Muhammad Khurram Khan

31.5k total citations · 8 hit papers
707 papers, 22.1k citations indexed

About

Muhammad Khurram Khan is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Muhammad Khurram Khan has authored 707 papers receiving a total of 22.1k indexed citations (citations by other indexed papers that have themselves been cited), including 278 papers in Computer Networks and Communications, 275 papers in Information Systems and 192 papers in Artificial Intelligence. Recurrent topics in Muhammad Khurram Khan's work include User Authentication and Security Systems (166 papers), Advanced Authentication Protocols Security (157 papers) and Cryptography and Data Security (108 papers). Muhammad Khurram Khan is often cited by papers focused on User Authentication and Security Systems (166 papers), Advanced Authentication Protocols Security (157 papers) and Cryptography and Data Security (108 papers). Muhammad Khurram Khan collaborates with scholars based in Saudi Arabia, China and Pakistan. Muhammad Khurram Khan's co-authors include Saru Kumari, Neeraj Kumar, Debiao He, Khaled Alghathbar, Xiong Li, SK Hafizul Islam, Jiashu Zhang, Kim‐Kwang Raymond Choo, Ashok Kumar Das and Shi‐Jinn Horng and has published in prestigious journals such as SHILAP Revista de lepidopterología, PLoS ONE and Water Research.

In The Last Decade

Muhammad Khurram Khan

674 papers receiving 21.2k citations

Hit Papers

A survey on privacy protection in blockchai... 2010 2026 2015 2020 2018 2010 2021 2016 2016 100 200 300 400 500

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Muhammad Khurram Khan Saudi Arabia 78 11.0k 10.2k 6.2k 4.5k 3.2k 707 22.1k
Xiaojiang Du United States 71 11.0k 1.0× 7.1k 0.7× 7.0k 1.1× 5.0k 1.1× 2.8k 0.9× 628 19.8k
Laurence T. Yang Canada 79 11.2k 1.0× 6.1k 0.6× 6.6k 1.1× 5.2k 1.1× 1.7k 0.5× 888 23.7k
Albert Y. Zomaya Australia 77 14.4k 1.3× 9.9k 1.0× 6.2k 1.0× 5.4k 1.2× 1.5k 0.5× 936 26.6k
Naixue Xiong China 76 9.1k 0.8× 4.6k 0.5× 6.2k 1.0× 4.3k 0.9× 1.4k 0.4× 915 21.6k
Sherali Zeadally United States 75 12.0k 1.1× 7.4k 0.7× 4.6k 0.7× 8.9k 2.0× 1.5k 0.5× 411 22.3k
Joel J. P. C. Rodrigues Portugal 92 17.1k 1.6× 8.0k 0.8× 6.9k 1.1× 10.6k 2.3× 2.1k 0.6× 1.1k 33.5k
Mamoun Alazab Australia 72 8.7k 0.8× 5.8k 0.6× 7.3k 1.2× 2.7k 0.6× 4.4k 1.4× 312 18.4k
Houbing Song United States 76 8.9k 0.8× 3.6k 0.4× 4.3k 0.7× 5.8k 1.3× 1.3k 0.4× 626 19.9k
Arun Kumar Sangaiah India 77 6.9k 0.6× 4.2k 0.4× 4.9k 0.8× 3.2k 0.7× 1.5k 0.5× 483 18.3k
Ning Zhang China 75 10.6k 1.0× 4.3k 0.4× 4.9k 0.8× 9.3k 2.0× 1.3k 0.4× 834 23.8k

Countries citing papers authored by Muhammad Khurram Khan

Since Specialization
Citations

This map shows the geographic impact of Muhammad Khurram Khan's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Muhammad Khurram Khan with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Muhammad Khurram Khan more than expected).

Fields of papers citing papers by Muhammad Khurram Khan

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Muhammad Khurram Khan. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Muhammad Khurram Khan. The network helps show where Muhammad Khurram Khan may publish in the future.

Co-authorship network of co-authors of Muhammad Khurram Khan

This figure shows the co-authorship network connecting the top 25 collaborators of Muhammad Khurram Khan. A scholar is included among the top collaborators of Muhammad Khurram Khan based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Muhammad Khurram Khan. Muhammad Khurram Khan is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
AlQahtani, Ali Abdullah S., et al.. (2025). Navigating cybersecurity training: A comprehensive review. Computers & Electrical Engineering. 123. 110097–110097. 2 indexed citations
2.
Musamih, Ahmad, et al.. (2025). Using large language models for enhanced fraud analysis and detection in blockchain based health insurance claims. Scientific Reports. 15(1). 29763–29763.
3.
Amin, Ruhul, et al.. (2025). Secure and Dynamic Route Navigation Through RSU-Based Authentication in IoV for Smart City. IEEE Transactions on Network Science and Engineering. 12(5). 3590–3599.
4.
5.
Zhang, Wenfang, et al.. (2025). QF2PM: Quantum-Secure Fine-Grained Privacy-Preserving Profile Matching for Mobile Social Networks. IEEE Transactions on Network Science and Engineering. 13. 2678–2693.
6.
Shuja, Junaid, et al.. (2024). Deep Neural Networks meet computation offloading in mobile edge networks: Applications, taxonomy, and open issues. Journal of Network and Computer Applications. 226. 103886–103886. 10 indexed citations
7.
Bojjagani, Sriramulu, et al.. (2024). VESecure: Verifiable authentication and efficient key exchange for secure intelligent transport systems deployment. Vehicular Communications. 49. 100822–100822. 6 indexed citations
8.
Elhabob, Rashad, et al.. (2024). Pairing-free certificateless public key encryption with equality test for Internet of Vehicles. Computers & Electrical Engineering. 116. 109140–109140. 8 indexed citations
9.
Gupta, Akhil, et al.. (2024). A review on 5G and beyond wireless communication channel models: Applications and challenges. Physical Communication. 67. 102488–102488. 8 indexed citations
10.
Adil, Muhammad, Houbing Song, Mian Ahmad Jan, et al.. (2024). UAV-Assisted IoT Applications, QoS Requirements and Challenges with Future Research Directions. ACM Computing Surveys. 56(10). 1–35. 12 indexed citations
11.
Ray, Sangram, et al.. (2023). An improved authentication and key management scheme in context of IoT-based wireless sensor network using ECC. Computer Communications. 209. 47–62. 13 indexed citations
12.
Sethuraman, Sibi Chakkaravarthy, et al.. (2023). A comprehensive examination of email spoofing: Issues and prospects for email security. Computers & Security. 137. 103600–103600. 7 indexed citations
13.
Dwivedi, Sanjeev Kumar, et al.. (2023). D³APTS: Design of ECC-Based Authentication Protocol and Data Storage for Tactile Internet Enabled IoD System With Blockchain. IEEE Transactions on Consumer Electronics. 70(1). 4239–4248. 16 indexed citations
14.
Zografopoulos, Ioannis, et al.. (2021). Consumer, Commercial, and Industrial IoT (In)Security: Attack Taxonomy and Case Studies. IEEE Internet of Things Journal. 9(1). 199–221. 105 indexed citations
15.
Khan, Muhammad Khurram, et al.. (2020). Frequency of COVID-19 IgG Antibodies among Special Police Squad Lahore, Pakistan. Journal of College of Physicians And Surgeons Pakistan. 30(7). 735–739. 14 indexed citations
16.
Khan, Muhammad Khurram, et al.. (2018). An Improved Control Strategy for Three-Phase Power Inverters in Islanded AC Microgrids. Inventions. 3(3). 47–47. 7 indexed citations
17.
Majid, Muhammad, et al.. (2018). A Newly Developed Ground Truth Dataset for Visual Saliency in Videos. IEEE Access. 6. 20855–20867. 6 indexed citations
18.
Din, Ikram Ud, Suhaidi Hassan, Muhammad Khurram Khan, et al.. (2017). Caching in Information-Centric Networking: Strategies, Challenges, and Future Research Directions. IEEE Communications Surveys & Tutorials. 20(2). 1443–1474. 137 indexed citations
19.
Alghathbar, Khaled, et al.. (2013). Cyber Security Using Arabic CAPTCHA Scheme. The International Arab Journal of Information Technology. 10. 76–84. 16 indexed citations
20.
Khalil, Mohammed S., et al.. (2010). Singular points detection using fingerprint orientation field reliability. International Journal of the Physical Sciences. 5(4). 352–357. 20 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026