Abid Khan

3.5k total citations
139 papers, 2.3k citations indexed

About

Abid Khan is a scholar working on Artificial Intelligence, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Abid Khan has authored 139 papers receiving a total of 2.3k indexed citations (citations by other indexed papers that have themselves been cited), including 72 papers in Artificial Intelligence, 57 papers in Information Systems and 34 papers in Computer Networks and Communications. Recurrent topics in Abid Khan's work include Privacy-Preserving Technologies in Data (42 papers), Cryptography and Data Security (40 papers) and Blockchain Technology Applications and Security (27 papers). Abid Khan is often cited by papers focused on Privacy-Preserving Technologies in Data (42 papers), Cryptography and Data Security (40 papers) and Blockchain Technology Applications and Security (27 papers). Abid Khan collaborates with scholars based in Pakistan, United Kingdom and South Korea. Abid Khan's co-authors include Mansoor Ahmed, Adeel Anjum, Gwanggil Jeon, Carsten Maple, Munam Ali Shah, Masoom Alam, Saif Ur Rehman Malik, Munam Ali, Farhana Jabeen and Saif ul Islam and has published in prestigious journals such as SHILAP Revista de lepidopterología, PLoS ONE and IEEE Access.

In The Last Decade

Abid Khan

130 papers receiving 2.2k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Abid Khan Pakistan 26 884 879 846 382 231 139 2.3k
Xiaoyong Li China 24 969 1.1× 1.2k 1.4× 680 0.8× 213 0.6× 337 1.5× 226 2.4k
Raymond K. Wong Australia 20 513 0.6× 513 0.6× 929 1.1× 141 0.4× 131 0.6× 215 1.8k
Chunming Rong Norway 32 1.8k 2.0× 1.4k 1.5× 1.3k 1.5× 618 1.6× 211 0.9× 224 3.5k
Uttam Ghosh United States 29 993 1.1× 1.5k 1.7× 867 1.0× 599 1.6× 107 0.5× 172 3.1k
Gianmarco Baldini Italy 25 517 0.6× 1.3k 1.5× 776 0.9× 816 2.1× 179 0.8× 163 2.5k
Yanjie Fu United States 35 1.3k 1.5× 428 0.5× 1.6k 1.9× 179 0.5× 212 0.9× 173 4.0k
Yogesh Simmhan United States 27 1.8k 2.0× 1.9k 2.2× 571 0.7× 453 1.2× 49 0.2× 126 3.3k
Fei Hao China 26 534 0.6× 464 0.5× 853 1.0× 151 0.4× 148 0.6× 167 2.2k
Arash Heidari Iran 33 707 0.8× 1.1k 1.3× 1.0k 1.2× 308 0.8× 52 0.2× 53 2.7k
Mehdi Sookhak United States 30 1.5k 1.7× 1.6k 1.8× 832 1.0× 896 2.3× 182 0.8× 65 3.2k

Countries citing papers authored by Abid Khan

Since Specialization
Citations

This map shows the geographic impact of Abid Khan's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Abid Khan with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Abid Khan more than expected).

Fields of papers citing papers by Abid Khan

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Abid Khan. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Abid Khan. The network helps show where Abid Khan may publish in the future.

Co-authorship network of co-authors of Abid Khan

This figure shows the co-authorship network connecting the top 25 collaborators of Abid Khan. A scholar is included among the top collaborators of Abid Khan based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Abid Khan. Abid Khan is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Shah, Munam Ali, et al.. (2025). Location Privacy Schemes in Vehicular Networks: Taxonomy, Comparative Analysis, Design Challenges, and Future Opportunities. ACM Computing Surveys. 57(6). 1–44. 2 indexed citations
2.
Malik, Saif Ur Rehman, et al.. (2023). Cohort-based kernel principal component analysis with Multi-path Service Routing in Federated Learning. Future Generation Computer Systems. 149. 518–530. 3 indexed citations
3.
Ahmed, Mansoor, et al.. (2023). Data Provenance in Healthcare: Approaches, Challenges, and Future Directions. Sensors. 23(14). 6495–6495. 10 indexed citations
4.
Anjum, Adeel, et al.. (2023). Improved angelization technique against background knowledge attack for 1:M microdata. PeerJ Computer Science. 9. e1255–e1255.
5.
Khan, Majid Iqbal, et al.. (2023). Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home. Digital Communications and Networks. 9(2). 383–392. 19 indexed citations
6.
Hameed, Khizar, Saurabh Garg, Muhammad Bilal Amin, Byeong Ho Kang, & Abid Khan. (2022). A context-aware information-based clone node attack detection scheme in Internet of Things. UTAS Research Repository. 24 indexed citations
7.
Waheed, Abdul, Munam Ali Shah, Syed Muhammad Mohsin, et al.. (2022). A Comprehensive Review of Computing Paradigms, Enabling Computation Offloading and Task Execution in Vehicular Networks. IEEE Access. 10. 3580–3600. 49 indexed citations
8.
Khan, Abid, et al.. (2021). . Aberystwyth Research portal (Aberystwyth University). 1 indexed citations
9.
Shah, Munam Ali, et al.. (2021). Virtual Pseudonym-Changing and Dynamic Grouping Policy for Privacy Preservation in VANETs. Sensors. 21(9). 3077–3077. 13 indexed citations
10.
Waheed, Abdul, et al.. (2021). Hybrid Task Coordination Using Multi-Hop Communication in Volunteer Computing-Based VANETs. Sensors. 21(8). 2718–2718. 15 indexed citations
11.
Shah, Munam Ali, et al.. (2021). A Distributed Mix-Context-Based Method for Location Privacy in Road Networks. Sustainability. 13(22). 12513–12513. 5 indexed citations
12.
Khan, Majid Iqbal, et al.. (2021). Blockchain-based secure multi-resource trading model for smart marketplace. Computing. 103(3). 379–400. 17 indexed citations
13.
Tao, Xiaofeng, et al.. (2020). θ-Sensitive k-Anonymity: An Anonymization Model for IoT based Electronic Health Records. Electronics. 9(5). 716–716. 26 indexed citations
14.
Tao, Xiaofeng, Adeel Anjum, Saif Ur Rehman Malik, et al.. (2020). (τ, m)‐slicedBucket privacy model for sequential anonymization for improving privacy and utility. Transactions on Emerging Telecommunications Technologies. 33(6). 4 indexed citations
15.
Tao, Xiaofeng, et al.. (2020). Privacy Preserving for Multiple Sensitive Attributes against Fingerprint Correlation Attack Satisfying c-Diversity. Wireless Communications and Mobile Computing. 2020. 1–18. 14 indexed citations
16.
Zeadally, Sherali, et al.. (2019). Curbing Address Reuse in the IOTA Distributed Ledger: A Cuckoo-Filter-Based Approach. IEEE Transactions on Engineering Management. 67(4). 1244–1255. 24 indexed citations
17.
Khan, Abid, Saif Ur Rehman Malik, Haris Pervaiz, et al.. (2019). FESDA: Fog-Enabled Secure Data Aggregation in Smart Grid IoT Network. IEEE Internet of Things Journal. 7(7). 6132–6142. 111 indexed citations
18.
Anjum, Adeel, Tanzila Saba, Abid Khan, et al.. (2018). Improved Generalization for Secure Data Publishing. IEEE Access. 6. 27156–27165. 39 indexed citations
19.
Suhail, Sabah, et al.. (2018). Data trustworthiness in IoT. 414–419. 19 indexed citations
20.
Yon, Zhang, Xiamu Niu, Abid Khan, Qiong Li, & Han Qi. (2006). A novel method of watermarking relational databases using character string. 120–124. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026