to Net-Zero: A Holistic Overview. WCNC 2025: 1-6
[i4]Laith Nayal, Hadi Salloum, Ahmad Taha, Yaroslav Kholodov, Alexander V. Gasnikov:
Training-Free Out-Of-Distribution Segmentation With Foundation Models. CoRR abs/2510.02909 (2025)- 2024
[j13]Muhammad Zakir Khan, Muhammad Farooq, Ahmad Taha, Adnan Qayyum, Fehaid Alqahtani, Adnan Nadeem AlHassan, Kamran Arshad, Khaled Assaleh, Shuja Ansari, Muhammad Usman
, Muhammad Ali Imran, Qammer H. Abbasi:
Chapter Three - Indoor localization technologies for activity-assisted living: Opportunities, challenges, and future directions. Adv. Comput. 133: 59-98 (2024)
[j12]Mirko Farina
, Usman Ahmad
, Ahmad Taha
, Hussein Younes, Yusuf Mesbah
, Xiao Yu
, Witold Pedrycz:
Sparsity in transformers: A systematic literature review. Neurocomputing 582: 127468 (2024)
[j11]Haneen Fatima
, Muhammad Ali Imran
, Ahmad Taha, Lina S. Mohjazi:
Internet-of-Mirrors (IoM) for connected healthcare and beauty: A prospective vision. Internet Things 28: 101415 (2024)
[j10]Mahmoud A. Shawky
, Syed Tariq Shah
, Mohammed Abdrabou
, Muhammad Usman
, Qammer H. Abbasi, David Flynn
, Muhammad Ali Imran
, Shuja Ansari, Ahmad Taha:
How secure are our roads? An in-depth review of authentication in vehicular communications. Veh. Commun. 47: 100784 (2024)
[c12]Benoit Couraud
, Erwin Franquet
, Honorat Quinard, Pierre-Jean Barre, Paulo Moura
, Yann Rozier, Franck Dechavanne, Pierre Costini, Azeddine El Youssfi, Ahmad Taha
, Sonam Norbu
, David Flynn
:
A Cyber-Physical Infrastructure for Smart Energy Buildings. IFIPIoT (2) 2024: 22-29
[c11]Shilong Yan, Muhammad Ali Imran, David Flynn, Ahmad Taha:
Architecting Internet-of-Things-Enabled Digital Twins: An Evaluation Framework. WF-IoT 2024: 649-653- 2023
[j9]Ahmad Taha
, Basel Barakat
, Mohammad Mahmoud A. Taha
, Mahmoud A. Shawky
, Chun Sing Lai
, Sajjad Hussain
, Muhammad Zainul Abideen
, Qammer H. Abbasi
:
A Comparative Study of Single and Multi-Stage Forecasting Algorithms for the Prediction of Electricity Consumption Using a UK-National Health Service (NHS) Hospital Dataset. Future Internet 15(4): 134 (2023)
[j8]Mahmoud A. Shawky
, Abdul Jabbar
, Muhammad Usman
, Muhammad Imran
, Qammer H. Abbasi
, Shuja Ansari
, Ahmad Taha
:
Efficient Blockchain-Based Group Key Distribution for Secure Authentication in VANETs. IEEE Netw. Lett. 5(1): 64-68 (2023)
[j7]Zheqi Yu
, Adnan Zahid
, Ahmad Taha
, William Taylor
, Julien Le Kernec
, Hadi Heidari
, Muhammad Ali Imran
, Qammer H. Abbasi
:
An Intelligent Implementation of Multi-Sensing Data Fusion With Neuromorphic Computing for Human Activity Recognition. IEEE Internet Things J. 10(2): 1124-1133 (2023)
[j6]Mahmoud A. Shawky
, Muhammad Usman
, David Flynn, Muhammad Ali Imran
, Qammer H. Abbasi, Shuja Ansari
, Ahmad Taha
:
Blockchain-based secret key extraction for efficient and secure authentication in VANETs. J. Inf. Secur. Appl. 74: 103476 (2023)
[j5]Mahmoud A. Shawky
, Syed Tariq Shah
, Qammer H. Abbasi
, Mohamed Hussein
, Muhammad Ali Imran
, Syed Faraz Hasan
, Shuja Ansari
, Ahmad Taha
:
RIS-Enabled Secret Key Generation for Secured Vehicular Communication in the Presence of Denial-of-Service Attacks. Sensors 23(8): 4104 (2023)
[j4]Mahmoud A. Shawky
, Muhammad Usman
, Muhammad Ali Imran
, Qammer H. Abbasi
, Shuja Ansari, Ahmad Taha
:
Adaptive chaotic map-based key extraction for efficient cross-layer authentication in VANETs. Veh. Commun. 39: 100547 (2023)
[c10]Haotian Rao, João Paulo Ponciano, Muhammad Ali Imran, Ahmad Taha:
Evaluation of Network Performance Based on Structured Geometric Topologies. ICCA 2023: 1-6
[c9]Syed Basit Ali Zaidi
, Mahmoud A. Shawky, Ahmad Taha, Qammer H. Abbasi, Muhammad Ali Imran
, Shuja Ansari:
An Efficient Deep Learning-based Spectrum Awareness Approach for Vehicular Communication. WCNC 2023: 1-6
[i3]Mahmoud A. Shawky
, Syed Tariq Shah
, Michael S. Mollel
, Jalil Ur Rehman Kazim, Muhammad Ali Imran
, Qammer H. Abbasi, Shuja Ansari, Ahmad Taha:
Reconfigurable Intelligent Surface-Assisted Cross-Layer Authentication for Secure and Efficient Vehicular Communications. CoRR abs/2303.08911 (2023)
[i2]Wenjie Mei, Yu Zhou, Ahmad Taha, Chengyan Zhao:
On input-to-state stability verification of identified models obtained by Koopman operator. CoRR abs/2309.01242 (2023)
[i1]Haneen Fatima, Muhammad Ali Imran, Ahmad Taha, Lina S. Mohjazi:
Internet of Mirrors for Connected Healthcare and Beauty: A Prospective Vision. CoRR abs/2311.14734 (2023)- 2022
[j3]Muhammad Usman
, Shuja Ansari, Ahmad Taha, Adnan Zahid, Qammer H. Abbasi, Muhammad Ali Imran
:
Terahertz-Based Joint Communication and Sensing for Precision Agriculture: A 6G Use-Case. Frontiers Commun. Networks 3 (2022)
[c8]Muhammad Zakir Khan, Muhammad Farooq
, Ahmad Taha, Naeem Ramazan, Muhammad Ali Imran, Qammer H. Abbasi:
Localization using wireless sensing for future healthcare. ICECS 2022 2022: 1-4
[c7]William Taylor, Ahmad Taha, Ahsen Tahir, Qammer H. Abbasi, Muhammad Ali Imran
:
Real-Time Contactless WiFi Based Room Detection of Sitting and Standing Human Motions. ICECS 2022 2022: 1-4
[c6]Mahmoud A. Shawky
, Qammer H. Abbasi, Muhammad Ali Imran
, Shuja Ansari, Ahmad Taha:
Cross-Layer Authentication based on Physical-Layer Signatures for Secure Vehicular Communication. IV 2022: 1315-1320
[c5]Mahmoud A. Shawky
, Muhammad Usman, Muhammad Ali Imran
, Qammer H. Abbasi, Shuja Ansari, Ahmad Taha:
Adaptive and Efficient Key Extraction for Fast and Slow Fading Channels in V2V Communications. VTC Fall 2022: 1-6- 2021
[j2]Basel Barakat
, Ahmad Taha
, Ryan Samson
, Aiste Steponenaite
, Shuja Ansari
, Patrick M. Langdon, Ian J. Wassell
, Qammer H. Abbasi
, Muhammad Ali Imran
, Simeon Keates
:
6G Opportunities Arising from Internet of Things Use Cases: A Review Paper. Future Internet 13(6): 159 (2021)
[j1]Shuja Ansari, Ahmad Taha
, Kia Dashtipour, Yusuf A. Sambo, Qammer H. Abbasi, Muhammad Ali Imran
:
Urban Air Mobility - A 6G Use Case? Frontiers Commun. Networks 2 (2021)
[c4]Ahmad Taha
, Yao Ge
, William Taylor
, Ahmed Zoha
, Khaled Assaleh, Kamran Arshad, Qammer H. Abbasi
, Muhammad Ali Imran
:
Indoor Activity Position and Direction Detection Using Software Defined Radios. BODYNETS 2021: 15-27
[c3]Yao Ge
, Shibo Li, Minjian Shentu, Ahmad Taha, Shuyuan Zhu
, Jonathan M. Cooper
, Muhammad Ali Imran
, Qammer H. Abbasi:
A Doppler-based Human Activity Recognition System using WiFi Signals. IEEE SENSORS 2021: 1-4
[c2]Ahmad Taha, Mohammad Mahmoud A. Taha, Basel Barakat, William Taylor, Qammer H. Abbasi, Muhammad Ali Imran
:
AI-Based Fall Detection Using Contactless Sensing. IEEE SENSORS 2021: 1-4
2010 – 2019
- 2019
[c1]Ahmad Taha
, Jan Krabicka, Ruiheng Wu, Peter J. Kyberd
, Neil Adams:
Design of an Occupancy Monitoring Unit: A Thermal Imaging Based People Counting Solution for Socio-Technical Energy Saving Systems in Hospitals. CEEC 2019: 1-6
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-12 00:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







