Muhammad Asim

2.6k total citations · 1 hit paper
97 papers, 1.4k citations indexed

About

Muhammad Asim is a scholar working on Computer Vision and Pattern Recognition, Artificial Intelligence and Computer Networks and Communications. According to data from OpenAlex, Muhammad Asim has authored 97 papers receiving a total of 1.4k indexed citations (citations by other indexed papers that have themselves been cited), including 34 papers in Computer Vision and Pattern Recognition, 31 papers in Artificial Intelligence and 16 papers in Computer Networks and Communications. Recurrent topics in Muhammad Asim's work include UAV Applications and Optimization (9 papers), Chaos-based Image/Signal Encryption (9 papers) and Advanced Neural Network Applications (8 papers). Muhammad Asim is often cited by papers focused on UAV Applications and Optimization (9 papers), Chaos-based Image/Signal Encryption (9 papers) and Advanced Neural Network Applications (8 papers). Muhammad Asim collaborates with scholars based in Saudi Arabia, China and Pakistan. Muhammad Asim's co-authors include Ahmed A. Abd El‐Latif, Mohammed ElAffendi, Varun Jeoti, Milan Petković, Zuping Zhang, Siddique Latif, Junaid Qadir, Luan Ibraimi, Wali Khan Mashwani and Shujun Li and has published in prestigious journals such as Scientific Reports, Expert Systems with Applications and IEEE Access.

In The Last Decade

Muhammad Asim

84 papers receiving 1.3k citations

Hit Papers

PVswin-YOLOv8s: UAV-Based Pedestrian and Vehicle Detectio... 2024 2026 2025 2024 20 40 60

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Muhammad Asim Saudi Arabia 20 569 489 321 216 186 97 1.4k
Deepak Garg India 19 392 0.7× 396 0.8× 368 1.1× 272 1.3× 238 1.3× 166 1.5k
Jiangtao Cui China 22 520 0.9× 479 1.0× 180 0.6× 45 0.2× 195 1.0× 117 1.5k
Ziyu Wang China 7 372 0.7× 742 1.5× 229 0.7× 169 0.8× 52 0.3× 18 1.5k
Fazhi He China 23 856 1.5× 519 1.1× 138 0.4× 98 0.5× 281 1.5× 68 1.7k
Yuk Ying Chung Australia 19 607 1.1× 599 1.2× 224 0.7× 71 0.3× 114 0.6× 125 1.6k
Agostino Forestiero Italy 22 209 0.4× 516 1.1× 545 1.7× 90 0.4× 246 1.3× 91 1.3k
Yingjie Xia China 22 703 1.2× 487 1.0× 312 1.0× 63 0.3× 271 1.5× 117 1.7k
Xue Lin United States 21 566 1.0× 759 1.6× 210 0.7× 49 0.2× 110 0.6× 109 1.5k
Lianglun Cheng China 21 410 0.7× 382 0.8× 259 0.8× 104 0.5× 124 0.7× 215 1.6k
Penglin Dai China 24 264 0.5× 462 0.9× 937 2.9× 152 0.7× 293 1.6× 69 1.8k

Countries citing papers authored by Muhammad Asim

Since Specialization
Citations

This map shows the geographic impact of Muhammad Asim's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Muhammad Asim with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Muhammad Asim more than expected).

Fields of papers citing papers by Muhammad Asim

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Muhammad Asim. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Muhammad Asim. The network helps show where Muhammad Asim may publish in the future.

Co-authorship network of co-authors of Muhammad Asim

This figure shows the co-authorship network connecting the top 25 collaborators of Muhammad Asim. A scholar is included among the top collaborators of Muhammad Asim based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Muhammad Asim. Muhammad Asim is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Jia, Yuhan, et al.. (2025). Deciphering TON-IoT threats: Meta-heuristic and deep learning for attack classification. Expert Systems with Applications. 282. 127414–127414. 1 indexed citations
2.
Nawaz, Mehmood, Sheheryar Khan, Muhammad Asim, et al.. (2025). Improving Autonomous Vehicle Cognitive Robustness in Extreme Weather With Deep Learning and Thermal Camera Fusion. IEEE Open Journal of Vehicular Technology. 6. 426–441. 2 indexed citations
3.
Babar, Hamza, Hongwei Wu, Wenbin Zhang, Muhammad Asim, & Ali Koşar. (2025). Synergistic approach to colloidal stability and thermophysical optimisation of multi-walled carbon nanotubes, aluminium nitride, and silver-based hybrid nanofluids. Powder Technology. 465. 121348–121348. 1 indexed citations
4.
Zhang, Zuping, et al.. (2024). AI-Driven Precision Clothing Classification: Revolutionizing Online Fashion Retailing with Hybrid Two-Objective Learning. Information. 15(4). 196–196. 4 indexed citations
5.
Asim, Muhammad, et al.. (2024). Monkeypox: Epidemiology, clinical manifestations, and strategies for global health response. 8.2.2024(Vol 8, (2) 2024). 132–141.
6.
Asim, Muhammad, et al.. (2024). Cross-Project Defect Prediction Based on Domain Adaptation and LSTM Optimization. Algorithms. 17(5). 175–175. 3 indexed citations
7.
Zeng, Feng, et al.. (2024). An Efficient AdaBoost Algorithm for Enhancing Skin Cancer Detection and Classification. Algorithms. 17(8). 353–353. 7 indexed citations
8.
He, Jianbiao, et al.. (2024). GaitSTAR: Spatial–Temporal Attention-Based Feature-Reweighting Architecture for Human Gait Recognition. Mathematics. 12(16). 2458–2458. 2 indexed citations
9.
Haq, Mahmood Ul, et al.. (2024). Automatic Player Face Detection and Recognition for Players in Cricket Games. IEEE Access. 12. 41219–41233. 5 indexed citations
10.
Long, Jun, et al.. (2024). Blockchain-Enabled Secure Data Sharing with Honey Encryption and DSNN-Based Key Generation. Mathematics. 12(13). 1956–1956. 5 indexed citations
11.
Hussain, Arsalan, et al.. (2024). Digital Risk and Financial Inclusion: Balance between Auxiliary Innovation and Protecting Digital Banking Customers. Risks. 12(8). 133–133. 1 indexed citations
12.
Babar, Muhammad Ali, et al.. (2023). An Improved Big Data Analytics Architecture for Intruder Classification Using Machine Learning. Security and Communication Networks. 2023. 1–7.
13.
Mashwani, Wali Khan, et al.. (2022). Constrained optimization based on hybrid version of superiority of feasibility solution strategy. Soft Computing. 26(16). 8117–8132. 3 indexed citations
14.
Asim, Muhammad, Wali Khan Mashwani, & Ahmed A. Abd El‐Latif. (2022). Energy and task completion time minimization algorithm for UAVs-empowered MEC SYSTEM. Sustainable Computing Informatics and Systems. 35. 100698–100698. 15 indexed citations
15.
Asim, Muhammad, Ahmed A. Abd El‐Latif, Mohammed ElAffendi, & Wali Khan Mashwani. (2022). Energy Consumption and Sustainable Services in Intelligent Reflecting Surface and Unmanned Aerial Vehicles-Assisted MEC System for Large-Scale Internet of Things Devices. IEEE Transactions on Green Communications and Networking. 6(3). 1396–1407. 14 indexed citations
16.
Asim, Muhammad, Wali Khan Mashwani, Samir Brahim Belhaouari, & Saima Hassan. (2021). A Novel Genetic Trajectory Planning Algorithm With Variable Population Size for Multi-UAV-Assisted Mobile Edge Computing System. IEEE Access. 9. 125569–125579. 28 indexed citations
17.
Asim, Muhammad, Wali Khan Mashwani, Habib Shah, & Samir Brahim Belhaouari. (2021). An evolutionary trajectory planning algorithm for multi-UAV-assisted MEC system. Soft Computing. 26(16). 7479–7492. 25 indexed citations
18.
Usama, Muhammad, Muhammad Asim, Siddique Latif, Junaid Qadir, & Ala Al‐Fuqaha. (2019). Generative Adversarial Networks For Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems. 78–83. 114 indexed citations
20.
Keoh, Sye Loong, et al.. (2011). Secure spontaneous emergency access to personal health record. ENLIGHTEN (Jurnal Bimbingan dan Konseling Islam). 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026